On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.

Slides:



Advertisements
Similar presentations
The Capacity of Wireless Networks
Advertisements

Rahnuma Islam Nishat Debajyoti Mondal Md. Saidur Rahman Graph Drawing and Information Visualization Laboratory Department of Computer Science and Engineering.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Comments We consider in this topic a large class of related problems that deal with proximity of points in the plane. We will: 1.Define some proximity.
Approximations of points and polygonal chains
A Unified View to Greedy Routing Algorithms in Ad-Hoc Networks
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
The Divide-and-Conquer Strategy
Ruslana Mys Delaunay Triangulation Delaunay Triangulation (DT)  Introduction  Delaunay-Voronoi based method  Algorithms to compute the convex hull 
By Groysman Maxim. Let S be a set of sites in the plane. Each point in the plane is influenced by each point of S. We would like to decompose the plane.
Stateless and Guaranteed Geometric Routing on Virtual Coordinate Systems Ke Liu and Nael Abu-Ghazaleh Dept. of CS, Binghamton University.
Convex Hull Problem Presented By Erion Lin. Outline Convex Hull Problem Voronoi Diagram Fermat Point.
Computational Geometry -- Voronoi Diagram
2. Voronoi Diagram 2.1 Definiton Given a finite set S of points in the plane , each point X of  defines a subset S X of S consisting of the points of.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
UMass Lowell Computer Science Advanced Algorithms Computational Geometry Prof. Karen Daniels Spring, 2004 Chapter 5: Voronoi Diagrams Monday, 2/23/04.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 Two-step Routing and Apex Angle Routing for Delaunay Triangulations PhD Candidate: Weisheng Si Supervisor: Prof. Albert Y. Zomaya School of Information.
A 2-Approximation algorithm for finding an optimum 3-Vertex-Connected Spanning Subgraph.
Chapter 4: Straight Line Drawing Ronald Kieft. Contents Introduction Algorithm 1: Shift Method Algorithm 2: Realizer Method Other parts of chapter 4 Questions?
Additive Spanners for k-Chordal Graphs V. D. Chepoi, F.F. Dragan, C. Yan University Aix-Marseille II, France Kent State University, Ohio, USA.
A Study of the Relationship between SVM and Gabriel Graph ZHANG Wan and Irwin King, Multimedia Information Processing Laboratory, Department of Computer.
1 Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School.
1 University of Denver Department of Mathematics Department of Computer Science.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Introduction Outline The Problem Domain Network Design Spanning Trees Steiner Trees Triangulation Technique Spanners Spanners Application Simple Greedy.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
UNC Chapel Hill M. C. Lin Point Location Chapter 6 of the Textbook –Review –Algorithm Analysis –Dealing with Degeneracies.
How to win in ACM/ICPC? Four levels of programmers 1. Implementation ◦ know the language well, translate idea to programs 2. Algorithms ◦
Algorithms for Network Optimization Problems This handout: Minimum Spanning Tree Problem Approximation Algorithms Traveling Salesman Problem.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
Internet Traffic Engineering by Optimizing OSPF Weights Bernard Fortz (Universit é Libre de Bruxelles) Mikkel Thorup (AT&T Labs-Research) Presented by.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
Efficient Gathering of Correlated Data in Sensor Networks
1 Energy-aware stage illumination. Written by: Friedrich Eisenbrand Stefan Funke Andreas Karrenbauer Domagoj Matijevic Presented By: Yossi Maimon.
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
5 -1 Chapter 5 The Divide-and-Conquer Strategy A simple example finding the maximum of a set S of n numbers.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Void Traversal for Guaranteed Delivery in Geometric Routing
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
© Yamacraw, Fall 2002 Power Efficient Range Assignment in Ad-hoc Wireless Networks E. Althous (MPI) G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) S. Prasad.
UNC Chapel Hill M. C. Lin Delaunay Triangulations Reading: Chapter 9 of the Textbook Driving Applications –Height Interpolation –Constrained Triangulation.
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California,
Various Orders and Drawings of Plane Graphs Takao Nishizeki Tohoku University.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
CMPS 3130/6130 Computational Geometry Spring 2017
Midpoint Routing algorithms for Delaunay Triangulations
Surviving Holes and Barriers in Geographic Data Reporting for
Graphs & Graph Algorithms 2
Introduction Wireless Ad-Hoc Network
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Ch09 _2 Approximation algorithm
Presentation transcript:

On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National ICT Australia University of Sydney 1

Outline Background The problem we consider Some propositions Optimal solution by an Integer Linear Program A polynomial-time approximation algorithm Evaluation Conclusions 2

Background Networks are modelled by geometric graphs. Geographic routing algorithms use the position information of nodes to route packets in the networks. If a geographic routing algorithm A can route a packet from any source s to any destination t in a geometric graph G, A is said to succeed on G. Dst Src 3

Background (cont’d) The greedy forwarding algorithm  When a node forwards a packet with destination Dst, it sends this packet to its neighbor that is closest to Dst. Greedy forwarding does not succeed on a graph that contains the void scenario Dst 4

Background (cont’d) As a result, it is desirable to design a network without the void scenario. Many research efforts assign virtual coordinates to the nodes to achieve a greedy embedding.  Considering omni- directional antennas  Links are known, how to change the coordinates? 5

The problem we consider We also study the problem of obtaining graphs that support greedy forwarding. To ease the discussion, we call such graphs greedy forwarding graph (GFG) later. We consider a different setting in establishing GFGs.  Directional antennas  Coordinates are known, how to change the links?  The goal is to minimize the number of links, thus the network installation cost. 6

The problem we consider (cont’d) Given an arbitrary set of nodes with known coordinates, how can we add minimum number of point-to-point links among the nodes, such that the resulting geometric graph is a GFG. 7

Propositions on GFGs Proposition 1: Any GFG is connected. This implies that any GFG(V) has a spanning tree as its subgraph. Since the number of edges in a spanning tree on V is n-1, where n is the number of nodes in V, a lower bound for |E min (V)| is n-1. We use GFG(V) to denote a GFG on a node set V, and GFG min (V) to denote the GFG(V) with the minimum number of links, and E min (V) to denote the link set in GFG min (V). 8

Propositions on GFGs (cont’d) Proposition 2: There exists a node set V such that GFG min (V) has no planar instances. 9

Propositions on GFGs (cont’d) Proposition 3: Given an arbitrary node set V, the DT(V) is a GFG(V). Since a DT(V) has 3n-k-3 edges, where k is the number of convex hull edges on V, an upper bound for |E min (V)| is 3n-k-3. A Delaunay triangulation on a node set V (denoted by DT(V)) is a triangulation graph on V such that no nodes are contained in the interior of the circumcircle of any of its triangles. 10

Propositions on GFGs (cont’d) Proposition 4: There exists a node set V such that the EMST(V), RNG(V), and GG(V) are not a GFG(V). The Euclidean Minimum Spanning Tree on V ( EMST(V) ), the Relative Neighborhood Graph on V ( RNG(V) ), the Gabriel Graph on V ( GG(V) ), and DT(V) have the following relationship: EMST(V) ≤ RNG(V) ≤ GG(V) ≤ DT(V) 11

Propositions on GFGs (cont’d) Proposition 5: Given an arbitrary node set V, the NNG(V) is a subgraph of any GFG(V). Unfortunately, EMST(V), RNG(V), and GG(V) are not always subgraphs of a GFG(V). A nearest neighbor graph on a node set V (denoted by NNG(V)) is obtained by connecting each node in V with its nearest neighbor. 12

Propositions on GFGs (cont’d) Definition 1. Given a geometric graph G, the closer region of a node p in G is defined as the intersection of all h(p, u)’s, where u is a neighbor of p in G. In a geometric graph, for an edge ab with two end nodes a and b, the bisector of a and b is defined as the perpendicular bisector of the edge ab. For the two open half planes delimited by this bisector, the one containing a is denoted h(a, b), and the other one containing b is denoted h(b, a). 13

Propositions on GFGs (cont’d) The closer region concept differs from the Voronoi region concept in the following aspects: The closer regions are defined on a geometric graph, while the Voronoi regions are defined on a set of nodes. The closer regions can overlap with each other, while the Voronoi regions do not overlap. Given a geometric graph G(V, E) and the Voronoi diagram on V, the closer region of a node p regarding G contains the Voronoi region of p regarding V. 14

Propositions on GFGs (cont’d) Proposition 6: A necessary and sufficient condition for a geometric graph G to be a GFG is that for every node v in G, the closer region of v and its boundary do not contain any other node in G. 15

Optimal Solution by an Integer Linear Program To obtain optimal solution to the minimum GFG problem, we formulate it into an Integer Linear Program (ILP). For each link (u,v)  V  V, we introduce a binary variable x(u,v) in the ILP that indicates whether link (u,v) exists in E. 16

Optimal Solution by an ILP (cont’d) An exemplar GFG min (V) obtained by solving the previous ILP on a 100-node set V. 17

A Polynomial-time Approximation Algorithm As established in the previous propositions, given a set of nodes V, the DT(V) is a GFG(V) and the NNG(V) is a subgraph of any GFG(V). The basic idea of our algorithm is to calculate the DT(V) and the NNG(V) first, and then attempt to remove the edges that are in DT(V) but not in NNG(V), i.e., DT(V) - NNG(V). 18

A Polynomial-time Approximation Algorithm 1.Calculate DT(V). 2.Based on DT(V), calculate NNG(V) and determine the list of edges that are in DT(V) - NNG(V). 3.Go through the list of edges in DT(V) - NNG(V). For each edge uv (u and v are the two end nodes of this edge), test whether it can be removed such that the remaining graph is still a GFG(V). 4.The remaining graph is the output GFG(V). Input: a set of nodes V with known (x, y)-coordinates Output: a GFG that approximates the minimum GFG 19

A Polynomial-time Approximation Algorithm The DT(V) on a 100-node set V. 20

A Polynomial-time Approximation Algorithm The NNG(V) on a 100-node set V. 21

A Polynomial-time Approximation Algorithm The GFG(V) obtained by our algorithm on this 100-node set V. 22

A Polynomial-time Approximation Algorithm Result 1. The above algorithm has a complexity of O(n 2 ), where n is the number of given nodes. Result 2. The above algorithm is a 3- approximation algorithm in terms of the number of edges. We have the following results about this algorithm. 23

Evaluation We compare our polynomial-time algorithm with the optimal solution on the number of edges generated to construct the GFGs. We also evaluate the path quality of the GFGs generated by our polynomial-time algorithm for the greedy forwarding algorithm.  absolute stretch  relative stretch 24

On the number of edges 25

On the path quality – absolute stretch 26

On the path quality – relative stretch 27

Conclusions This paper considers the problem of generating minimum GFGs for the wireless networks with directional antennas. We first presented six propositions regarding GFGs.  Revealing the properties of GFGs and the relationships between GFGs and other well-known graphs. We then give an optimal solution by ILP as well as a polynomial time 3-approximation algorithm for the minimum GFG problem. The experiments show that the polynomial-time algorithm  can actually produce within 1.1 times the number of links found by the optimal solution  can provide paths with small stretches for the greedy forwarding algorithm 28

Thank you! Questions and Suggestions? 29