Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Chapter 5: Tree Constructions
Lecture 15. Graph Algorithms
Leader Election Breaking the symmetry in a system.
Chapter 15 Basic Asynchronous Network Algorithms
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
Minimum Spanning Trees
1 Minimizing Movement Erik D. Demaine, MohammadTaghi Hajiagahayi, Hamid Mahini, Amin S. Sayedi-Roshkhar, Shayan Oveisgharan, Morteza Zadimoghaddam SODA.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Chapter 23 Minimum Spanning Trees
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Greedy Algorithms Reading Material: Chapter 8 (Except Section 8.5)
Lecture 12 Minimum Spanning Tree. Motivating Example: Point to Multipoint Communication Single source, Multiple Destinations Broadcast – All nodes in.
Greedy Algorithms Like dynamic programming algorithms, greedy algorithms are usually designed to solve optimization problems Unlike dynamic programming.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Presenter: 施佩汝 劉冠廷 何元臣 陳裕美 洪家榮 Approximation Algorithms for Quickest Spanning Tree Problems.
Minimum Spanning Trees. Subgraph A graph G is a subgraph of graph H if –The vertices of G are a subset of the vertices of H, and –The edges of G are a.
TECH Computer Science Graph Optimization Problems and Greedy Algorithms Greedy Algorithms  // Make the best choice now! Optimization Problems  Minimizing.
Efficient Gathering of Correlated Data in Sensor Networks
MST Many of the slides are from Prof. Plaisted’s resources at University of North Carolina at Chapel Hill.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
1 By: MOSES CHARIKAR, CHANDRA CHEKURI, TOMAS FEDER, AND RAJEEV MOTWANI Presented By: Sarah Hegab.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
Connected Dominating Sets. Motivation for Constructing CDS.
Introduction to Graph Theory
Chapter 6 Relaxation (1) CDS in unit disk graph
© Yamacraw, 2001 Selecting Forwarding neighbors in Wireless Ad Hoc Networks A. Zelikovsky GSU G. Calinescun, Illinois IT I. Mandoiu,
Tree Constructions Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Graphs Slide credits:  K. Wayne, Princeton U.  C. E. Leiserson and E. Demaine, MIT  K. Birman, Cornell U.
Max-Min D-Cluster Formation in Wireless Ad Hoc Networks
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
The geometric GMST problem with grid clustering Presented by 楊劭文, 游岳齊, 吳郁君, 林信仲, 萬高維 Department of Computer Science and Information Engineering, National.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Lecture 12 Algorithm Analysis Arne Kutzner Hanyang University / Seoul Korea.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
Selecting Forwarding Neighbors in Wireless Ad Hoc Networks
12. Graphs and Trees 2 Summary
Lecture 12 Algorithm Analysis
Clustering TexPoint fonts used in EMF.
Outline Introduction Network Model and Problem Formulation
The Art Gallery Problem
Tree Construction (BFS, DFS, MST) Chapter 5
Research: algorithmic solutions for networking
Connected Dominating Sets
Data Structures – LECTURE 13 Minumum spanning trees
Introduction Wireless Ad-Hoc Network
Lecture 12 Algorithm Analysis
Minimum Spanning Tree Algorithms
MST GALLAGER HUMBLET SPIRA ALGORITHM
Lecture 8: Synchronous Network Algorithms
Compact routing schemes with improved stretch
Introduction to Algorithms: Greedy Algorithms (and Graphs)
Lecture 12 Algorithm Analysis
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Locality In Distributed Graph Algorithms
INTRODUCTION A graph G=(V,E) consists of a finite non empty set of vertices V , and a finite set of edges E which connect pairs of vertices .
Minimum Spanning Trees
Presentation transcript:

Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Network Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Proceedings of the 35th Hawaii International Conference on System Sciences, Jan. 2002 93321530 游精允 2005/06/07

Outline Introduction Lower Bound on Message Complexity Algorithms Das et al’s algorithm Wu and Li’s algorithm Stojmenovic et al’s algorithm Main algorithm Conclusion 2005/06/07 Eugene

Introduction Unit-disk graph: A geometric graph in which there is an edge between two nodes if and only if their distance is at most one. 2005/06/07 Eugene

Dominating set: Given a graph G = (V, E), a dominating set of G is a subset D ⊆ V, such that . 2005/06/07 Eugene

Connected dominating set: (1) CD is a dominating set of G. (2) G[D], the subgraph induced by D is connected. Minimum connected dominated set (MCDS) 2005/06/07 Eugene

Lower Bound on Message Complexity Theorem 1: [2] In asynchronous rings with point-to-point transmission, any distributed algorithm for leader election in sends at least (n log n) messages. Theorem 2/3/4: In asynchronous wireless ad hoc networks whose unit-disk graph is a ring, any distributed algorithm for leader election / spanning tree / nontrivial CDS sends at least (n log n) messages. 2005/06/07 Eugene

Algorithms Das et al’s algorithm (1997) Wu and Li’s algorithm (1999) Stojmenovic et al’s algorithm (2001) Main algorithm (2002) 2005/06/07 Eugene

Das et al’s algorithm Greedily finds a minimal dominated set. Then finds a MST and output its internal nodes. 1 2 2005/06/07 Eugene

deg(vk) = 2k+k+1 deg(u1) = 2k+k deg(vk–1) = 2k–1 deg(u1) = 2k–1–1 CDS: {v1, v2, … , vk} optCDS: {u1, u2} 2005/06/07 Eugene

Message complexity O(n2). Time complexity O(n2). Since n = k + 2k+1, the lower bounds is (lg n)/2–1 of the algorithm. (ratio = O(lg n)) Message complexity O(n2). Time complexity O(n2). The implementation lacks lack mechanisms to bridge two consecutive stages. 2005/06/07 Eugene

Wu and Li’s algorithm The initial connected dominating set U consists of all nodes which have at least two non-adjacent neighbors. Locally redundant: It has either a neighbor in U with larger ID which dominates all other neighbors of u, or two adjacent neighbors with larger IDs which together dominates all other neighbors of u. 1 2 3 4 5 6 7 8 9 10 11 2005/06/07 Eugene

Message complexity O(n2). Time complexity O(3). |CDS| = n |optCDS| = 2 ratio = n/2 Message complexity O(n2). Time complexity O(3). 2005/06/07 Eugene

Stojmenovic et al’s algorithm Independent set: Given a graph G = (V, E), a independent set of G is a subset S ⊆ V, such that no two vertices of S are adjacent in G. A maximal independent set is a independent dominating set 1 2 3 4 5 6 7 8 9 10 11 2005/06/07 Eugene

Each node has a unique rank parameter as the ID. Each node which has the lowest rank among all neighbors broadcasts a message declaring itself as a cluster-head. Whenever a node receives a message for the first time from a cluster-head, it broadcasts a message giving up the opportunity as a cluster-head. Whenever a node has received the giving-up messages from all of its neighbors with lower ranks, if there is any, it broadcasts a message declaring itself as a cluster-head. 1 2 3 4 5 7 8 9 6 10 11 2005/06/07 Eugene

After a node learns the status of all neighbors, it joins the cluster centered at the neighboring cluster-head with the lowest rank by broadcasting the rank of such cluster head. The border-nodes are those which are adjacent to some node from a different cluster. 1 2 3 4 5 7 8 9 6 10 11 2005/06/07 Eugene

Message complexity O(n) ~ O(n2). Time complexity O(n) ~ O(n2). |CDS| = n |optCDS| = 1 ratio = n Message complexity O(n) ~ O(n2). Time complexity O(n) ~ O(n2). 1 2 3 4 5 6 2005/06/07 Eugene

Main algorithm (MIS) The distributed leader election algorithm. (1998) O(n) time complexity and O(n log n) message complexity, to construct a rooted spanning tree T rooted at a node v. Each node identifies its tree level with respect to T. The ranks of all nodes are sorted in the lexicographic order. Message complexity O(nlogn). Time complexity O(n). 0, 1 1, 2 2, 3 1, 4 2, 5 3, 6 3, 7 4, 8 4, 9 5, 10 5, 11 1 2 3 4 5 6 7 8 9 10 11 2005/06/07 Eugene

Theorem 7: The distance between any pair of complementary subsets of U is exactly two hops. Proof(1/2): Let U = {ui: 1  i  k} where ui is the ith node which is marked red. For any 1  j  k, let Hj be the graph over {ui: 1  i  j} in which a pair of nodes is connected by an edge if and only if their graph distance in G is two. Since H1 consists of a single vertex, it is connected trivially. 0, 1 1, 2 2, 3 1, 4 2, 5 3, 6 3, 7 4, 8 4, 9 5, 10 5, 11 2005/06/07 Eugene

Theorem 7: The distance between any pair of complementary subsets of U is exactly two hops. Proof(2/2): Assume that Hj-1 is connected for some j  2. When the node uj is marked red, its parent in T must be already marked orange. Thus, there is some node ui with 1  i < j which is adjacent to uj ’s parent in T. So (ui, uj) is an edge in Hj. As Hj-1 is connected, so must be Hj. 2005/06/07 Eugene

Lemma 8: The size of any independent set in a unit-disk graph G = (V, E) is at most 4opt + 1. (opt = |MCDS|) Proof(1/2): Claim: Any independent set size is at most 5opt. Let U be any independent set of V , and let T* be any spanning tree of an MCDS. Consider an arbitrary preorder traversal of T given by v1, v2, …, vopt. U U1 U2 …… Uopt 2005/06/07 Eugene

Lemma 8: The size of any independent set in a unit-disk graph G = (V, E) is at most 4opt + 1. (opt = |MCDS|) Proof(2/2): Let U1 be the set of nodes in U that are adjacent to v1. For any 2  i  opt, let Ui be the set of nodes in U that are adjacent to vi but none of v1, v2, …, vi-1. |U1|  5, For any 2  i  opt, at least one node in v1, v2, …, vi-1 is adjacent to vi. This implies that |Ui|  4. 2005/06/07 Eugene

Main algorithm (Dominating Tree) Message complexity O(n log n). Time complexity O(n). ratio = 2|U| – 1 = 2(4opt + 1) – 1 = 8opt + 1 0, 1 1, 2 2, 3 1, 4 2, 5 3, 6 3, 7 4, 8 4, 9 5, 10 5, 11 2005/06/07 Eugene

Conclusion 2005/06/07 Eugene