Ou Liang, Ahmet Sekercioglu and Nallasamy Mani

Slides:



Advertisements
Similar presentations
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advertisements

16-1 ©2006 Raj JainCSE574sWashington University in St. Louis Energy Management in Ad Hoc Wireless Networks Raj Jain Washington University in Saint Louis.
GSA Pizza Talk - EPFL - Capillary routing with FEC by E. Gabrielyan 1 Capillary Multi-Path Routing for reliable Real-Time Streaming with FEC.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 11 Ethernet Evolution: Fast and Gigabit Ethernet.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Performance Evaluation Methodology & Key Technologies of New Generation Broadband Wireless Access Networking Zhiwei Gao Broadband Wireless Communication.
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
Fundamental Relationship between Node Density and Delay in Wireless Ad Hoc Networks with Unreliable Links Shizhen Zhao, Luoyi Fu, Xinbing Wang Department.
1 Multi-Channel Wireless Networks: Capacity and Protocols Nitin H. Vaidya University of Illinois at Urbana-Champaign Joint work with Pradeep Kyasanur Chandrakanth.
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
Scalable Routing In Delay Tolerant Networks
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Addition Facts
A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs Shiann-Tsong Sheu and Tzu-fang Sheu IEEE JOURNAL.
高度情報化社会を支えるネットワーキング技術 (大阪大学 工学部説明会資料)
Mohamed Hauter CMPE 259 – Sensor Networks UCSC 1.
Juan-Antonio CorderoPhilippe JacquetEmmanuel Baccelli Orlando, FL -- March 29 th, 2012 Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc.
ATNAC 2010, Auckland, NZ By: Mohd Ezanee Rusli & Richard Harris An Adaptive Coordination Scheme for the Opportunistic.
ABC Technology Project
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Subnetting IP Networks Network Fundamentals.
Mobile IP: Multicast Service Reference: Multicast routing protocol in mobile networks; Hee- Sook Shin; Young-Joo Suh;, Proc. IEEE International Conference.
April, 2008, IEEE ISCE Taehong Kim; Sukbin Seo; Chong Poh Kit; Kimseyoo, Y.; Seong-eun Yoo; Daeyoung Kim Experiments on mobile sink application in ZigBee.
1 Capacity analysis of mesh networks with omni or directional antennas Jun Zhang and Xiaohua Jia City University of Hong Kong.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
1 Analysis of Random Mobility Models with PDE's Michele Garetto Emilio Leonardi Politecnico di Torino Italy MobiHoc Firenze.
YO-YO Leader Election Lijie Wang
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Chapter 5 Test Review Sections 5-1 through 5-4.
Addition 1’s to 20.
25 seconds left…...
Week 1.
We will resume in: 25 Minutes.
Connecting LANs, Backbone Networks, and Virtual LANs
PSSA Preparation.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
May 21, 2003Wu and Dai, ICDCS A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu and Fei Dai Dept. of Comp. Sci. & Eng. Florida.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Tufts Wireless Laboratory Tufts University School Of Engineering Energy-Efficient Structuralized Clustering for Sensor-based Cyber Physical Systems Jierui.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Enhanced Gateway Multipoint Relays for Constructing a Small Connected Dominating Set in Wireless Ad Hoc Networks Ou Liang, Ahmet Sekercioglu.
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
A Low-Cost Flooding Algorithm for Wireless Sensor Networks Department of Electrical and Computer Systems Engineering Monash University,
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Duplicate address detection and autoconfiguration in OLSR Saadi Boudjit; Cedric Adjih; Anis Laouiti; Paul Muhlethaler Hipercom Project National Institute.
Efficient Flooding in Ad hoc Networks using On-demand (Passive) Cluster Formation ICNS Lab Na Gajin.
Globecom 2004 Energy-Efficient Self-Organization for Wireless Sensor Networks: A Fully Distributed approach Liang Zhao, Xiang Hong, Qilian Liang Department.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Efficient and Reliable Broadcast in ZigBee Networks Purdue University, Mitsubishi Electric Lab. To appear in SECON 2005.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
POSTER TEMPLATE BY: Efficient Counter-Based Flooding for Mobile Ad Hoc Networks S. Al-Humoud, M. Ould Khaoua and L. M. Mackenzie.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
A Cluster-Based Backbone infrastructure for broadcasting in MANETs Student: Pei-Yue Kuo
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Efficient Flooding in Ad Hoc Networks: a Comparative Performance Study
© Yamacraw, 2001 Selecting Forwarding neighbors in Wireless Ad Hoc Networks A. Zelikovsky GSU G. Calinescun, Illinois IT I. Mandoiu,
Sanjay K. Dhurandher, Mohammad S. Obaidat, Fellow of IEEE and Fellow of SCS, Siddharth Goel and Abhishek Gupta CAITFS, Division of Information Technology,
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
An efficient reliable broadcasting protocol for wireless mobile ad hoc networks Chih-Shun Hsu, Yu-Chee Tseng, Jang-Ping Sheu Ad Hoc Networks 2007, vol.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
An Efficient Routing Protocol for Green Communications in Vehicular Ad-hoc Networks Jamal Toutouh, Enritue Alba GECCO’ 11, July Presented by 劉美妙.
Presentation transcript:

Gateway Multipoint Relays — an MPR-based Broadcast Algorithm For Ad Hoc Networks Ou Liang, Ahmet Sekercioglu and Nallasamy Mani Department of Electrical and Computer Systems Engineering Monash University, Australia

Sections Broadcasting in wireless ad hoc networks. Multipoint Relays (MPRs). Our new algorithm. Conclusion and future work.

Broadcasting in wireless ad hoc networks Section 1 Section 2 Section 3 Section 4 Broadcasting in wireless ad hoc networks It is commonly used in routing protocols. As a necessary mechanism in various applications that need to maintain global network information (paging a particular host or sending alarm signals).

Network wide broadcast in ad hoc networks Section 1 Section 2 Section 3 Section 4 Network wide broadcast in ad hoc networks Due to the limitation of radio power, a mobile node may not be within the transmission range of all other nodes. Therefore, broadcast packets have to be relayed by other recipient nodes. S

Proposed broadcast algorithms Section 1 Section 2 Section 3 Section 4 Proposed broadcast algorithms Generally, broadcast algorithms in ad hoc networks can be categorized into five groups [1]: Probability based algorithms. Distance based algorithms. Location based algorithms. Neighbor-designating algorithms. Cluster based algorithms.

Neighbor–designating algorithms Section 1 Section 2 Section 3 Section 4 Neighbor–designating algorithms Each node informs neighbor nodes about its node information such as node IDs of neighbor nodes. A node determines whether its neighbors should forward broadcast packets.

Neighbor–designating example Section 1 Section 2 Section 3 Section 4 Neighbor–designating example Node S chooses its neighbors A, B and C to relay broadcast packets. B S A C

Cluster based algorithms Section 1 Section 2 Section 3 Section 4 Cluster based algorithms Network is clustered and cluster-heads are elected. Cluster-heads are referred to as dominators. Cluster-heads select some connectors to connect other cluster-heads.

Cluster example Dominators: {A, B, C} Connectors: {1, 2} Section 1

Multipoint Relays (MPRs) Section 1 Section 2 Section 3 Section 4 Multipoint Relays (MPRs) It is a broadcast mechanism used in the Optimized Link State Routing protocol (OLSR) [2, 3] , and it belongs to the family of neighbor–designating algorithms. Each node selects a subset of nodes from its one-hop neighbors to cover all its two-hop neighbors.

Multipoint Relays example Section 1 Section 2 Section 3 Section 4 Multipoint Relays example a {1, 2, 3} b {3, 4, 5} e {6, 7, 8} f {8} c { } d { } 2 e {6, 7, 8} b {4, 5} f {8} c { } d { } b {4, 5} f { } c { } d { } 3 1 4 a Selected MPRs: {a, b, e} b 5 f c 8 e d 7 6

Our Gateway Multipoint Relays (GMPR) Section 1 Section 2 Section 3 Section 4 Our Gateway Multipoint Relays (GMPR) It is a combination of Clustering and Multipoint Relay methods. Each node in the network can be in one of the four states: dominator, dominatee, connector and candidate. Dominator: It is the cluster-head, and it performs MPR calculation. Dominatee: The nodes connected by dominators. Node states Connector: Can only be entered from dominatee state. Candidate: Initial state that attends dominator election.

Section 1 Section 2 Section 3 Section 4 Operations of GMPR Dominators (nodes that covers most number of candidates) are elected in the network where all nodes can be covered by the dominators. Each dominator selects MPRs to cover its two-hop neighbor nodes. An MPR is a connector if it is selected by the largest dominator of this MPR. Only dominators and connectors forward broadcast packets.

Gateway Multipoint Relays example Section 1 Section 2 Section 3 Section 4 Gateway Multipoint Relays example Elect dominators based on the candidate coverage. Dominators calculate MPRs to cover two-hop neighbor nodes. Each MPR decides whether it is the connector. Selected by “H” Selected by “H” I E A J H F Selected by “P” T B D K Selected by “D” C L P G O M Selected by “P” N Selected by “D”

Self-pruning procedure Section 1 Section 2 Section 3 Section 4 Self-pruning procedure Aim: To further reduce retransmissions by preventing leaf-dominators forwarding broadcast packets. A dominator D is a leaf-dominator if it has a one-hop connector that can cover all D’s one-hop neighbors. A leaf-dominator is referred to as the Silent-dominator, which still selects MPRs but does not retransmit broadcast packets.

Self-pruning procedure example Section 1 Section 2 Section 3 Section 4 Self-pruning procedure example After selecting connectors Dominators: E, H Connector: F A G B E F H Then Both dominators apply self-pruning procedure, and H becomes a silent-dominator. C I D

Simulation studies Section 1 Section 2 Section 3 Section 4 Simulator OMNeT++ with Mobility Framework. MAC protocol Assume a perfect MAC layer (error and collision free). Network area 100m x 100m two dimensional area. Topology generating Randomly distribute nodes in the area. Each node is placed within the transmission range of a previously placed node to make sure connectivity. Number of nodes Range from 20 to 100. Transmission range Two transmission ranges: 25m and 50m. Number of runs A sufficient number of runs are conducted to achieve 95% confidence interval within a ±5% margin.

Transmission range R = 25m Section 1 Section 2 Section 3 Section 4 Simulation results Transmission range R = 25m

Transmission range R = 50m Section 1 Section 2 Section 3 Section 4 Simulation results Transmission range R = 50m

Conclusion and future work Section 1 Section 2 Section 3 Section 4 Conclusion and future work We have proposed a new efficient broadcast algorithm based on the Multipoint Relays and clustering methods. Simulation studies show that compared with related work, our algorithm generates fewer forwarding nodes thus reducing retransmissions and collisions. Future work: investigate the performance of our algorithm in both dense and mobile environment.

References [1]. J. Wu and F. Dai, “A generic distributed broadcast scheme in ad hoc wireless networks,” in Proceedings of MOBIHOC, 2002, pp. 194-205. [2]. A. Laouiti, A. Qayyum, and L. Viennot, “Multipoint relaying: an efficient technique for flooding in mobile wireless networks,” in 35th Annual Hawaii International Conference on System Sciences HICSS’2001. [3].T. Clausen and P. Jacquet, “Optimized link state routing protocol (OLSR),” RFC 3626, Oct. 2003. [online]. Available: http://www.faqs.org/rfcs/rfc3626.html.

Questions?

Thank you!

Probability based algorithms Section 1 Section 2 Section 3 Section 4 Probability based algorithms It is similar to the “blind flooding”, but each node rebroadcast a packet with a predetermined probability value “P”. Problems: Can not guarantee full coverage in the network. Has little effect on in sparse network.

Distance based algorithms Section 1 Section 2 Section 3 Section 4 Distance based algorithms A node retransmit a broadcast packet if the distance between it and the sender of the packet is larger than a predefined threshold distance. Problems: Energy wastage (unnecessary broadcast) Cannot guarantee full coverage d1 d2 S A B

Location based algorithms Section 1 Section 2 Section 3 Section 4 Location based algorithms Use positioning devices such as GPS (Global Positioning System) to provide precise locations of hosts in a network. Additional coverage A host retransmits a broadcast packet if the additional area it covers is larger than a threshold value. d1 d2 S A B