4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE

Slides:



Advertisements
Similar presentations
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Advertisements

1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
5/2/2015 Wireless Sensor Networks COE 499 Sleep-based Topology Control II Tarek Sheltami KFUPM CCSE COE
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Movement-Assisted Sensor Deployment Author : Guiling Wang, Guohong Cao, Tom La Porta Presenter : Young-Hwan Kim.
Ruslana Mys Delaunay Triangulation Delaunay Triangulation (DT)  Introduction  Delaunay-Voronoi based method  Algorithms to compute the convex hull 
By Groysman Maxim. Let S be a set of sites in the plane. Each point in the plane is influenced by each point of S. We would like to decompose the plane.
Coverage Algorithms Mani Srivastava & Miodrag Potkonjak, UCLA [Project: Sensorware (RSC)] & Mark Jones, Virginia Tech [Project: Dynamic Sensor Nets (ISI-East)]
5/21/20151 Mobile Ad hoc Networks COE 549 Capacity Regions Tarek Sheltami KFUPM CCSE COE
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
Optimal Sleep-Wakeup Algorithms for Barriers of Wireless Sensors S. Kumar, T. Lai, M. Posner and P. Sinha, BROADNETS ’ 2007.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Energy-Efficient Rate Scheduling in Wireless Links A Geometric Approach Yashar Ganjali High Performance Networking Group Stanford University
1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
1 Two-step Routing and Apex Angle Routing for Delaunay Triangulations PhD Candidate: Weisheng Si Supervisor: Prof. Albert Y. Zomaya School of Information.
Computing the Delaunay Triangulation By Nacha Chavez Math 870 Computational Geometry; Ch.9; de Berg, van Kreveld, Overmars, Schwarzkopf By Nacha Chavez.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
1 University of Denver Department of Mathematics Department of Computer Science.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Sensor network coverage Ref: 1.Seapahn Megerian et al., “Worst and best-case coverage in sensor networks” 2.Chi-Fu Huang and Yu-Chee Tseng, “The coverage.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
August 21, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
UNC Chapel Hill M. C. Lin Point Location Chapter 6 of the Textbook –Review –Algorithm Analysis –Dealing with Degeneracies.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
The Coverage Problem in Wireless Ad Hoc Sensor Networks Supervisor: Prof. Sanjay Srivastava By, Rucha Kulkarni
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
Mobile Ad hoc Networks Sleep-based Topology Control
Wireless Sensor Networks COE 499 Energy Aware Routing
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Chinh T. Vu, Yingshu Li Computer Science Department Georgia State University IEEE percom 2009 Delaunay-triangulation based complete coverage in wireless.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
1/8/2016 Wireless Sensor Networks COE 499 Sleep-based Topology Control I Tarek Sheltami KFUPM CCSE COE
1/29/2016 Mobile Ad hoc Network COE 549 Deployment of Ad hoc Sensor Networks Tarek Sheltami KFUPM CCSE COE
Massively Distributed Database Systems In-Network Query Processing (Ad-Hoc Sensor Network) Fall 2015 Ki-Joune Li Pusan.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California,
Distributed Topology Control In Wireless Sensor Networks with Assymetric Links Presenter: Himali Saxena.
Distributed Algorithms for Dynamic Coverage in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
1 Giuseppe Romeo Voronoi based Source Detection. 2 Voronoi cell The Voronoi tessellation is constructed as follows: for each data point  i (also called.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Coverage and Deployment 1. Coverage Problems Coverage: is a measure of the Quality of Service (QoS) of a sensor network How well can the network observe.
Prof. Yu-Chee Tseng Department of Computer Science
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
Surviving Holes and Barriers in Geographic Data Reporting for
Haim Kaplan and Uri Zwick
Localizing the Delaunay Triangulation and its Parallel Implementation
Topology Control and Its Effects in Wireless Networks
Introduction Wireless Ad-Hoc Network
Presentation transcript:

4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE 1

2 Outline Connectivity using power control COMPOW CBTC Coverage metrics K-coverage Path observation 4/29/2015

3 Connectivity using Power Control Once the nodes are in place transmission power settings can be used to adjust the connectivity properties of the deployed network It can extend the communication range, increasing the number of communicating neighboring nodes and improving connectivity in the form of availability of end-to-end paths. For existing neighbors, it can improve link quality (in the absence of other interfering traffic It can induce additional interference that reduces capacity and introduces congestion Some of these distributed algorithms aim to develop topologies that minimize total power consumption over routing paths, while others aim to minimize transmission power settings of each node while ensuring connectivity

4/29/20154 Common Power Protocol The authors claim that the protocol ensures that the lowest common power level that ensures maximum network connectivity Protocol Description First multiple shortest path algorithms are performed, one at each possible power level Each node then examines the routing tables generated by the algorithm and picks the lowest power level such that the number of reachable nodes is the same as the number of nodes reachable with the maximum power level Drawbacks 1.It is not very scalable 2.By strictly enforcing common powers, it is possible that a single relatively isolated node can cause all nodes in the network to have unnecessarily large power levels

4/29/20155 Cone-Based Topology Control Protocol The authors claim that the protocol provides a minimal direction- based distributed rule to ensure that the whole network topology is connected, while keeping the power usage of each node as small as possible. Protocol Description Each node keeps increasing its transmit power until it has at least one neighboring node in every cone or it reaches its maximum transmission power limit It is assumed here that the communication range increases monotonically with transmit power CBTC showed that suffices to ensure that the network is connected A tighter result has shown that can further reduced to

4/29/20156 Cone-Based Topology Control Protocol Illustration of the cone-based topology control (CBTC) construction On the left an intermediate power level for a node at which there exists an cone in which the node does not have a neighbor. Therefore, as seen on the right, the node must increase its power until at least one neighbor is present in every.

4/29/20157 Coverage Metrics The choice of coverage metric is highly dependent on the application In most networks the objective is simply to ensure that there exists a path between every pair of nodes If robustness is a concern, the K-connectivity metric may be used

4/29/20158 K-Coverage A field is said to be K-covered if every point in the field is within the overlapping coverage region of at least K sensors. Only 2D coverage is considered in our course In an s×s unit area, with a grid of resolution unit distance, there will be such points to examine, which can be computationally intensive

4/29/20159 K-Coverage.. A slightly more sophisticated approach would attempt to enumerate all subregions resulting from the intersection of different sensor node-regions and verify if each of these is K-covered In the worst case there can be O(n 2 ) such regions and they are not straightforward to compute

4/29/ K-Coverage.. An area with 2-coverage (note that all intersection points are 2-covered)

4/29/ K-Coverage..

4/29/ Voronoi Diagrams  Let S be a set of points in Euclidean space with no accumulation points. For almost any point x in the Euclidean space, there is one point of S closest to x. The word "almost" is used to indicate exceptions where a point x may be equally close to two or more points of S  If S contains only two points, a and b, then the set of all points equidistant from a and b is a hyperplane—an affine subspace of codimension 1. That hyperplane is the boundary between the set of all points closer to a than to b, and the set of all points closer to b than to a  In general, the set of all points closer to a point c of S than to any other point of S is the interior of a convex polytope called the Voronoi cell for c. The set of such polytopes tessellates the whole space, and is the Voronoi tessellation corresponding to the set S. If the dimension of the space is only 2, then it is easy to draw pictures of Voronoi tessellations, and in that case they are sometimes called Voronoi diagrams

4/29/ Voronoi Diagrams..

4/29/ Path Observation This class of coverage metrics to track targets or moving objects in sensor field Maximal Breach Distance (Voronoi Tessellation)  Given a field A instrumented with sensors S where for each sensor s i ∈ S, the location (x i,y i ) is known; areas I and F corresponding to initial (I) and final (F) locations of an agent  Identify P B, the Maximal Breach Path in S, starting in I and ending in F  P B in this case is defined as a path through the field A, with end-points I and F and with the property that for any point p on the path P B, the distance from p to the closest sensor is maximized  The regions I and F are arbitrary regions determined by the task at hand and may be located anywhere inside or outside the sensor field.

4/29/ Path Observation Maximal Support Distance (Delaunay Triangulation)  Unlike the maximal breach distance, which tries to determine the worst case observability of a traversal by a moving object  Aims to provide a best-case coverage metric for moving objects  Delaunay Triangulation for a set P of points in the plane is a triangulation DT(P) such that no point in P is inside the circumcircle of any triangle in DT(P).

4/29/ Path Observation  The maximal support path is the one where the moving node can stay as close as possible to sensor nodes during its traversal of the covered area  Given a field A instrumented with sensors S where for each sensor s i ∈ S, the location (x i,y i ) is known; areas I and F corresponding to initial (I) and final (F) locations of an agent  Identify P S, the path of Maximal support in S, starting in I and ending in F  P S in this case is defined as a path through the field A, with end- points I and F and with the property that for any point p on the path P S, the distance from p to the closest sensor is minimized

4/29/ Path Observation.. (a) maximal breach path through Voronoi cell edges (b) minimal support path through Delaunay triangulation edges