Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets R. Fonseca, Berkeley; S. Ratnasamy, Intel Research; J. Zhao, ICI; C. T. Ee,

Slides:



Advertisements
Similar presentations
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos.
Advertisements

ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
4/12/2015© 2009 Raymond P. Jefferis IIILect Internet Protocol - Continued.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
A Presentation by: Noman Shahreyar
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Beacon Vector Routing: towards scalable routing for sensor networks NEST Retreat, January 2004 Rodrigo Fonseca joint work with Sylvia Ratnasamy, Ion Stoica,
Receiver Based Forwarding for Wireless Sensor Networks Rodrigo Fonseca OASIS Retreat January 2005 Joint work with Ana Sanz Merino, Ion Stoica.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Wireless Ad Hoc Network Routing Protocols CSE Maya Rodrig.
Georouting in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
Axis-Based Virtual Coordinate Assignment Protocol and Delivery- Guaranteed Routing Protocol in Wireless Sensor Networks M.J.Tsai, H.Y.Yang, and W.Q.Huang.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
CSE 461: Distance Vector Routing. Next Topic  Focus  How do we calculate routes for packets?  Routing is a network layer function  Routing Algorithms.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks Alec Woo, Terence Tong, David Culler SenSys 2003.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Delivery, Forwarding and
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
ECE 544 Project3 Kush Patel Siddharth Paradkar Ke Dong.
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
Introduction to Sensor Networks. Introduction A large number of low-cost, low-power, multifunctional, and small sensor nodes Sensor nodes consist of –sensing.
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
EILEEN BALCI GPSR: Greedy Perimeter Stateless Routing for Wireless Networks.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
FAR: Face-Aware Routing for Mobicast in Large-Scale Sensor Networks QINGFENG HUANG Palo Alto Research Center (PARC) Inc. and SANGEETA BHATTACHARYA, CHENYANG.
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
A Survey of Geocast Routing Protocols 指導教授:許子衡 教授 報告學生:馬敏修 指導教授:許子衡 教授 報告學生:馬敏修.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Figure Routers in an Internet.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
Networking and internetworking devices. Repeater.
Geographic Routing without Location Information Ananth Rao, Sylvia Ratnasamy, Christos Papadimitriou, Scott Shenker and Ion Stoica MobiCom 2003.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Fundamentals of Computer Networks ECE 478/578
A New Recovery Method for Greedy Routing Protocols in High Mobile Vehicular Communications 指導教授:許子衡 教授 學 生:董藝興.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
1 Routing in Internet vs. Sensor Network. 2 Sensor Network Routing –I Location/Geographic Based Routing Tian He Some materials are adapted from I. Stojmenovic.
Chapter 7 Packet-Switching Networks Shortest Path Routing.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Routing Protocols and Concepts
GPSR Greedy Perimeter Stateless Routing
Sensor Network Routing – III Network Embedded Routing
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
A comparison of Ad-Hoc Routing Protocols
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing in Packet Networks Shortest Path Routing
A Scalable content-addressable network
UNICAST ROUTING PROTOCOLS
Intradomain Routing Outline Introduction to Routing
Chapter 22. Network Layer: Routing
Advanced Computer Networks
CMPE 252A : Computer Networks
OSPF Protocol.
Presentation transcript:

Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets R. Fonseca, Berkeley; S. Ratnasamy, Intel Research; J. Zhao, ICI; C. T. Ee, D. Culler, S. Shenker, and I. Stoica, Berkeley NSDI 2005

The BVR Algorithm Algorithm in three distinct parts: –Greedy forwarding –Fallback Mode –Scoped Flooding

The BVR Algorithm Define location based on number of hops to the routing beacons Each node stores its location as a vector of hop counts. P(q) = e.g. Packets are routed based on these vectors

The BVR Algorithm Nodes retain the position of their neighboring nodes. A nodes neighborhood is the collection of nodes one hop away, for most nodes.

The BVR Algorithm The algorithm compares the difference between the packet’s destination and the current node’s neighbors. Main Rule: Minimize the sum of the differences for the beacons that are closer to the destination d than to the current routing node p Ties in the Above are broken by this rule: Minimize the sum of the distances to the farther beacons Distance function

BVR Algorithm

Algorithm in operation

b1b1 b2b2 Beacon Source Destination b3b

b1b1 b2b2 Beacon Source Destination b3b Hop 1: - only one decision

b1b1 b2b2 Beacon Source Destination b3b

b1b1 b2b2 Beacon Source Destination b3b Hop 2: 1: = 8 3: = 4 Choose node 3

b1b1 b2b2 Beacon Source Destination b3b

b1b1 b2b2 Beacon Source Destination b3b Hop 3: 2: = 6 4: = 5 7: = 4 Choose node 7

b1b1 b2b2 Beacon Source Destination b3b

b1b1 b2b2 Beacon Source Destination b3b Hop 4: 3: = 4 5: = 2 8: = 2 -> tie!

b1b1 b2b2 Beacon Source Destination b3b Hop 4: 3: = 4 5: = 2 8: = 2 -> tie! Reverse metrics: 5: = 3 8: = 5 Choose 5

b1b1 b2b2 Beacon Source Destination b3b

b1b1 b2b2 Beacon Source Destination b3b Hop 5: 4: = 5 6: = 3 7: = 4 Choose node 6

b1b1 b2b2 Beacon Source Destination b3b

b1b1 b2b2 Beacon Source Destination b3b Hop 6: 5: = 2 15: = 2 -> tie!

b1b1 b2b2 Beacon Source Destination b3b Hop 6: 5: = 2 15: = 2 -> tie! Reverse metrics: 5: = 3 15: = 1 Choose 15

b1b1 b2b2 Beacon Source Destination b3b

b1b1 b2b2 Beacon Source Destination b3b Hop 7: 14: = 0 Found node!

b1b1 b2b2 Beacon Source Destination b3b

BVR: Fallback Mode It is possible for greedy forwarding to fail. This happens when no neighbor would improve the minimum distance metric When this happens the protocol uses fallback mode

BVR: Fallback Mode Forward packet towards the beacon closest to the destination Parent goes back to forwarding normally: first with greedy forwarding and then fallback mode

BVR: Scoped Flooding When fallback mode fails the algorithm resorts to scoped flooding In scoped flooding the node knows the number of hops away the destination is, but not the direction Floods only the number of hops needed

Example: non-ideal case Example where algorithm resorts to flooding

b2b2 b1b1 Beacon Source Destination

b2b2 b1b1 Beacon Source Destination Calculate forward: = Calculate reverse: =

b2b2 b1b1 Beacon Source Destination Calculate forward: = Calculate reverse: = Would forward to, but not closer then where we’ve already been. Initiate scoped flooding for 3 units away. For such a small network, touches every node.

b2b2 b1b1 Beacon Source Destination Calculate forward: = Calculate reverse: = Would forward to, but not closer then where we’ve already been. Initiate scoped flooding for 3 units away. For such a small network, touches every node.

b2b2 b1b1 Beacon Source Destination Adding another beacon fixes problem b3b3 Calculate forward: =

b2b2 b1b1 Beacon Source Destination Adding another beacon fixes problem b3b3 Calculate forward: =

b2b2 b1b1 Beacon Source Destination Adding another beacon fixes problem b3b3 Calculate forward: =

b2b2 b1b1 Beacon Source Destination Adding another beacon fixes problem b3b3 Calculate forward: =

b2b2 b1b1 Beacon Source Destination Adding another beacon fixes problem b3b3 Calculate forward: = Tie! Calculate reverse: = -> forward to destination

Location Directory How does the sender get the coordinates of the destination? Like a DNS service. –Submits node ID –Responds with location Hash function correlates nodes with certain beacons Beacons must store all the state data of the nodes associated with it