XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks

Slides:



Advertisements
Similar presentations
Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks L. Li, J. Y. Halpern Cornell University P. Bahl, Y. M.
Advertisements

Interference and Topology Control Does Topology Control Reduce Interference ? Feb 15, 2010 University of Freiburg H. K. Al-Hasani Seminar Ad Hoc Netzwerke.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1st Meeting Industrial Geometry Computational Geometry ---- Some Basic Structures 1st IG-Meeting.
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger.
Distributed Computing Group Regina Bischoff (O’Dell) Connectivity-Based Multi-Hop Ad hoc Positioning.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Topology Control Murat Demirbas SUNY Buffalo Uses slides from Y.M. Wang and A. Arora.
A Unified Energy Efficient Topology for Unicast and Broadcast Xiang-Yang Li*, Wen-Zhang Song † and WeiZhao Wang* *Illinois Institute of Technology † Washington.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Distributed Computing Group Roger Wattenhofer Wireless Networking Graph Theory Unplugged WG 2004.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Geometric Routing without Geometry
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Wireless Networking Graph Theory Unplugged WG 2004
Maximal Cliques in UDG: Polynomial Approximation Rajarshi Gupta, Jean Walrand Dept of EECS, UC Berkeley Olivier Goldschmidt, OPNET Technologies International.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Topology Control Algorithms Davide Bilò
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Algorithms for Ad Hoc and Sensor Networks Roger Wattenhofer Herfstdagen, 2004.
Power Optimization for Connectivity Problems MohammadTaghi Hajiaghayi, Guy Kortsarz, Vahab S. Mirrokni, Zeev Nutov IPCO 2005.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Minimizing interference for the highway model in Wireless Ad-hoc and Sensor Networks Haisheng Tan, Tiancheng, Lou, Francis C.M. Lau, YuexuanWang, Shiteng.
An Algorithmic Approach to Geographic Routing in Ad Hoc and Sensor Networks - IEEE/ACM Trans. on Networking, Vol 16, Number 1, February 2008 D
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Overlay networks for wireless ad hoc networks Christian Scheideler Dept. of Computer Science Johns Hopkins University.
Coverage and Connectivity Issues in Sensor Networks
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Design and Analysis of an MST-Based Topology Control Algorithm Ning Li, Jennifer C. Hou, and Lui Sha Department of Computer Science University of Illinois.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
CS270 Project Overview Maximum Planar Subgraph Danyel Fisher Jason Hong Greg Lawrence Jimmy Lin.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Algorithms for Radio Networks Exercise 7 Stefan Rührup
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
Massively Distributed Database Systems In-Network Query Processing (Ad-Hoc Sensor Network) Fall 2015 Ki-Joune Li Pusan.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
L. Li, J. Y. Halpern Cornell University
Does Topology Control Reduce Interference?
Topology Control –power control
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
Leveraging Linial's Locality Limit
Greedy Routing with Bounded Stretch
Topology Control and Its Effects in Wireless Networks
Introduction Wireless Ad-Hoc Network
Presentation transcript:

XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks Roger Wattenhofer Aaron Zollinger

Overview What is Topology Control? Context – related work XTC algorithm XTC analysis Worst case Average case Conclusions WMAN 2004

Topology Control Sometimes also clustering, Dominating Set construction Not in this presentation Drop long-range neighbors: Reduces interference and energy! But still stay connected (or even spanner) WMAN 2004

Overview What is Topology Control? Context – related work XTC algorithm XTC analysis Worst case Average case Conclusions WMAN 2004

Context – Previous Work Mid-Eighties: randomly distributed nodes [Takagi & Kleinrock 1984, Hou & Li 1986] Second Wave: constructions from computational geometry, Delaunay Triangulation [Hu 1993], Minimum Spanning Tree [Ramanathan & Rosales-Hain INFOCOM 2000], Gabriel Graph [Rodoplu & Meng J.Sel.Ar.Com 1999] Cone-Based Topology Control [Wattenhofer et al. INFOCOM 2000]; explicitly prove several properties (energy spanner, sparse graph) Collecting more and more properties [Li et al. PODC 2001, Jia et al. SPAA 2003, Li et al. INFOCOM 2002] (e.g. local, planar, distance and energy spanner, constant node degree [Wang & Li DIALM-POMC 2003]) Only neighbor direction and relative distance But: exact node positions known WMAN 2004

K-Neigh (Blough, Leoncini, Resta, Santi @ MobiHoc 2003) “Connect to k closest neighbors!” Very simple algorithm. On average as good as others… Tough question: What should k be? [Thanks to P. Santi] WMAN 2004

Percolation Node density such that the graph is just about to become connected (about 5 nodes per unit disk). What’s the value for k at percolation?!? (Tough question?) too sparse critical density too dense WMAN 2004

K-Neigh and the Worst Case? What if the network looks like this: Does a typical/average network (or parts of an average network) really look like this? Probably not… but… Still, cool simulation and analysis results by Blough et al. For example: energy to compute K-Neigh topology is much smaller than CBTC topology (figure right) k+1 nodes k+1 nodes WMAN 2004

Overview What is Topology Control? Context – related work XTC algorithm XTC analysis Worst case Average case Conclusions WMAN 2004

XTC Algorithm D C G B A E F Each node produces “ranking” of neighbors. Examples Distance (closest) Energy (lowest) Link quality (best) Not necessarily depending on explicit positions Nodes exchange rankings with neighbors A 1. C 2. E 3. B 4. F 5. D 6. G E F WMAN 2004

XTC Algorithm (Part 2) D C G B A E F Each node locally goes through all neighbors in order of their ranking If the candidate (current neighbor) ranks any of your already processed neighbors higher than yourself, then you do not need to connect to the candidate. A 1. C 2. E 3. B 4. F 5. D 6. G E F 3. E 7. A WMAN 2004

Overview What is Topology Control? Context – related work XTC algorithm XTC analysis Worst case Average case Conclusions WMAN 2004

XTC Analysis (Part 1) Symmetry: A node u wants a node v as a neighbor if and only if v wants u. Proof: Assume 1) u  v and 2) u  v Assumption 2)  9w: (i) w Áv u and (ii) w Áu v Contradicts Assumption 1) WMAN 2004

XTC Analysis (Part 1) Symmetry: A node u wants a node v as a neighbor if and only if v wants u. Connectivity: If two nodes are connected originally, they will stay so (provided that rankings are based on symmetric link-weights). If the ranking is energy or link quality based, then XTC will choose a topology that routes around walls and obstacles. WMAN 2004

XTC Analysis (Part 2) If the given graph is a Unit Disk Graph (no obstacles, nodes homogeneous, but not necessarily uniformly distributed), then … The degree of each node is at most 6. The topology is planar. The graph is a subgraph of the RNG. Relative Neighborhood Graph RNG(V): An edge e = (u,v) is in the RNG(V) iff there is no node w with (u,w) < (u,v) and (v,w) < (u,v). u v WMAN 2004

XTC Average-Case Unit Disk Graph XTC WMAN 2004

XTC Average-Case (Degrees) u UDG max UDG avg GG max GG avg XTC max XTC avg WMAN 2004

XTC Average-Case (Stretch Factor) XTC vs. UDG – Euclidean GG vs. UDG – Euclidean XTC vs. UDG – Energy GG vs. UDG – Energy WMAN 2004

XTC Average-Case (Geometric Routing) connectivity rate worse GFG/GPSR on GG GOAFR+ on GXTC better GOAFR+ on GG WMAN 2004

No complex assumptions Conclusion Even with minimal assumptions, only neighbor ranking, it is possible to construct a topology with provable properties: Symmetry Connectivity Bounded degree Planarity Simple algorithm + XTC lends itself to practical implementation No complex assumptions WMAN 2004

Really?!? Topology Control Drop long-range neighbors: Reduces interference and energy! But still stay connected (or even spanner) Really?!? WMAN 2004

What Is Interference? Model We want to minimize maximum interference! Transmitting edge e = (u,v) disturbs all nodes in vicinity Interference of edge e = # Nodes covered by union of the two circles with center u and v, respectively, and radius |e| We want to minimize maximum interference! At the same time topology must be connected or a spanner etc. 8 WMAN 2004

Low Node Degree Topology Control? Most researchers argue that low node degree is sufficient for low interference! This is not true since you can construct very bad topologies with minimum node degree but huge interference! WMAN 2004

Let’s Study the Following Topology! …from a worst-case perspective. WMAN 2004

Topology Control Algorithms Produce… All known topology control algorithms (XTC too!) include the nearest neighbor forest as a subgraph, and produce something like this: The interference of this graph is (n)! WMAN 2004

But Interference… Interference does not need to be high… This topology has interference O(1)!! WMAN 2004

Interesting Research Question We have some preliminary results: There is no local algorithm that finds a good interference topology The optimal topology will not be planar, etc. LISE, LLISE algorithms [Burkhart, von Rickenbach, Wattenhofer, Z. @ MobiHoc 2004] WMAN 2004

Simulation UDG, I = 50 XTC, I = 25 LLISE2, I = 23 LLISE10, I = 12 20 Knoten pro Unit Disk 10 Units Seitenlänge RNG kein Spanner! LLISE2, I = 23 LLISE10, I = 12 WMAN 2004

No complex assumptions Conclusion Even with minimal assumptions, only neighbor ranking, it is possible to construct a topology with provable properties: Symmetry Connectivity Bounded degree Planarity Simple algorithm No complex assumptions XTC lends itself to practical implementation + But does Topology Control really reduce interference? WMAN 2004

Questions? Comments? Distributed Computing Group