Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.

Slides:



Advertisements
Similar presentations
The Capacity of Wireless Networks
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Compact Routing in Theory and Practice Lenore J. Cowen Tufts University.
The Crossroads of Geography and Networks Michael T. Goodrich Dept. of Computer Science w/ David Eppstein, Kevin Wortman, Darren Strash, and Lowell Trott.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
Rumors and Routes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopRumors and Routes1.
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
CS728 Lecture 17 Web Indexes III. Last Time Showed how build indexes for graph connectivity Based on 2-hop covers Today Look at more general problem of.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Traveling with a Pez Dispenser (Or, Routing Issues in MPLS) Anupam Gupta Amit Kumar FOCS 2001 Rajeev Rastogi Iris Reinbacher COMP670P
Geometric Routing without Geometry
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
[1][1][1][1] Lecture 2-3: Coping with NP-Hardness of Optimization Problems in Practice May 26 + June 1, Introduction to Algorithmic Wireless.
An Efficient Location Service for Mobile Ad Hoc Networks Roland Flury Roger Wattenhofer Distributed Computing Group MLS.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Finding a maximum independent set in a sparse random graph Uriel Feige and Eran Ofek.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Introduction to Routing. The Routing Problem Apply after placement Input: –Netlist –Timing budget for, typically, critical nets –Locations of blocks and.
An Algorithmic Approach to Geographic Routing in Ad Hoc and Sensor Networks - IEEE/ACM Trans. on Networking, Vol 16, Number 1, February 2008 D
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Improved Sparse Covers for Graphs Excluding a Fixed Minor Ryan LaFortune (RPI), Costas Busch (LSU), and Srikanta Tirthapura (ISU)
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Online Social Networks and Media
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
NTU IM Page 1 of 35 Modelling Data-Centric Routing in Wireless Sensor Networks IEEE INFOCOM Author: Bhaskar Krishnamachari Deborah Estrin Stephen.
Analysis and algorithms of the construction of the minimum cost content-based publish/subscribe overlay Yaxiong Zhao and Jie Wu
Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
1 Bottleneck Routing Games on Grids Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
Data Structures for Emergency Planning Cyril Gavoille (LaBRI, University of Bordeaux) 8 th FoIKS Bordeaux – March 3, 2014.
Does Topology Control Reduce Interference?
Forbidden-Set Distance Labels for Graphs of Bounded Doubling Dimension
Know thy Neighbor’s Neighbor Better Routing for Skip Graphs and Small Worlds Moni Naor Udi Wieder.
Peer-to-Peer and Social Networks
Greedy Routing with Bounded Stretch
Koorde: A simple degree optimal DHT
Introduction Wireless Ad-Hoc Network
Compact routing schemes with improved stretch
How to use spanning trees to navigate in Graphs
Routing in Networks with Low Doubling Dimension
Forbidden-set labelling in graphs
Presentation transcript:

Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction Cluster 1 Introduction We consider the problem of greedy routing where messages are forwarded to the neighbor which is closest to the destination node. Due to its simplicity, this routing scheme is very promising. For greedy routing, the nodes only need to know their position (which may be obtained from GPS or through a virtual placement). In general, greedy routing does not work as messages may get stuck at local minima, nodes which have no neighbor that is closer to the destination, see Figure 1. Many geometric solutions to escape such local minima have been proposed so far. We follow a different approach: assign coordinates such that greedy routing always works. Greedy paths are not necessarily optimal. We measure the overhead through the stretch : In our example, the greedy path uses 5 hops whereas the optimal path only needs 4. Thus, the path has a stretch of Our Results A CUDG is a Combinatorial Unit Disk Graph, a UDG without any geometric information. Note: without 2D coordinates, it is NP-hard to find an embedding given only the connectivity of the network. This result can also be seen as a compact routing scheme with O(log 3 n) bits. Note: UDGs are not constant doubling Our technique can be used for general graphs, where we obtain a O(log 3 n)-dimensional embedding with O(log n) stretch. Ingredient 1: Tree Cover Build a constant stretch tree cover of O(log n) trees We choose a set of trees {T 1, T 2, …, T k } such that for any two nodes u, v  T i with d Ti(u,v) ≤ ρ d G(u,v) Gupta et al. describe the construction of a constant stretch tree cover for planar graphs We extend this result to CUDGs Embedding Example Ingredient 2: Separators Any planar graph of n vertices can be separated such that each resulting connected component has at most 2/3 n vertices. [Lipton, Tarjan] We show that this result also holds for CUDGs Note: We need no geometric information. Ingredient 3: Distance Labeling Any tree of n vertices can be embedded isometrically into c ∙ log n dimensions. [Linial et al.] Given the coordinates of any two nodes, the exact distance (along the tree) can be obtained using the L ∞ norm: Embedding & Routing Recipe 1.Build a constant stretch tree cover using the separator theorem for CUDGs 2.Label each tree with the isometric embedding 3.Greedy routing from u to v : Forward along the tree which indicates the shortest distance Greedy embedding Figure 1: The greedy path from node 2 towards node 6 falls into a local minimum at node 1 which has no neighbor closer to node 6. Figure 2: The network is embedded such that greedy routing between any two points is possible. Related Work Conjecture by Papadimitriou and Ratajczak Proven by Moitra and Leighton in 2008 Any planar 3-connected network has a greedy embedding in 2D. Any network has a greedy embedding into the hyperbolic space. Robert Kleinberg, 2007 Improved by Eppstein & Goodrich in 2008 such that coordinates only need O(n) bits Worst case stretch: O(n) stretch := length of greedy path length of optimal path A CUDG can be embedded in polynomial time into O(log 2 n) dimensions such that greedy routing has a constant stretch ≤ 2 3 n ≤ 2 3 n [2, 0, 2] [3, 1, 3][1, 1, 1] [0, 2, 2][0, 2, 0] L ∞ ( [3, 1, 3], [0, 2, 2] ) = 3 [2, 0, 2] [3, 1, 3][1, 1, 1] [0, 2, 2][0, 2, 0] How good is our greedy embedding? Our greedy embedding is the first to ensure a constant stretch for greedy routing. To get a feeling about the quality of our embedding, we ran simulations on over 2000 random networks of varying size and analyzed over 10 8 paths of 74 hops on average. The plot shows the stretch for different network densities and path lengths. To build the first tree of the tree cover, separate the network. From the separator, grow a BFS tree to obtain the first tree. Remove the separator from the network and continue recursively on the remaining connected components. In our example, the recursion already stops as the new separators already cover the entire components. The second tree is obtained by concatenating the components via the removed separator. Label each tree using the distance labeling. Finally, combine the labels from the different trees to form the coordinate of each node. sparse, tree-like networks short paths: good tree is likely fewer samples The average stretch is 1.1, which shows that our greedy routing has only 10% longer routes than an optimal solution. The maximum stretch was found for an ‘unlucky’ short route, which was 3 times longer than the optimal route. In general, short routes tend to have low stretch as they are likely to be connected through a good tree.