National Taiwan University Department of Computer Science and Information Engineering The Broadcast Function in Wireless Ad-Hoc Network 2002.9.2 Speaker:peter.

Slides:



Advertisements
Similar presentations
Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Advertisements

Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Introduction to Ultra WideBand Systems
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
1 Ultrawideband Contents Introduction Why Ultrawideband UWB Specifications Why is UWB unique Data Rates over range How it works UWB Characteristics Advantages.
Mac Support for Broadcast-based Ad hoc Forwarding Scheme Ashikur Rahman and Pawel Gburzynski Department of Computing Science University of Alberta
1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU)
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
Tiny Ad hoc Routing Protocol (TARP) Ashikur Rahman and Pawel Gburzynski Department of Computing Science University of Alberta
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Mac Support for Broadcast-based Ad hoc Forwarding Scheme Ashikur Rahman and Pawel Gburzynski Department of Computing Science University of Alberta
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Mac Support for Broadcast-based Ad hoc Forwarding Scheme Ashikur Rahman and Pawel Gburzynski Department of Computing Science University of Alberta
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Ad Hoc Wireless Routing COS 461: Computer Networks
Efficient and Reliable Broadcast in ZigBee Networks Purdue University, Mitsubishi Electric Lab. To appear in SECON 2005.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Performance Evaluation of Coded UWB-IR on Multipath Fading Channels
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Presented by Fei Huang Virginia Tech April 4, 2007.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Wireless Sensor Networks COE 499 Energy Aware Routing
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Connected Dominating Sets. Motivation for Constructing CDS.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
© Yamacraw, 2001 Selecting Forwarding neighbors in Wireless Ad Hoc Networks A. Zelikovsky GSU G. Calinescun, Illinois IT I. Mandoiu,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
1 G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science and.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Backbone Topology Synthesis for Multi- Radio Meshed Wireless LANs Huei-jiun Ju and Izhak Rubin University of California, Los angeles(UCLA) Keon Jang, SA.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
On Reducing Broadcast Transmission Cost and Redundancy in Ad Hoc Wireless Networks Using Directional Antennas Minglu Li ( Department of Computer Science.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
On Mitigating the Broadcast Storm Problem with Directional Antennas Sheng-Shih Wang July 14, 2003 Chunyu Hu, Yifei Hong, and Jennifer Hou Dept. of Electrical.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Reliable Mobicast via Face- Aware Routing Qingfeng Huang,Chenyang Lu and Gruia-Catalin Roman Department of Computer Science and Engineering Washington.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Outline What is Wireless LAN Wireless Transmission Types
Ultra-Wideband - John Burnette -.
Ultrawideband Contents
Hidden Terminal Decoding and Mesh Network Capacity
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Introduction Wireless Ad-Hoc Network
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Presentation transcript:

National Taiwan University Department of Computer Science and Information Engineering The Broadcast Function in Wireless Ad-Hoc Network Speaker:peter

National Taiwan University Department of Computer Science and Information Engineering Outline  An overview of the broadcast function  Difference between wired and wireless networks  The essence of broadcast problem  Categorization of present protocols  Ultra WideBand technology  Broadcast protocol for Ultra WideBand ?

National Taiwan University Department of Computer Science and Information Engineering Broadcast  Function: paging a particular host sending an alarm signal finding a route to a particular host  Two type: Be notified -> topology change Be shortest -> finding route  Objective: Reliability (all nodes have received the broadcast packet) Optimization

National Taiwan University Department of Computer Science and Information Engineering The difference of two type source Be notifiedBe shortest 5 forwarding nodes 4 hop time source 6 forwarding nodes 3 hop time

National Taiwan University Department of Computer Science and Information Engineering Difference between wired and wireless networks  Broadcast property  Reliability: CSMA/CD vs. CSMA/CA RTS/CTS/data/ACK procedure is too cumbersome to implement for broadcast Simultaneous transmission and hidden node problem  Expensive bandwidth  Therefore the flooding which is the simple broadcast mechanism in wired networks is not suitable in wireless networks (broadcast storm problem)

National Taiwan University Department of Computer Science and Information Engineering Broadcast Storm  Many retransmissions are redundant Because radio propagation is omnidirectional and a physical location may be covered by the transmission ranges of several nodes  Heavy contention could exist Because retransmitting nodes are probably close to each other  Collisions are more likely to occur Because the RTS/CTS dialogue is inapplicable and the timing of retransmissions is highly correlated

National Taiwan University Department of Computer Science and Information Engineering The essence of broadcast problem  Reliability Reliable MAC negotiation Collision avoidance  Reduce redundant rebroadcasts  Avoid Simultaneous transmission  Optimization Minimize the forwarding nodes Minimize the power consumption

National Taiwan University Department of Computer Science and Information Engineering Reliable MAC negotiation  Extend RTS/CTS for broadcast Waiting for all neighbors to be ready  RTS collision ?  Forwarding ? Sending broadcast packets anyway  Affect other transmission Repeatedly broadcast until all neighbor received  Acknowledgement A The neighborhood state of mobile nodes is under control by RTS/CTS

National Taiwan University Department of Computer Science and Information Engineering Collision avoidance  Reduce redundant rebroadcasts (minimize forwarding nodes) Be shortest  minimum forwarding set Be notified  minimum broadcasting set  Avoid Simultaneous transmission Different timing of rebroadcasts

National Taiwan University Department of Computer Science and Information Engineering Minimum Forwarding Set Problem  Define: Given a source A let D and P be the sets of k and k+1 hop neighbors of A Find a minimum-size subset F of D such that every node in P is within the coverage area of at least one node from F  In general graph: NP-complete: reduce “ Set Cover ” to it Approximation ratio: logn  In unit disk graph: Unknown Approximation ratio: constant (by reference [1])

National Taiwan University Department of Computer Science and Information Engineering Minimum Broadcasting Set Problem  Define: Given a source A Find a spanning tree T such that the number of internal nodes is minimum  In general graph: NP-hard: hard to “ Minimum Connected Dominating Set ” Approximation ratio: log ( is the maximum node degree)  In unit disk graph: NP-hard Approximation ratio: constant (by reference [2])

National Taiwan University Department of Computer Science and Information Engineering Optimization  Minimize the power consumption (Minimum-Energy Broadcast Tree Problem)  Define: Given a wireless ad hoc network M = (N,L) A source node s to broadcast a message from s to all the other nodes such that the sum of transmission powers at all nodes is minimized  Same as the Steiner Tree problem in directed graph: NP-complete: reduce “ 3-CNF SAT ” to it Approximation ratio: n

National Taiwan University Department of Computer Science and Information Engineering Categorization of present protocols  Simple flooding  Area based method (by reference [3]) Counter based scheme Distance based scheme Location based scheme  Neighbor knowledge method Neighborhood base Set cover base MCDS base

National Taiwan University Department of Computer Science and Information Engineering Flooding  Each node forwarding the broadcasting packets exactly one time Using Process ID

National Taiwan University Department of Computer Science and Information Engineering Area Based Method 1

National Taiwan University Department of Computer Science and Information Engineering Area Based Method 2  Maximum additional coverage of previous transmission:  Average additional coverage: ≈ 0.41  r 2  Average additional coverage after having received a broadcast message twice: ≈ 0.19  r 2

National Taiwan University Department of Computer Science and Information Engineering Area Based Method 3 The expected additional coverage after hearing the message k times, is expected to decrease quickly as k increases.

National Taiwan University Department of Computer Science and Information Engineering Area Based Method 4  Counter based scheme: Using “ Random Assessment Delay ” (RAD) The counter is incremented by one for each redundant packet received If the counter is less than a threshold value when the RAD expires, the packet is rebroadcast. Otherwise, it is simply dropped

National Taiwan University Department of Computer Science and Information Engineering Area Based Method 5  Distance based scheme: Using “ Random Assessment Delay ” (RAD) Estimating the distance d between sender and receiver by signal strength Calculate the additional coverage by d (additional coverage = ) If the additional coverage which is calculated by the minimum distance is more than a threshold value when the RAD expires, the packet is rebroadcast. Otherwise, it is simply dropped

National Taiwan University Department of Computer Science and Information Engineering Area Based Method 6  Location based scheme: Using “ Random Assessment Delay ” (RAD) Adding location information to the header of the broadcast packets Calculate the additional coverage by k location information which are received during RAD  Difficult to calculate exactly  Using grid-filling approximation If the additional coverage is more than a threshold value, the packet is rebroadcast. Otherwise, it is simply dropped

National Taiwan University Department of Computer Science and Information Engineering Neighbor Knowledge Method  Neighborhood information  How to decision forwarding nodes Neighborhood base  SBA, Self pruning Set cover base  Multipoint relaying, Dominant pruning, AHBP MCDS base

National Taiwan University Department of Computer Science and Information Engineering Scalable Broadcast Algorithm (SBA)  Information: Hello message (2-hop)  Forwarding node decision: Node v j who receives the packet from v i checks whether the set N(v j )-N(v i )-{v i } is empty Node v j schedules the packet for delivery with a RAD (Random Assessment Delay) Dynamically adjust the RAD to (nodes with the most neighbors usually broadcast before the others)

National Taiwan University Department of Computer Science and Information Engineering Self pruning  Information: Hello message (1-hop) Piggyback adjacent node list in broadcast packets (2-hop) Store adjacent node list in cache  Forwarding node decision: Node v j who receives the packet from v i checks whether the set N(v j )-N(v i )-{v i } is empty vivi vjvj

National Taiwan University Department of Computer Science and Information Engineering Multipoint relaying  Information: Hello message (2-hop)  Forwarding node decision: The sending node A selects forwarding nodes from it ’ s adjacent nodes A select a minimum node set F  N(A) such that: A node set U = N(N(A)) – N(A) Piggyback forward list in “ Hello ” packets

National Taiwan University Department of Computer Science and Information Engineering Dominant pruning  Information: Hello message (2-hop)  Forwarding node decision: The sending node selects forwarding nodes from it ’ s adjacent nodes Node v j who receives the packet from v i, v j select a minimum node set F  N(v j ) - N(v i ) such that: A node set U = N(N(v j )) – N(v i ) – N(v j ) Piggyback forward list in broadcast packets

National Taiwan University Department of Computer Science and Information Engineering Dominant pruning vivi vjvj N(N(v j )) B(v i,v j ) U N(v i ) N(v j )

National Taiwan University Department of Computer Science and Information Engineering The drawback of present set cover based protocols 1 … i-1 i i+1 i+2 v i-1 vivi s When a node v i received the broadcast packet from node v i-1, it will select some forwarding nodes from N(v i )-N(v i-1 ) to cover all nodes in U. However, some nodes in U are not i+2 level nodes, and some nodes in N(v i )-N(v j ) are not i+1 level nodes.

National Taiwan University Department of Computer Science and Information Engineering The drawback of present set cover based protocols 2 … i-1 i i+1 i+2 v i-1 v i1 s When we will select some level i+1 nodes to cover all level i+2 nodes, the number of forwarding nodes selected by distributed algorithm can not be bounded to some ratio of the optimal solution ? v i2

National Taiwan University Department of Computer Science and Information Engineering Forwarding Set Problem in unit disk graph Q1Q1 Q2Q2 Q3Q3 Q4Q4 F i is the output of the -approximation algorithm which select some nodes in blue area to cover all nodes in Q i OPT i is the optimal solution of Forwarding Set problem and lie on A i A1A1 A2A2 A3A3 A4A4

National Taiwan University Department of Computer Science and Information Engineering MCDS based algorithm  Approximation Algorithm: Definition: A piece is defined as a white node or a black connected component Initialize: all nodes are white Procedure:  At each step we pick a node u that gives the maximum (non-zero) reduction in the number of pieces.  coloring u black and coloring all adjacent white nodes gray.  Recursively connect pairs of black components by choosing a chain of two vertices. Approximation ratio: 3+log (reference [4])

National Taiwan University Department of Computer Science and Information Engineering MCDS based algorithm in unit disk graph 1  Idea: Any MIS (maximal independent set) is also a DS, and conversely, any independent DS must be an MIS The size of any MIS in a unit disk graph is at most four times of the size of the MCDS The shortest distance between a node in MIS and it ’ s nearest node in MIS is at most three  Algorithm: Find any MIS Spanning all nodes in MIS  Approximation ratio: 12 (reference [2])

National Taiwan University Department of Computer Science and Information Engineering MCDS based algorithm in unit disk graph 2  Lemma: The size of any MIS in a unit disk graph is at most four times of the size of the MCDS  proof: U is any MIS, T is a spanning tree of MCDS v 1,v 2, …,v |T| be an arbitrary preorder traversal of T U i is the set of nodes in U that are adjacent to v i but none of v 1, v 2, …,v i-1 Then U 1,U 2, …,U |T| form a partition of U |U 1 |5, |U i |4, 2i|T|

National Taiwan University Department of Computer Science and Information Engineering MCDS based algorithm in unit disk graph 3 A node is adjacent to at most five independent nodes in unit disk graph at most 240  vivi vjvj j=1~i-1 U i lie in a sector of at most 240 degree within the coverage range of node v i, this implies that |U i |4

National Taiwan University Department of Computer Science and Information Engineering Comparison 350x350 r:100

Ultra WideBand Technology (UWB) By Chiang Jui-Hao

What is Ultra Wideband? Originally referred to “baseband”, “carrier-free”, or impulse Any wireless transmission scheme occupies a bandwidth of more than 25% of a center frequency, or more than 1.5GHz

Compare with narrowband and wideband UWB systems have two characteristics Bandwidth is much greater, Defined by the Federal Communications Commission (FCC), is more than 25% of a center frequency or more than 1.5GHz Carrierless fashion “narrowband” and “wideband” use RF UWB directly modulate an "impulse" that has a very sharp rise and fall time

UWB in Short Range Wireless Spatial capacity : (bps/m 2 ) higher bit rates concentrated in smaller areas For users gather in crowded spaces, the most critical parameter of a wireless system will be its spatial capacity [1]

Compare with IEEE and Bluetooth (cont.) UWB have greater spatial capacity From the Hartley- Shannon law Potential for support of future high-capacity wireless systems

Notice of Proposed Rule Making In May of 2000, the FCC issued a Notice of Proposed Rule Making (NPRM) limit UWB transmitted power spectral density for frequencies greater than 2GHz.

Ultra-Wideband transceiver Advantages: UWB is a “carrierless” system,thus we can remove traditional blocks such as carrier recovery loop,mixer…etc. High data rate and number of users. Robustness to multi-path fading. [3]

UWB Advantages Extremely difficult to intercept Short pulse excitation generates wideband spectra – low energy densities Low energy density also minimizes interference to other services Multipath immunity Time-gated detector can excise delayed returns - time separation

UWB Advantages (cont.) Commonality of signal generation and processing architectures Communications LPI/D, High Data Rates, Multipath Tolerance Radar Inherent high precision – sub-centimeter ranging Wideband excitation for detection of complex, low RCS targets Low cost Nearly “all-digital” architecture Ideal for microminiaturization into a chipset Frequency diversity with minimal hardware modifications

UWB Signal in multi-path fading channel Multi-path fading results from the destructive interference caused by the sum of several received paths that may be out of phase with each other.The very narrow pulses of UWB waveforms result in the multiple reflections being resolved independently rather than combining destructively. [4]

UWB Applications

UWB operation and technology Imaging Systems Ground Penetrating Radar Systems Wall Imaging Systems Through-wall Imaging Systems Medical Systems Surveillance Systems Vehicular Radar Systems Communications and Measurement Systems