Clustering In Mobile Networks Presented By: Assaf Mizrachi Shimrit Artzi Tutor: Dr. Michael Segal.

Slides:



Advertisements
Similar presentations
Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Lecture 8: Asynchronous Network Algorithms
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
Progress Report Wireless Routing By Edward Mulimba.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
User Interface. The Protocol Interface The service we have tested is a clock: the control point sends a request to the device (demo device in this case)
Distributed Sensing and Data Collection Via Broken Ad Hoc Wireless Connected Networks Mobile Robots By Alan FT Winfield Presented By Navpreet Bawa.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Supervisor: Mr. Hai Vortman. The ultimate goal Creating a wireless sensor network using Bluetooth technology.
Wireless Sensor Network for Tracking the Traffic in INTERNET Network Routers Supervisor: Mark Shifrin Students: Yuriy Kipnis Nir Bar-Or Networked Software.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
WIRELESS COMMUNICATION NETWORKS Modeling and Simulation.
TRUST, Spring Conference, April 2-3, 2008 Taking Advantage of Data Correlation to Control the Topology of Wireless Sensor Networks Sergio Bermudez and.
MintTrack By Jeff Titus Christopher C. Wilkins Stephen Krach Pablo BajoLaso.
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
Wireless Ad-Hoc Networks
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Sponsored by the National Science Foundation1 Experiment 1 WiMAX broadcasting WiMA X Communication from the WiMAX interface Devices may experience data.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
1 A Distributed Architecture for Multimedia in Dynamic Wireless Networks By UCLA C.R. Lin and M. Gerla IEEE GLOBECOM'95.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
Data Mining Algorithms for Large-Scale Distributed Systems Presenter: Ran Wolff Joint work with Assaf Schuster 2003.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Simulation of the OLSRv2 Protocol First Report Presentation.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
Energy conservation in Wireless Sensor Networks Sagnik Bhattacharya, Tarek Abdelzaher University of Virginia, Department of Computer Science School of.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
A Standard Measure of Mobility for Evaluating Mobile Ad Hoc Network Performance By Joseph Charboneau Karthik Raman.
User Mobility Modeling and Characterization of Mobility Patterns Mahmood M. Zonoozi and Prem Dassanayake IEEE Journal on Selected Areas in Communications.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Guowei CHEN GITS, Waseda.
1 Minimum Interference Algorithm for Integrated Topology Control and Routing in Wireless Optical Backbone Networks Fangting Sun Mark Shayman University.
A New Class of Mobility Models for Ad Hoc Wireless Networks Rahul Amin Advisor: Dr. Carl Baum Clemson University SURE 2006.
Simulation of K-Clustering in a Wireless Ad-Hoc Network using a decentralized Local Search Supervised by: Dr. Rachel Ben- Eliyahu Kirill Kazatsker Daniel.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Efficient distribution of An infrastructure Cluster network under constraints Ben Gurion University, Communication System Engineering Department, Faculty.
Students:Ori Horin Michael Reznik Supervisor:Prof. Michael Segal Advisor:Mr. Erez Meital.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
By: Ziji Song Advisor: Prof. J. Spinelli
Maximal Independent Set
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Wireless Ad-Hoc Networking
Presentation transcript:

Clustering In Mobile Networks Presented By: Assaf Mizrachi Shimrit Artzi Tutor: Dr. Michael Segal

Background And Motivation Problem: Today ’ s mobile networks consumes large amount of money for base-stations ’ construction and maintenance. Solution: Let go of base stations. Problem: How will the customers communicate? Solution: Make the mobile devices able to communicate between themselves. Each one of them can function as a “ mini ” base station itself.

Background And Motivation – Cont ’ d Q: What is the infrastructure of such network? A: It is composed of groups of nodes called “ clusters ”. The process is called “ clustering ”. Lets view the differences … The clustering determines the infrastructure of the network, which is called Ad-Hoc network. Each cluster has the attributes of a cell in cellular network.

Background And Motivation – Cont ’ d Cellular 1 2 A A A B C B B C C A A BB CC A1A2 wireless networkAd-Hoc

Proposed Algorithm For Clustering Requirements: Should be dynamic (i.e. adapts to the mobility of the nodes). Fast recovering from structure changes (events). Assumptions: Each node is represented as a disc with radius of its communication range (all has same radius). Each disc is able to detect whether it intersect another discs.

Algorithm For Clustering – Description Definitions: When two discs intersect, we say that one of them is piercing the other. We refer them as piercing and normal discs respectively. Define D – Group of all unpierced discs (initially they are all normal and unpierced). Lets see how it works …

P N N N P N N P N N N P Algorithm For Clustering - SET-UP Stage: 1. Randomly choose a disc d from D.2. Mark d as “ piercing ” disc.4. Remove d and all its neighbors from D.5. Repeat until D={ };3. Mark all its neighbors as normal. P

P N N N P N N P P N N N P NP PNN Algorithm For Clustering - UPDATE Stage: 1. If the boundary of one piercing disc d meets that of a another piercing disc, then Unmark d and all its neighbors. 2. If a normal disc d ’ meets no boundary of a piercing disc d, then unmark d ’. 3. Invoke Set-up.

P N N N P N N P P N N N P N P P N N Proposed Algorithm For Routing:

The Application We simulated the algorithm in C++. We created an interactive user interface which allows him to edit (i.e. enter/delete/remove) discs. We left space for him to enter applications which will run on the created network. We offered a routing protocol which is also a matter of future work.

Future Work Adding topography to the application. Motion prediction options. Improved routing protocol. Channel distribution.

The End