On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.

Slides:



Advertisements
Similar presentations
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
May 21, 2003Wu and Dai, ICDCS A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu and Fei Dai Dept. of Comp. Sci. & Eng. Florida.
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Topic: Routing and Aggregation An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks (Li,Peng,Chu-
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
A Preferred Link Based Multicast Protocol for Wireless Mobile Ad hoc Networks R. S. Sisodia, Karthigeyan. I, B. S. Manoj, and C. Siva Ram Murthy ICC 2003.
Power saving technique for multi-hop ad hoc wireless networks.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
Efficient and Reliable Broadcast in ZigBee Networks Purdue University, Mitsubishi Electric Lab. To appear in SECON 2005.
Wireless internet routing Philippe Jacquet. Internet and networking Internet –User plurality connected to –Sources plurality.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Presented by : Joseph Gunawan.  To get the optimal transmission radius for broadcasting using the energy as minimal as possible while it still guarantees.
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Flooding-Based Geocasting Protocol for Mobile Ad Hoc Network YOUNG-BAE KO NITIN H. VAIDYA.
Power-Balance Broadcast in Wireless Mobile Ad Hoc Networks Jang-Ping Sheu, Yu-Chia Chang, and Hsiu- Ping Tsai National Central University, Chung-Li, 32054,Taiwan.
Presented by Fei Huang Virginia Tech April 4, 2007.
Comparison-Based System- Level Fault Diagnosis in Ad Hoc Networks Stefano Chessa, Paolo Santi Reliable Distributed Systems, Proceedings. 20 th IEEE.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
A Cluster-Based Backbone infrastructure for broadcasting in MANETs Student: Pei-Yue Kuo
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Efficient Backbone Construction Methods in MANETs Using Directional Antennas 1 Shuhui Yang, 1 Jie Wu, 2 Fei Dai 1 Department of Computer Science and Engineering.
Connected Dominating Sets. Motivation for Constructing CDS.
Broadcast Scheduling in Mobile Ad Hoc Networks ——Related work and our proposed approach By Group 4: Yan Qiao, Yilin Shen, Bharat C. and Zheng Li Presenter:
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Virtual Wire for Managing Virtual Dynamic Backbone in Wireless Ad Hoc Networks Bo Ryu, Jason Erickson, Jim Smallcomb ACM MOBICOM 1999.
Efficient Flooding in Ad Hoc Networks: a Comparative Performance Study
© Yamacraw, 2001 Selecting Forwarding neighbors in Wireless Ad Hoc Networks A. Zelikovsky GSU G. Calinescun, Illinois IT I. Mandoiu,
Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks Mobile Networks and Applications 6, ,2001 Author : JEFFREY E. WIESELTHIER.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
BROADCASTING TECHNIQUES IN AD-HOC NETWORKS A survey on Shubham Bhat Surendra Shenoy References: 1.“
Ad Hoc Multicast Routing
On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks By J. Wu and H. Li Instructor: Dr. Yinghsu Li Presented by: Chinh.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Max-Min D-Cluster Formation in Wireless Ad Hoc Networks
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Self-stabilizing energy-efficient multicast for MANETs.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
MMLAB NETWORK SEMINAR Tree-Based Data Broadcast in IEEE and ZigBee Networks Written by Gang Ding(Purdue Univ.), Zafer Sahinoglu(MERL), Philip.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Topology Control and Its Effects in Wireless Networks
Connected Dominating Sets
Effective Replica Allocation
Introduction Wireless Ad-Hoc Network
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
On Constructing k-Connected k-Dominating Set in Wireless Networks
Presentation transcript:

On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions on mobile computing April-June 2002 Presented By 資管研一 R Lin Ming Yuan

Outline Introduction Preliminaries Enhanced dominant pruning algorithm Termination criteria Performance evaluation Conclusions

Introduction Some characteristics of ad hoc network  Without central infrastructure  Temporary and changing topology In this paper, the author focused on the topic of broadcast problem and try to find the minimum number of forward nodes.

Introduction (cont.) Traditionally it used the concept of the flood tree to broadcast packets in ad hoc networks. The efficiency of the algorithm depends on the number of total forwarding nodes. The importance and application of broadcast service  Route query process in several routing protocol  Send an error message to erase invalid routes  For reliable multicast

Introduction (cont.) The problem of finding minimum forwarding nodes can be reduce to a dominant set problem which is NP. Some previous algorithm  Blinding flooding (broadcast storming problem)  Dominating pruning (DP) algorithm

Introduction (cont.) The DP algorithm utilizes 2-hops neighborhood information to reduce redundancy transmissions and prolong the life of the network. The DP algorithm also can be considered as an approximation to the minimum flood tree problem. In this paper, the author proposed two extensive algorithm  TDP (Total Dominant Pruning algorithm)  PDP (Partial Dominant Pruning algorithm)

Outline Introduction Preliminaries  The approximation of MCDS (AMCDS) algorithm  The dominant pruning (DP) algorithm Enhanced dominant pruning algorithm Termination criteria Performance evaluation Conclusions

Preliminaries Lim and Kim prove that building a minimum flooding tree is the same as finding a minimum connected dominating set (MCDS) in a network, which is an NP-complete problem. Our approach is based on constructing a connected dominating set “on-the-fly” and it is suitable for dynamic networks with mobile hosts

Preliminaries (redundancy problem) U is the sender. The transmissions between v and w are redundant.

Outline Introduction Preliminaries  The approximation of MCDS (AMCDS) algorithm  The dominant pruning (DP) algorithm Enhanced dominant pruning algorithm Termination criteria Performance evaluation Conclusions

Notation G =(V,E), where V represents a set of wireless mobile hosts (nodes) and E represents a set of edges. Such a graph forms an unit disk graph. N(u) represents the neighbor set of u (including u) and N(N(u)) represents the neighbor set of N(u) (i.e., the set of nodes that are within two hops from u). Clearly, and if, then.

Assumption 2-hop neighborhood information can be obtained by periodic “Hello” packets, each of which contains the sender’s identification and the list of its neighbor. In this paper, the author assumed that v (sender) and u (receiver) are neighbors.

Outline Introduction Preliminaries  The approximation of MCDS (AMCDS) algorithm  The dominant pruning (DP) algorithm Enhanced dominant pruning algorithm Termination criteria Performance evaluation Conclusions

The approximation of MCDS (AMCDS) algorithm Step 1: At the start of the algorithm, all nodes are colored white and, then, the node with the maximum node degree is selected (put in set C) and colored black, and all of its neighbors are colored gray. Step 2: A recursive selection process runs until no white node exists: Choose a gray node that has the maximum number of white neighbors. Color the selected node black and its white neighbors gray.

AMCDS algorithm (cont.) The drawback of this algorithm is that it needs to know the global network topology and, therefore, it is not suitable for ad hoc wireless networks. The result of the AMCDS algorithm can be used as the lower bound to compare with algorithm.

Outline Introduction Preliminaries  The approximation of MCDS (AMCDS) algorithm  The dominant pruning (DP) algorithm Enhanced dominant pruning algorithm Termination criteria Performance evaluation Conclusions

The dominant pruning (DP) algorithm (selection process) 1. Let (empty list), (empty set), and, where for. 2. Find set S i whose size is maximum in K. (In case of a tie, the one with the smallest identification I is selected.) 3.,, and for all. If, exit; otherwise, go to step 2.

The dominant pruning (DP) algorithm (cont.) F(u,v) is the forward bode list between sender v and receiver u. B(u,v)=N(v)-N(u) to covers nodes in U(u,v)=N(N(v))-N(v)-N(u). Z is a subset of U(u,v) and S i is the neighbor set of vi. K is the set of S i. Specifically, the greedy set cover algorithm is used for the selection of forward node.

The dominant pruning (DP) algorithm (cont.) 1. Node v uses N(N(u)), N(u), and N(v) to obtain U(u, v) = N(N(v)) - N(u) - N(v) and B(u, v) = N(v) - N(u). 2. Node v then calls the selection process to determine F(u, v).

DP algorithm (graph.)

Outline Introduction Preliminaries Enhanced dominant pruning algorithm  The total dominant pruning (TDP) algorithm  The partial pruning dominant pruning (PDP) algorithm Termination criteria Performance evaluation Conclusions

The total dominant pruning (TDP) algorithm If node v can receive a packet piggybacked with N(N(u)) from node u, the 2-hop neighbor set that needs to be covered by v’s forward node list F is reduced to U = N(N(v)) – N(N(u)). The total dominant pruning (TDP) algorithm uses the above method to reduce the size of U and, hence, to reduce the size of F.

The total dominant pruning (TDP) algorithm (cont.) 1. Node v uses N(N(u)), N(u), and N(v) to obtain U(u, v) = N(N(v)) – N(N(u)) and B(u, v) = N(v) - N(u). 2. Node v then calls the selection process to determine F.

The total dominant pruning (TDP) algorithm (theorem) Theorem 1. If a node w 2 N(N(v)) is also in N(N(u)), then w can be excluded from U. Proof: consider all possible conditions of w  w is 1-hop neighbor of the node u, then it has received broadcast packet during the transmission of u and v.  w is 2-hop neighbor of the node u, then it will receive broadcast packets from the 1-hop neighbor of u like v.

The total dominant pruning (TDP) algorithm (theorem) Theorem 2. Let U = N(N(v)) - N(N(u)) and B = N(v) - N(u); then, U = N(B). Proof: by the concept of the complement set  with x= N(v) and Y = N(U)

The total dominant pruning (TDP) algorithm (graph)

Outline Introduction Preliminaries Enhanced dominant pruning algorithm  The total dominant pruning (TDP) algorithm  The partial pruning dominant pruning (PDP) algorithm Termination criteria Performance evaluation Conclusions

The partial pruning dominant pruning (PDP) Besides excluding N(u) and N(v) from N(N(v)), as addressed in the DP algorithm, more nodes can be excluded from N(N(v)). These nodes are the neighbors of each node in. Such a node set is donated as. Therefore, the 2-hop neighbor set U in the PDP algorithm is.

The partial pruning dominant pruning (PDP) (cont.) 1. Node v uses N(N(u)), N(u), and N(v) to obtain and U = N(N(u)) - N(u) - N(v) – P, and B = N(v) – N(u). 2. Node v then calls the selection process to determine F.

The partial pruning dominant pruning (PDP) (theorem) Theorem 3. Let ; U = N(N(v)) - N(u) - N(v) – P and B = N(u) – N(v), then. Proof: by the concept of the set subtraction and with X = N(u) and Y = N(v). So, N(B) can cover U.

The partial pruning dominant pruning (PDP) (graph)

Example

Result

Result (cont.)

As the lower bound by using the AMCDS algorithm, the minimum connected dominating set is {2, 6, 7, 11}, so the number of forward nodes is 4. The number of the original DP is 8, TDP’s is 5 and PDP’s is 6. (The more near global information, the better performance.)

Outline Introduction Preliminaries Enhanced dominant pruning algorithm Termination criteria Performance evaluation Conclusions

Termination criteria The first one assigns a marked/unmarked status to each node. A node v is called marked if v has received a packet; otherwise, v is called unmarked. We assume that, v knows the current marked/unmarked status of the nodes in N(v) at the time v decides its forward node list. When all nodes in N(v) are marked, v will stop rebroadcasting and discard the packet.

Termination criteria (cont.) The second approach assigns a relayed/ unrelayed status to each node. A node v is called relayed when v has sent a packet; otherwise, v is called unrelayed. Forward node v will stop rebroadcasting a packet only when v has sent that packet.

Outline Introduction Preliminaries Enhanced dominant pruning algorithm Termination criteria Performance evaluation Conclusions

Performance evaluation Static environment 400 randomly generated graph and parameters  r : the fixed transmitter range  d : the fixed average node degree (density) No contention in MAC layer

Performance evaluation (No. of forward node) Transmission range=25/40 and use marked/unmarked approach 15% improvement

Performance evaluation (No. of forward node) Transmission range=55/70 and use marked/unmarked approach 20% improvement

Performance evaluation (No. of forward node) Transmission range=25/40 and use relayed/unrelayed approach

Performance evaluation (No. of forward node) Average degree=6/10 and use marked/unmarked approach

Performance evaluation (No. of forward node) Average degree=6/10 and use relayed/unrelayed approach

Performance evaluation (No. of received packets) Transmission range=25/40 and use marked/unmarked approach

Performance evaluation (No. of received packets) Transmission range=25/40 and use relayed/unrelayed approach

Performance evaluation (No. of received packets) Average degree=6/10 and use marked/unmarked approach

Performance evaluation (No. of received packets) Average degree=6/10 and use relayed/unrelayed approach

Performance evaluation (broadcast delivery rate) Transmission range=25/40 and No. of nodes=100 X axis represents the speed of the nodes.

Explanation of the result The larger transmission range the more covered neighborhood node information and can reduce more redundancy forward nodes. The higher degree the more redundancy transmission. Broadcast rate decreases as the speed of each node increases.

Explanation of the result (cont.) Performance : AMCDS>TDP>PDP>DP The marked/unmarked approach contains more neighbor information than relayed/ unrelayed approach and is better.

Outline Introduction Preliminaries Enhanced dominant pruning algorithm Termination criteria Performance evaluation Conclusions

Original DP algorithm and improved TDP and PDP algorithm. Trade-off between broadcast redundancy (v.s the life of the ad hoc network) and broadcast delivery rate. Extend the proposed schema from 2-hops to k- hops.