Ad-Hoc Networks Beyond Unit Disk Graphs

Slides:



Advertisements
Similar presentations
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
Distributed Computing Group Roger Wattenhofer Ad-Hoc and Sensor Networks Worst-Case vs. Average-Case IZS 2004.
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU)
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
A Unified Energy Efficient Topology for Unicast and Broadcast Xiang-Yang Li*, Wen-Zhang Song † and WeiZhao Wang* *Illinois Institute of Technology † Washington.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Geographic Gossip: Efficient Aggregations for Sensor Networks Author: Alex Dimakis, Anand Sarwate, Martin Wainwright University: UC Berkeley Venue: IPSN.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Geometric Routing without Geometry
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Ad Hoc and Sensor Networks – Roger Wattenhofer –2/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Geo-Routing Chapter 2 TexPoint fonts used in EMF. Read.
Distributed Computing Group Locality and the Hardness of Distributed Approximation Thomas Moscibroda Joint work with: Fabian Kuhn, Roger Wattenhofer.
Ad Hoc Networking Course Instructor: Carlos Pomalaza-Ráez Geographical Routing Using Partial Information for Wireless Ad Hoc Networks Rahul Jain, Anuj.
Topology Control Algorithms Davide Bilò
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
An Algorithmic Approach to Geographic Routing in Ad Hoc and Sensor Networks - IEEE/ACM Trans. on Networking, Vol 16, Number 1, February 2008 D
Improved Sparse Covers for Graphs Excluding a Fixed Minor Ryan LaFortune (RPI), Costas Busch (LSU), and Srikanta Tirthapura (ISU)
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Stefan Rührup 1 HEINZ NIXDORF INSTITUTE University of Paderborn, Germany Algorithms and Complexity Competitive Time and Traffic Analysis of Position-based.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Massively Distributed Database Systems In-Network Query Processing (Ad-Hoc Sensor Network) Fall 2015 Ki-Joune Li Pusan.
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
Does Topology Control Reduce Interference?
GPSR Greedy Perimeter Stateless Routing
Greedy Routing with Bounded Stretch
TexPoint fonts used in EMF.
Introduction Wireless Ad-Hoc Network
How to use spanning trees to navigate in Graphs
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Routing in Networks with Low Doubling Dimension
Presentation transcript:

Ad-Hoc Networks Beyond Unit Disk Graphs Fabian Kuhn Roger Wattenhofer Aaron Zollinger

Overview Introduction Flooding Greedy + Flooding Geometric Routing for Graph Models for Mobile Ad-Hoc Networks Quasi Unit Disk Graphs Related Work Volatile Memory Routing Flooding Lower Bound for Message Complexity Topology for Optimal Flooding Greedy + Flooding Volatile Memory Routing Algorithms Combining Greedy and Flooding Geometric Routing for How to obtain a planar graph Optimality of AFR/GOAFR DIALM-POMC 2003

Mobile Ad-Hoc Networks Mobile Devices communicating via radio Network without centralized control (base station) We consider the abstraction level of graphs DIALM-POMC 2003

Graph Models for Ad-Hoc Networks Simple Models Unit Disk Graph is most widely applied model: Underlying assumption: All nodes are in R2, have exactly the same transmission range (normalized to one), and there are no obstacles. Far from reality BUT: There are numerous theoretical results. Realistic Models We need more general graph models However, arbitrary graphs are too general to obtain strong results for routing, etc. We need something between UDG and arbitrary graphs: general enough to model reality as close as possible restrictive enough to allow useful theoretical results DIALM-POMC 2003

Quasi Unit Disk Graph Definition Unit Disk Graph: Edge between u and v if |u-v|·1 No edge between u and v if |u-v|>1 Definition Quasi Unit Disk Graph: Edge between u and v if |u-v|·d May have an edge if d<|u-v|<1 DIALM-POMC 2003

Related Work The Quasi Unit Disk Graph model is not new: Barrière, Fraigniaud, and Narayanan have shown that correct geometric routing is possible if . Dial-M 2001 and Wireless Networks Journal Vol. 3(2) 2003 Other generalizations of the unit disk graph have been proposed, e.g. (r,s)-civilized graphs by Krumke, Marathe, and Ravi Dial-M 1998 and Wireless Networks Journal Vol. 7(6) 2001 DIALM-POMC 2003

Volatile Memory Routing We want to consider routing without routing tables We need to allow nodes to temporarily store some information Volatile Memory Routing Algorithm: For each message, each node is allowed to temporarily store O(log n) bits. (temporary = while the message has not reached the destination) DIALM-POMC 2003

Overview Introduction Flooding Greedy + Flooding Geometric Routing for Graph Models for Mobile Ad-Hoc Networks Quasi Unit Disk Graphs Related Work Volatile Memory Routing Flooding Lower Bound for Message Complexity Topology for Optimal Flooding Greedy + Flooding Volatile Memory Routing Algorithms Combining Greedy and Flooding Geometric Routing for How to obtain a planar graph Optimality of AFR/GOAFR DIALM-POMC 2003

Message Complexity Lower Bound Lower Bound Graph is a Quasi Unit Disk Graph (parameter d) To find destination t, all vertical chains (all nodes) have to be visited Length of one chain: c Optimal path has length O(c) There are O(c2/d2) nodes ! O(c2/d2) messages DIALM-POMC 2003

Flooding Flooding on the Quasi UDG gives unbounded message complexity We need a subgraph on which flooding is efficient (a kind of topology control) Desired properties: Nodes form a dominating set O(A/d2) nodes per area A O(A/d2) edges per area A Optional: spanner DIALM-POMC 2003

Topology Control I Construct a Minimal Independent Set (MIS) ! dominating set and O(A/d2) nodes per area A If we make all 2- and 3-hop connections, we have a spanner, but too many nodes and edges Solution: Choose only a subset of the 2- and 3-hop connections (“virtual edges” of length · 3) DIALM-POMC 2003

Topology Control II Each “virtual edge” is completely covered Place grid over the nodes (cell size = 6) Add another grid shifted by (3,3) Add another grid shifted by (3,0) Add another grid shifted by (0,3) Each “virtual edge” is completely covered by a cell of at least one of the grids DIALM-POMC 2003

Topology Control III In each cell, we calculate a spanner of the nodes (MIS) and “virtual edges” lying completely inside the cell ! Applying a randomized construction of Linial and Saks (SODA 91) yields a O(log(1/d2))-spanner with O(1/d2) virtual edges. Combining all local spanners gives a O(log(1/d2))-spanner with O(A/d2) “virtual edges” per area A. ! Backbone Graph DIALM-POMC 2003

Flooding on the Backbone Graph Flooding/Echo with exponentially growing TTL on the Backbone Graph gives: O(log(1/d2)c) time and O(c2/d2) message complexity in the synchronous model O(log(1/d2)log3(c/d)c) time and O(log3(c/d)c2/d2) message complexity in the asynchronous model (using a synchronizer described by Awerbuch and Peleg, FOCS 90) Geometric Flooding/Echo uses disks with exponentially growing radius instead of TTL: O(c2/d2) time and message complexity (synchronous and asynchronous) DIALM-POMC 2003

Overview Introduction Flooding Greedy + Flooding Geometric Routing for Graph Models for Mobile Ad-Hoc Networks Quasi Unit Disk Graphs Related Work Volatile Memory Routing Flooding Lower Bound for Message Complexity Topology for Optimal Flooding Greedy + Flooding Geometric (Volatile Memory) Routing Algorithms Combining Greedy and Flooding Geometric Routing for How to obtain a planar graph Optimality of AFR/GOAFR DIALM-POMC 2003

Geometric Routing A.k.a. location-based, position-based, geographic, etc. Each node knows its own position and position of neighbors Source knows the position of the destination No routing tables in the nodes, all routing information is in the message! Volatile Geometric Routing: Geometric Routing + O(log n) bits per message in each node (while message is on the way from s to t) DIALM-POMC 2003

Geometric Routing ??? t s s DIALM-POMC 2003

Greedy Routing Each node forwards message to “best” neighbor t s DIALM-POMC 2003

? Greedy Routing Each node forwards message to “best” neighbor But greedy routing may fail: message may get stuck in a “dead end” Needed: Correct geometric routing algorithm t ? s DIALM-POMC 2003

Greedy + Flooding Straight-forward idea to make greedy routing correct (i.e. always find the destination) ! combine greedy and flooding We want to keep worst-case optimality Apply geometric flooding with exponentially increasing radius and the right criterion to fall back from flooding to greedy DIALM-POMC 2003

Greedy + Flooding, Fall Back Criterion Flooding phase with radii r0, r1, … where ri=r02i Flooding starts at node u, node vi is best (closest to destination t) node for radius ri Go back to greedy if |u-t| - |vi-t| ¸ q¢ri (q is a predefined constant) Message and time complexity: O(c2/d2) Simulations on UDG suggest that the algorithm is efficient in the average case DIALM-POMC 2003

Overview Introduction Flooding Greedy + Flooding Geometric Routing for Graph Models for Mobile Ad-Hoc Networks Quasi Unit Disk Graphs Related Work Volatile Memory Routing Flooding Lower Bound for Message Complexity Topology for Optimal Flooding Greedy + Flooding Geometric (Volatile Memory) Routing Algorithms Combining Greedy and Flooding Geometric Routing for How to obtain a planar graph Optimality of AFR/GOAFR DIALM-POMC 2003

??? Questions? Comments? DIALM-POMC 2003