CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.

Slides:



Advertisements
Similar presentations
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Chapter 15 Basic Asynchronous Network Algorithms
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Dynamic Wavelength Allocation in All-optical Ring Networks Ori Gerstel and Shay Kutten Proceedings of ICC'97.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Fall 2011 Prof. Jennifer Welch CSCE 668 Self Stabilization 1.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 668Set 5: Synchronous LE in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
1 Complexity of Network Synchronization Raeda Naamnieh.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
CPSC 668Set 12: Causality1 CPSC 668 Distributed Algorithms and Systems Fall 2009 Prof. Jennifer Welch.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
CPSC 668Set 10: Consensus with Byzantine Failures1 CPSC 668 Distributed Algorithms and Systems Fall 2006 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 668Self Stabilization1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 668Set 15: Broadcast1 CPSC 668 Distributed Algorithms and Systems Fall 2006 Prof. Jennifer Welch.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Analysis of Link Reversal Routing Algorithms Srikanta Tirthapura (Iowa State University) and Costas Busch (Renssaeler Polytechnic Institute)
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
Networks for Distributed Systems n network types n Connection-oriented and connectionless communication n switching technologies l circuit l packet.
DISTRIBUTED TOKEN CIRCULATION ON MOBILE AD HOC NETWORKS.
Mobile Routing protocols MANET
1 A Mutual Exclusion Algorithm for Ad Hoc Mobile networks Presentation by Sanjeev Verma For COEN th Nov, 2003 J. E. Walter, J. L. Welch and N. Vaidya.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
The Destination Sequenced Distance Vector (DSDV) protocol
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Fall 2011 Prof. Jennifer Welch CSCE 668 Set 5: Synchronous LE in Rings 1.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Self-stabilizing energy-efficient multicast for MANETs.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch CSCE 668 Set 3: Leader Election in Rings 1.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
William Stallings Data and Computer Communications
A comparison of Ad-Hoc Routing Protocols
Analysis of Link Reversal Routing Algorithms
Mobile and Wireless Networking
Presentation transcript:

CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch

Discrete Algs for Mobile Wireless Sys2 Lecture 28  Topic: Token Circulation  Sources: Malpani, Chen, Vaidya, & Welch MIT Fall 2008 slides

Discrete Algs for Mobile Wireless Sys3 Token Circulation  Circulate a token through all the nodes of a mobile ad hoc network  Application: ensure totally ordered broadcast in a group communication service

Discrete Algs for Mobile Wireless Sys4 Group Communication  Maintain information about group membership (which nodes are in which group)  Allowing nodes within a group to communicate usually multicast with some ordering properties, notably total order  Originally developed for wired networks

Discrete Algs for Mobile Wireless Sys5 Achieving Total Order  Circulate a token through all the nodes in the network along a virtual ring token carries a sequence number  when token visits a node that wants to bcast a message, it increments the sequence number in the token and tags its message with that sequence number  Unique sequence numbers are used to sort out the proper ordering Or: token carries the messages themselves  append new message to the end of the list  deliver messages in order they appear in the token

Discrete Algs for Mobile Wireless Sys6 Getting a Virtual Ring  How to find an efficient embedding of a ring in an arbitrary network, especially one that changes dynamically?  In fact, what does "efficient" mean? What should be measured?

Discrete Algs for Mobile Wireless Sys7 Performance Measures  Distinguish between the token being routed to a node (message is received and forwarded w/o the node "using" the token) and the token visiting a node (node "uses" the token)  Round: minimal length execution fragment in which the token visits each node at least once  Performance measures: round length: number of node visits in a round message overhead: number of bytes sent per round time overhead: time required to complete a round

Discrete Algs for Mobile Wireless Sys8 Bad Virtual Ring  Use visit order 1, 2, 3, 4, 5, 6, 1, 2, 3, … in the following physical network:  Msgs are routed as 1, 3, 5, 2, 5, 3, 1, 4, 6, 2, 5, 2, 6, …  Better order for virtual ring: 1, 3, 5, 2, 6, 4, 1, …

Discrete Algs for Mobile Wireless Sys9 Lesson  Take network topology into account when determining visit order  But global knowledge is expensive to achieve, and needs constant updating  Instead, have token make decision dynamically, based only on local information, as to where to travel next  Assume nodes know who their neighbors are (e.g., "hello" protocol)

Discrete Algs for Mobile Wireless Sys10 Algorithm Classification  Global ("G") vs. Local ("L"): local: token is forwarded to a neighbor global: token is forwarded to any node in the network  Recency ("R") vs. Frequency ("F"): next recipient is decided based on how recently nodes have had the token next recipient is decided based on how frequently nodes have had the token  For global algorithms, whether or not token visits nodes through which the token is routed on its way to current destination (denoted "N" if so)

Discrete Algs for Mobile Wireless Sys11 Algorithm Schema  Token carries some information for each node in the network (either recency or frequency info)  When a node receives the token, it chooses next recipient using the info in the token, updates info appropriately, and forwards token to appropriate neighbor

Discrete Algs for Mobile Wireless Sys12 Algorithm LF (Local-Frequency)  Claim: In a static connected graph, LF ensures that every node is visited infinitely often.  Proof: Suppose not. Let S be the set of starved nodes (visited finitely often). Then there exists a node x that is visited i.o. but has at least one neighbor in S. Eventually, after all of x's neighbors in S have visited for the last time, the frequency count for some y in S will be the smallest among all of x's neighbors, and the token will be forwarded to y. Contradiction.

Discrete Algs for Mobile Wireless Sys13 Algorithm LF  Claim: Round length of LF is unbounded.  Length of even rounds: 6, 12, 20, 48, 96, …  Length of odd rounds: 6, 7, 19, 43, 91, …

Discrete Algs for Mobile Wireless Sys14 Algorithm LR  Claim: In a static connected graph, LR ensures that every node is visited i.o.  Proof is same as for LF.  What about round length? In a static graph, one can traverse a spanning tree to get a round length of 2n LR tries to improve by avoiding backtracking Simulation results often achieves round length of n But there exist graphs on which round length is exponential

Discrete Algs for Mobile Wireless Sys15 Algorithms GR and GF  Initially, when all nodes have been visited least recently/frequently, ties need to be broken somehow (say, by ID).  GR subsequently has no ties; for GF, break ties somehow (say, by ID)  Round length is obviously n. remember, we are just counting number of node visits in the round length message and time overhead take into account the relaying that may be necessary

Discrete Algs for Mobile Wireless Sys16 Algorithms GFN and GRN  For G*N, first determine node (in entire network) with smallest frequency/recency count  Then forward token to neighbor on route toward that node; token is to visit that neighbor  GFN performed very poorly in simulations some node x is visited very often, racking up a large frequency count, causing subsequent rounds to be very long

Discrete Algs for Mobile Wireless Sys17 Bonus Algorithm  The best path for the token would be a Hamiltonian path of the network path in the network that includes every node exactly once => round length n not every graph has one determining if a graph has one is NP-complete  Algorithm Iterative Search ("IS") uses heuristics to try to find an HP.  Simulation results: worked well if nodes have exact neighbor knowledge othewise not so good

Discrete Algs for Mobile Wireless Sys18 Simulations  Performance measures: Round length Round time Message overhead  Random networks with 20 nodes MAC layer: Routing: DSR Network layer: TCP (to avoid token loss)

Simulation: Static Network LF GRN LR, GF, GR

Simulation: Dynamic Network GR LF,LR,GF,GRN LR Round timeRound length

Discrete Algs for Mobile Wireless Sys21 Worst-Case Analysis of LR  In simulation: average round length ~n  Matching worst-case upper bound?  Unfortunately, no Exponential upper bound: O(n  D ),  is max degree, D is diameter Exponential lower bound:  (n3 (7/27)n+5 ) (confusing typo in paper)

Discrete Algs for Mobile Wireless Sys22 LR Worst-Case Upper-Bound  We want to bound the number of nodes visited in a round  p is visited only once.  What about p ’s neighbors? p Last node p not visited

Discrete Algs for Mobile Wireless Sys23 LR Worst-Case Upper-Bound  Lemma: a.If node q is visited degree(q) + 1 times in an execution segment, then all of q ’s neighbors are visited in the segment. p p not visited No neighbor q of p visited more than degree(q) times

Discrete Algs for Mobile Wireless Sys24 LR Worst-Case Upper-Bound  Lemma: a.If node q is visited degree(q) + 1 times in an execution segment, then all of q ’s neighbors are visited in the segment.  Proof: qqqq … Execution segment: x1x1 x2x2 α1α1 x 1 is more recent than any neighbor that was not visited in α 1

Discrete Algs for Mobile Wireless Sys25 LR Worst-Case Upper-Bound  Lemma: a.If node q is visited degree(q) + 1 times in an execution segment, then all of q ’s neighbors are visited in the segment.  Proof: qqqq … Execution segment: x1x1 x2x2 α1α1 α2α2 x3x3 degree(q) + 1 visits x 1, x 2 are more recent than any neighbor that was not visited in α 1,α 2

Discrete Algs for Mobile Wireless Sys26 LR Worst-Case Upper-Bound  Lemma: b.If q is visited at most k times in an execution, then no neighbor q’ of q is visited more than (k+1) ·degree(q’) times in the execution. p p not visited No neighbor q of p visited more than degree(q) times Neighbors of neighbors of p ?

Discrete Algs for Mobile Wireless Sys27 LR Worst-Case Upper-Bound  Lemma: b.If q is visited at most k times in an execution, then no neighbor q’ of q is visited more than (k+1) ·degree(q’) times in the execution.  Proof: qqq … Execution segment: q ≤ k + 1 segments q is not visited ⇒ no neighbor q’ visited ≥ degree(q’) times Part (a)

Discrete Algs for Mobile Wireless Sys28 LR Worst-Case Upper-Bound  Lemma (b): if q is visited at most k times in an execution, then no neighbor q’ of q is visited more than (k+1) ·degree(q’) times in the execution.  Δ = maximum degree, D = diameter of the graph  N(A) = neighborhood of A p p not visited No neighbor q of p visited more than degree(q) times Neighbors of neighbors of p ? Nodes # visits p 1 N(p) ≤ Δ N(N(p)) ≤ Δ(Δ + 1) = Δ 2 + Δ … N D (p) ≤ Δ D +Δ D-1 +…+Δ

Discrete Algs for Mobile Wireless Sys29 LR Worst-Case Upper-Bound  Lemma (b): if q is visited at most k times in an execution, then no neighbor q’ of q is visited more than (k+1) ·degree(q’) times in the execution.  Δ = maximum degree, D = diameter of the graph  N(A) = neighborhood of A Nodes # visits p 1 N(p) ≤ Δ N(N(p)) ≤ Δ(Δ + 1) = Δ 2 + Δ … N D (p) ≤ Δ D +Δ D-1 +…+Δ Round length is bounded by 1 + |N(p)| · Δ + |N 2 (p)| · (Δ + Δ 2 ) + + … + |N D (p)| · (Δ D +Δ D-1 +…+Δ ) = = n · O( Δ D )