Trajectory-Based Forwarding Mechanisms for Ad-Hoc Sensor Networks Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman Electrical, Computer, and Systems.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos.
ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Minimizing Multi-Hop Wireless Routing State under Application- based Accuracy Constraints Mustafa Kilavuz & Murat Yuksel University of Nevada, Reno.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
An Implementation Framework for Trajectory-Based Routing in Ad Hoc Networks Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman Electrical, Computer,
Optimal Communication Coverage for Free-Space-Optical MANET Building Blocks Murat Yuksel, Jayasri Akella, Shivkumar Kalyanaraman, Partha Dutta Electrical,
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Pricing Granularity for Congestion-Sensitive Pricing Murat Yüksel and Shivkumar Kalyanaraman Rensselaer Polytechnic Institute, Troy, NY {yuksem, shivkuma}
Reducing Congestion Effects in Wireless Networks by Multipath Routing Presented by Dian Zhang Lucian Popa, Costin Raiciu, University of California, Berkeley.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
Distributed-Dynamic Capacity Contracting: A congestion pricing framework for Diff-Serv Murat Yuksel and Shivkumar Kalyanaraman Rensselaer Polytechnic Institute,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Maximizing Path Durations in Mobile Ad- Hoc Networks Yijie Han and Richard J. La Department of ECE & ISR University of Maryland, College Park CISS, Princeton.
September 12, 2006IEEE PIMRC 2006, Helsinki, Finland1 On the Packet Header Size and Network State Tradeoff for Trajectory-Based Routing in Wireless Networks.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
1/30 Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Wireless and Sensor Network Seminar Dec 01, 2004.
EILEEN BALCI GPSR: Greedy Perimeter Stateless Routing for Wireless Networks.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
On Optimal Geographic Routing in Wireless Networks with Holes and Non-Uniform Traffic Sundar Subramanian, Sanjay Shakkottai and Piyush Gupta INFOCOM 2007.
Directional Routing for Wireless Mesh Networks: A Performance Evaluation Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Fundamentals of Computer Networks ECE 478/578
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
An Implementation Framework for Trajectory-Based Routing in Ad-Hoc Networks Murat Yuksel, Ritesh Pradhan and Shivkumar Kalyanaraman Rensselaer Polytechnic.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Nov. 29, 2006GLOBECOM /17 A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
GPSR Greedy Perimeter Stateless Routing
Surviving Holes and Barriers in Geographic Data Reporting for
A comparison of Ad-Hoc Routing Protocols
Overview of Unicast Routing Protocols for Multihop Wireless Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Intradomain Routing Outline Introduction to Routing
Presentation transcript:

Trajectory-Based Forwarding Mechanisms for Ad-Hoc Sensor Networks Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman Electrical, Computer, and Systems Engineering Department Rensselaer Polytechnic Institute, Troy, NY

Rensselaer Polytechnic Institute, Troy, NY2 Outline Motivation Overview of Trajectory-Based Routing (TBR) Bezier curves for TBR Forwarding algorithms for TBR Long trajectories Simulation results Future work

Rensselaer Polytechnic Institute, Troy, NY3 Motivation There may be several cases where shortest- path routing is not suitable for the application: To measure some parameters for a river To obtain terrain knowledge of a hostile area To use safer locations for important data transmissions Such application-specific requirements are particularly important for sensor networks

Rensselaer Polytechnic Institute, Troy, NY4 Motivation (cont’d) Example: Consider a battlefield with east-side of mountains being friendly area. Application can request to: obtain view of “west-side of the mountains” transmit secure information to allied soldiers through “east-side of the mountains”

Rensselaer Polytechnic Institute, Troy, NY5 Overview of TBR Source Routing (SR) Source inserts entire route into each packet, e.g. SBR, DSR. Very flexible for applications, but causes too large packet headers. Greedy Routing (GR) Assuming a positioning service, each packet is forwarded to the neighbor closest to the destination, e.g. GPSR, CR. Fixed-size, short packet headers, but not flexible for applications. Trajectory-Based Routing (TBR) Proposed by Nath and Niculescu from Rutgers University. Represents the whole path as a parametric curve and encodes it into each packet. Geographic routing protocol, and requires positioning service.

Rensselaer Polytechnic Institute, Troy, NY6 Overview of TBR (cont’d) What happens when a packet travels in the network? Source encodes the trajectory into the packet’s header. All nodes forward the packet based on a predefined forwarding strategy. After packet arrival, the intermediate nodes decode the trajectory and forwards the packet along the trajectory. The packet gets forwarded until it reaches the destination or is dropped. TBR is a middle-ground between SR and GR. Since a parametric curve can form any path (e.g. circle, straight line, oscillatory lines), it gives more flexibility to define the path. – similar to SR Since nodes decode the trajectory, i.e. stateless – similar to GR One important issue is “how should we encode the trajectory into packets’ headers”?

Rensselaer Polytechnic Institute, Troy, NY7 source destination Control pt -2 Control pt -1 Bezier Curves for TBR We propose to encode paths by using Bezier curves. Cubic Bezier curves (2 control pts + source + destination) are easy to handle. A Cubic Bezier curve is represented in parametric form: Q(0) is the source point, and Q(1) is the destination point.

Rensselaer Polytechnic Institute, Troy, NY8 Bezier Curves for TBR (cont’d) If (x 0,y 0 ), (x 1,y 1 ), (x 2,y 2 ) and (x 3,y 3 ) are known, then the constant vectors A, B & C can be calculated as: Each packet header contains locations of source (x 0,y 0 ), destination (x 3,y 3 ) and control points (x 1,y 1 ), (x 2,y 2 ). So, when a packet arrives, each node: Decodes the trajectory by performing the above calculations Figures out which neighbor to forward the packet, based on forwarding strategy.

Rensselaer Polytechnic Institute, Troy, NY9 Forwarding Algorithms for TBR Terminology: d i = closest distance of node N i to the trajectory curve t i = value of the time parameter at the point where node N i is closest to the curve – residual of node N i The residual t i of node N i can also be interpreted as projection of the node on the curve. neighbor of N i = set of nodes that are in transmission range of N i and have a residual greater than t i.

Rensselaer Polytechnic Institute, Troy, NY10 Forwarding Algorithms for TBR (cont’d) Closest-To- Curve (CTC) - node forwards to its neighbor closest to the curve. Least Advancement on Curve (LAC) – node forwards to its neighbor with least advancement on the curve. Random - node randomly forwards to one of its neighbor

Rensselaer Polytechnic Institute, Troy, NY11 Forwarding Algorithms for TBR (cont’d) CTC-LAC – node forwards to its neighbor with LAC but is also close to the curve (within a predefined distance). Most Advancement on Curve (MAC) – node forwards to its neighbor which is nearest to the destination. Failure of CTC and MAC Failure of LAC

Rensselaer Polytechnic Institute, Troy, NY12 Forwarding Algorithms for TBR (cont’d) Lowest Deviation from Curve (LDC) – node forwards to its neighbor with lowest deviation from curve. Calculation of areas is computationally intensive. Can be approximated by numerical techniques.

Rensselaer Polytechnic Institute, Troy, NY13 Long Trajectories For a generalized long trajectory We brake the trajectory into multiple cubic Bezier curves. Before data traffic, source performs signaling and sends a probe packet that include all the control points (more than two) for the trajectory and starting locations of the smaller cubic Bezier curves (i.e. Intermediate Point (IP) ). Nodes close to an IP will contend for being a Special Intermediate Node (SIN).

Rensselaer Polytechnic Institute, Troy, NY14 Long Trajectories (cont’d) SINs (i.e. I 1, I 2 below) do special forwarding. They remove info about last curve’s control points and replaces it with that of the next piece’s control points from packet’s header and inserts the next one’s control points. Rest of the nodes fwd packets to nodes that are closest to curve and you advance least on curve. Curve 3 D Curve 1 Curve 2 S I1I1 I2I2

Rensselaer Polytechnic Institute, Troy, NY15 Simulation Results Used NS-2 Number of nodes – 50, 100, 150, 200. Area – 250mX500m Three different trajectories: Circular Zigzag – Single-piece Zigzag -- Multi-piece No mobility yet

Rensselaer Polytechnic Institute, Troy, NY16 Simulation Results (cont’d) A long trajectory composed of two concatenated cubic Bezier curves

Rensselaer Polytechnic Institute, Troy, NY17 Simulation Results (cont’d) Deviation of various forwarding strategies from the circular trajectory

Rensselaer Polytechnic Institute, Troy, NY18 Simulation Results (cont’d) Normalized path length in various forwarding strategies applied on the circular trajectory

Rensselaer Polytechnic Institute, Troy, NY19 Simulation Results (cont’d) Deviation of various forwarding strategies from the single-piece zigzag trajectory

Rensselaer Polytechnic Institute, Troy, NY20 Simulation Results (cont’d) Normalized path length in various forwarding strategies applied on the single-piece zigzag trajectory

Rensselaer Polytechnic Institute, Troy, NY21 Simulation Results (cont’d) Deviation from the trajectory and normalized path length for the multi- piece zigzag trajectory with CTC-LAC forwarding strategy

Rensselaer Polytechnic Institute, Troy, NY22 Future Work Extensive simulation of multi-piece case Amount of state maintained at SINs Strategies for selecting SINs Simulation with various mobility patterns Analysis of success rate (i.e. % reaching destination) for the forwarding strategies Resilience strategies to increase success rate

Rensselaer Polytechnic Institute, Troy, NY23 Thank you !!