Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.

Slides:



Advertisements
Similar presentations
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Advertisements

The Capacity of Wireless Networks
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
5.1 Real Vector Spaces.
On Complexity, Sampling, and -Nets and -Samples. Range Spaces A range space is a pair, where is a ground set, it’s elements called points and is a family.
Covers, Dominations, Independent Sets and Matchings AmirHossein Bayegan Amirkabir University of Technology.
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
(speaker) Fedor Groshev Vladimir Potapov Victor Zyablov IITP RAS, Moscow.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
1 Complexity of Network Synchronization Raeda Naamnieh.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 12 June 18, 2006
1 Delay-efficient Data Gathering in Sensor Networks Bin Tang, Xianjin Zhu and Deng Pan.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
Networked Slepian–Wolf: Theory, Algorithms, and Scaling Laws R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano, Member, IEEE, Martin Vetterli,
1 On the Benefits of Adaptivity in Property Testing of Dense Graphs Joint work with Mira Gonen Dana Ron Tel-Aviv University.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Distributed Combinatorial Optimization
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Data Transmission and Base-Station Placement for Optimizing Network Lifetime Esther M. Arkin and Joseph S. B. Mitchell Stony Brook University Swaminathan.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
Efficient Gathering of Correlated Data in Sensor Networks
Efficient Algorithms for Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks Selected from Elsevier: Computer Networks Konstantinos.
Function Computation over Heterogeneous Wireless Sensor Networks Xuanyu Cao, Xinbing Wang, Songwu Lu Department of Electronic Engineering Shanghai Jiao.
1 2. Independence and Bernoulli Trials Independence: Events A and B are independent if It is easy to show that A, B independent implies are all independent.
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Basic Concepts in Number Theory Background for Random Number Generation 1.For any pair of integers n and m, m  0, there exists a unique pair of integers.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
The least known length of ordered basis of symmetric group S. A. Kalinchuk, Yu. L. Sagalovich Institute for Information Transmission Problems, Russian.
Problem Statement How do we represent relationship between two related elements ?
Network Flows Chun-Ta, Yu Graduate Institute Information Management Dept. National Taiwan University.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
© The McGraw-Hill Companies, Inc., Chapter 12 On-Line Algorithms.
and 6.855J March 6, 2003 Maximum Flows 2. 2 Network Reliability u Communication Network u What is the maximum number of arc disjoint paths from.
International Iran conference on Quantum Information September 2007, Kish Island Evaluation of bounds of codes defined over hexagonal and honeycomb lattices.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
1 Covering Non-uniform Hypergraphs Endre Boros Yair Caro Zoltán Füredi Raphael Yuster.
1 Chapter 2 Pigeonhole Principle. 2 Summary Pigeonhole principle –simple form Pigeonhole principle –strong form Ramsey’s theorem.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
4 Introduction Carrier-sensing Range Network Model Distributed Data Collection Simulation 6 Conclusion 2.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
I owa S tate U niversity Laboratory for Advanced Networks (LAN) Coverage and Connectivity Control of Wireless Sensor Networks under Mobility Qiang QiuAhmed.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Computation of the solutions of nonlinear polynomial systems
Computing and Compressive Sensing in Wireless Sensor Networks
Computability and Complexity
Introduction Wireless Ad-Hoc Network
and 6.855J March 6, 2003 Maximum Flows 2
Compact routing schemes with improved stretch
Clustering.
Presentation transcript:

Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan

Overview Introduction System Model Divisible Functions Symmetric Functions – Type-Sensitive – Type-Threshold Conclusion

Introduction Wireless Sensor Networks: Sensors sense the environment and communicate a relevant summary of the data to a sink. Summary of data is, in general, a function of the raw sensor measurements. Examples – Mean, Max, Min, Sum etc. Question: How should nodes cooperate to efficiently compute the desired function at the sink? Interested in computing the maximum rate at which the function can be communicated and its dependency on the number of sensors.

Model n sensor nodes  ij – Distance between nodes i and j. Protocol model (  ) for wireless communication. Successful communication between two nodes takes place at a rate W bits/second. Sensor measurements belong to a fixed finite set, . f n :  n  n – Function of interest. Block Coding is permitted – each sensor has an associated block of N readings known a priori.

Notations R(f,n) – Range of f n. S N,n – Strategy to pass messages between sensors which results in computation of f n at the sink. T(S N,n ) – Worst case time taken by scheme S N,n. R(S N,n ) = N/T(S N,n ) – Rate of scheme S N,n. R (n) max – Supremum over all schemes and block- lengths. G (n) – Graph associated with the wireless network. d(G (n) ) – Maximum of the degrees of nodes.

Network Topologies Collocated Networks: – Networks whose graph is complete. – Every transmission is heard by all nodes. Random Planar Networks: – Nodes and sink are uniformly and independently distributed on a unit square. – Common range, r(n), is chosen such that, by using multihop communication, the graph is connected.

Review Lemma: For random planar networks, if range r(n) =  (2 log n / n), then G (n) is connected w.h.p. and d(G (n) ) ≤ c log n w.h.p. Result follows from earlier paper on critical power for asymptotic connectivity.

Divisible Functions Functions that can be computed in a divide-and- conquer fashion. Trivial upper bound on rate: A function f:  n   (n) is divisible if: – |R(f,n)| is non-decreasing in n; – Given any partition  (S) = {S 1,S 2,…,S j } of S  {1,2,…,n}, there exists a function g  (S), such that for any x   n, f(x S ) = g  (S) (f(x S 1 ),f(x S 2 ),…,f(x S j )). Example: – max(1,2,3,4,5) = max(max(1,2),max(3,4),max(5)).

Divisible Functions Theorem: Let f be a divisible function. Suppose G (n) is connected, and d(G (n) ) ≤ k 1 log |R(f,n)|, for some k 1 > 0. Then, Implication: On the above class of graphs, the simple upper bound is actually achievable for divisible functions.

Proof Outline Tessellation of plane into square cells of side r/  2. Cell graph: Defined on the set of non-empty cells as vertices. – Two cells are adjacent if there are two nodes within each cell which are adjacent in G (n). Construct a rooted spanning tree of the cell graph with the cell containing the sink node as the root. Let  max be the maximum depth of the tree and  (c) denote the depth of cell c.

Proof Outline In each cell, designate as the relay node, a node u, which is adjacent to a node v in the parent of c, and designate v as the relay parent of u. Each cell has one relay node (picked out of possibly multiple choices) and possibly multiple relay parents. For each node u, define the descendant set D u as: – If u is a relay node of a cell c, D u is the set of all nodes that either belong to c or to descendants of c. – Else if u is the relay parent of u 1,…,u l, D u := {u} U D u 1 U … U D u l. – Else D u := u.

Proof Outline Between times jT 1 and (j+1)T 1, the following transmissions take place for each cell c. Let m := j – 2(  max -  (c)). If m ≤ 0 or m > N, cell c does not transmit. Otherwise, – Each non-relay node v in c transmits to the relay node of c. – If m > 1 and c does not contain the sink, the relay node of c transmits to its relay parent. It can be shown that if the transmissions can be feasibly scheduled and the sink will obtain the desired function.

Applications Data Downloading Problem: – Consider the identity function, corresponding to the sink downloading all the raw measurements of all the sensors. – |R(f,n)| = |  | n. Degree condition in Theorem is satisfied for any connected graph. – f can be communicated at a rate O(1/n). Frequency Histogram of Sensor Measurements: – Define the type-vector,  (x) := [  1 (x),  2 (x),…,  |  | (x)], where  i (x) is the number of occurrences of i in x. –  can be computed at a maximum rate of  (1/log n), if d(G (n) ) = O(log n). – From earlier Lemma, this means that in a random planar network which is connected w.h.p., the maximum rate at which  can be computed is  (1/log n) w.h.p.

Symmetric Functions Functions which are invariant with respect to permutations of their arguments: Data generated by a sensor is of primary importance. Sensor identity is not important. A symmetric function f(x) depends on x only through its type-vector  (x). Let f’(  ) denote the value of f(x), for any x with  (x) = . Because of this dependence on the type-vector, maximum rate for any symmetric function is  (1/log n) w.h.p., in random planar networks.

Classes of Symmetric Functions Two disjoint classes: – Type-Sensitive – Type-Threshold Type-Sensitive Functions: – A symmetric function is type-sensitive if there exists some  with 0<  <1, and an integer k, and any j ≤ n – [  n], given any subset {x 1,x 2,…,x j }, there are two subsets of values {y j+1,y j+2,…,y n } and {z j+1,z j+2,…,z n }, such that – Examples: Mode, Mean, Median, Standard deviation. – A type-sensitive function cannot be determined if a large enough fraction of the arguments are unknown.

Classes of Symmetric Functions Type-Threshold Functions: – A symmetric function f is said to be type-threshold if there exists a non-negative |  |-vector, , called the threshold vector, such that f(x) = f’(  (x)) = f’(min(  (x),  )), for all x   n. – The value of a type-threshold function can be determined by a fixed number of known arguments. – Examples: Max, Min, Range – Threshold vector, [1,1,…,1]. k th largest value – Threshold vector, [1,1,…,1]. Mean of k largest values – Threshold vector, [k,k,…,k]. Indicator function I{x i = k, for some i} – Threshold vector, [0,0,…,1,0,0,…,0]. – There exist symmetric functions that are neither type-sensitive nor type-threshold.

Collocated Networks - Results Theorem: The maximum rate for computing a type-sensitive function in a collocated network, using any CFS (Collision-Free Strategy) is  (1/n). Theorem: The maximum rate for computing a non-constant type-threshold function in a collocated network, using any CFS is  (1/log n). Thus, type-sensitive functions are maximally difficult to compute, in a collocated network. Because of block coding, type-threshold functions can be computed at an exponentially faster rate than type-sensitive functions.

Random Planar Networks - Results Consider a random planar network, with common range r(n), chosen to be large enough such that the network is connected. Let f and g be type-sensitive and type- threshold functions, respectively.

Conclusion Future work includes considering other types of functions, obtaining lower bounds, introducing correlations among sensor readings, introducing an information theoretic approach and considering power control.