Connected Dominating Sets

Slides:



Advertisements
Similar presentations
Scalable Content-Addressable Network Lintao Liu
Advertisements

Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
Topic: Routing and Aggregation An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks (Li,Peng,Chu-
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Power saving technique for multi-hop ad hoc wireless networks.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Fast Spectrum Allocation in Coordinated Dynamic Spectrum Access Based Cellular Networks Anand Prabhu Subramanian*, Himanshu Gupta*,
Routing in Communication Networks Routing: Network layer protocol that guides information units to correct destinations. A complex collection of decision.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
CS-691 SEMINAR Dr. Omar Abdullah Batarfi
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
1 Self-stabilizing Algorithms and Frequency Assignment Problems.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
Connected Dominating Sets. Motivation for Constructing CDS.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
Chapter 6 Relaxation (1) CDS in unit disk graph
Maximizing the lifetime of WSN using VBS Yaxiong Zhao and Jie Wu Computer and Information Sciences Temple University.
Efficient Flooding in Ad Hoc Networks: a Comparative Performance Study
Backbone Topology Synthesis for Multi- Radio Meshed Wireless LANs Huei-jiun Ju and Izhak Rubin University of California, Los angeles(UCLA) Keon Jang, SA.
On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks By J. Wu and H. Li Instructor: Dr. Yinghsu Li Presented by: Chinh.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Max-Min D-Cluster Formation in Wireless Ad Hoc Networks
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
Time Synchronization in based MANETs Ten H. Lai Ohio State University.
Maximizing Ad-Hoc network lifetime Yael Ochbaum Orit Varsano Supervised by Michael Segal.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
Greedy Algorithms.
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
MMLAB NETWORK SEMINAR Tree-Based Data Broadcast in IEEE and ZigBee Networks Written by Gang Ding(Purdue Univ.), Zafer Sahinoglu(MERL), Philip.
Virtual Domain and Coordinate Routing in Wireless Sensor Networks
Maximal Independent Set
Clustering TexPoint fonts used in EMF.
Clustering Chapter 7 TexPoint fonts used in EMF.
TexPoint fonts used in EMF.
Research: algorithmic solutions for networking
Robustness of wireless ad hoc network topologies
Introduction to locality sensitive approach to distributed systems
Effective Replica Allocation
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Introduction Wireless Ad-Hoc Network
Time Synchronization in based MANETs
Self-protection experiment
Dynamic Routing Protocols part3 B
Dominating Set By Eric Wengert.
On Constructing k-Connected k-Dominating Set in Wireless Networks
Survey on Coverage Problems in Wireless Sensor Networks
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Locality In Distributed Graph Algorithms
(via graph coloring and spilling)
Presentation transcript:

Connected Dominating Sets yili@cs.umn.edu

Motivation for Constructing CDS yili@cs.umn.edu

What Is CDS? A dominating set (DS) is a subset of all the nodes such that each node is either in the DS or adjacent to some node in the DS. yili@cs.umn.edu

What Is CDS? A connected dominating set (CDS) is a subset of the nodes such that it forms a DS and all the nodes in the DS are connected. yili@cs.umn.edu

Applications of CDS: Virtual backbone Flooding Reduction of communication overhead Redundancy Contention Collision Reliability Unreliability CDS is used as a virtual backbone in wireless networks. yili@cs.umn.edu

Applications of CDS: Broadcast Only nodes in CDS relay messages Reduce communication cost Reduce redundant traffic yili@cs.umn.edu

Applications of CDS: Unicast Only nodes in CDS maintain routing tables Routing information localized Save storage space A  B ? A: B:  C:  D:  A  B ? A:  B: C: D:  C D B A  B A yili@cs.umn.edu

Applications of CDS: Coverage Area Coverage Problem CDS provides connectivity yili@cs.umn.edu

Applications of CDS: Coverage Target Coverage Problem CDS provides connectivity yili@cs.umn.edu

Motivation for Constructing CDS CDS plays an important role in wireless networks. Challenges How to construct a CDS? How to make the size of a CDS small?

CDS Construction Algorithms yili@cs.umn.edu

Definition & Preliminaries Minimum connected dominating set Given: a graph G=(V,E). Goal: find the smallest CDS. NP-hard Approximation algorithms Performance ratio (PR) = |C|/|C*| Smaller PR, better algorithm. yili@cs.umn.edu

Definition and Preliminaries (Cont.) Notations Given a graph G and a DS C, all nodes in G can be divided into three classes. Black nodes: Nodes belong to C. Grey nodes: Nodes are not in C but adjacent to C. White nodes: Nodes are neither in C nor adjacent to C. C yili@cs.umn.edu

Greedy Algorithm in General Graph Guha’s algorithm 1 Select the node with the max number of neighbors as a dominating node. Iteratively scans the grey nodes and their white neighbors. Select the grey node or the pair of nodes with the max number of white neighbors. PR = 2(1 + H(Δ)) yili@cs.umn.edu

Greedy Algorithm in General Graph Guha’s algorithm 2 Iteratively select the node with the max number of white neighbors as a dominating node. The first phase terminates when there are no white nodes. Color some grey nodes black to connect all the black nodes. PR = 3 + ln(Δ) yili@cs.umn.edu

Greedy Algorithm MIS DS Maximal Independent Set (MIS) is a maximal set of pair-wise non-adjacent nodes. MIS DS yili@cs.umn.edu

Greedy Algorithm MIS DS Idea: connect MIS CDS yili@cs.umn.edu

Centralized Algorithm Alzoubi’s Algorithm Construct a rooted spanning tree from the original network topology yili@cs.umn.edu

Centralized Algorithm Alzoubi’s Algorithm Color each node to be black or grey based on its rank (level. ID). The node with the lowest rank marks itself black. All the black nodes form an Maximal Independent Set (MIS). yili@cs.umn.edu

Wu’s Algorithm Each node exchanges its neighborhood information with all of its one-hop neighbors. Any node with two unconnected neighbors becomes black. The set of all the black nodes form a CDS. yili@cs.umn.edu

Wu’s Algorithm yili@cs.umn.edu

r-CDS For each node u r(u) = the number of 2-hop-away neighbors – d(u) where d(u) is the degree of node u 2 -3 -1 1 -2 3 11 2 5 4 9 8 10 7 6 1 yili@cs.umn.edu

r-CDS Node u with the smallest <r, deg, id> within its neighborhood becomes black and broadcast a BLACK message where deg is the effective degree. 2 -3 -1 1 -2 3 11 2 5 4 9 8 10 7 6 1 yili@cs.umn.edu

r-CDS If v receives a BLACK message from u, v becomes grey and broadcasts a GREY message containing (v, u). 2 -3 -1 1 -2 3 11 2 5 4 9 8 10 7 6 1

r-CDS black node w receives a GREY message (v, u) w not connected to u Color v blue (5, 0) 2 -3 -1 1 -2 3 11 2 5 4 9 8 10 7 6 1

r-CDS v has received a GREY message (x, y) v receives a BLACK message from u y & u not connected Color v and x blue BLACK 2 -3 -1 1 -2 3 11 2 5 4 (8, 11) 9 8 10 7 6 1

Load-Balanced CDS (LBCDS) 1 2 1 2 3 4 5 6 7 8  Load-Balanced CDS 3 4 Minimized size + load balance 5 6 7 8 Minimum-sized CDS

Load-Balancedly Allocate Dominatees (LBAD) 1 2 1 2 3 4 5 6 7 8  3 4 5 6 7 8 Unbalanced Allocation Balanced Allocation

Load-Balanced Virtual Backbone LBCDS + LBAD First, solve the LBCDS problem to find load- balanced dominators And then, solve the LBAD problem to find a load-balanced job assignment scheme. Help extend network lifetime

Measure load-balance (in General) Feature vector p > 1 p-norm: p = 2

Measure load-balance of MCDS and LBCDS degree of each dominator mean degree of the graph CDS p-norm: p = 2 1 2 d3 = 4 4 5 d6 = 4 d7 = 3 8 LBCDS 3 d4 = 6 6 MCDS 4 3 7 6 7

Greedy algorithm for LBCDS degree of each dominator mean degree of the graph Greedy criterion: d1 = 2 d2 = 2 d3 =4 d4 = 6 d5 = 2 d6 = 4 d7 = 3 d8 = 1 1 2 DO { Mark one node si satisfying as black. } UNTIL {All black nodes form a CDS} 3 4 Potential allocation more opportunity Converge fast 5 6 7 8

p-norm for the LBAD problem Valid Degree ( di’ ) Allocation p-norm: d1’ = 1 d2’ = 1 d3’ = 2 d4’ = 1 d5’ = 1 d6’ = 2 d7’ = 1 d8’ = 1 Load-Balanced Allocation d3’ = 3 d6’ = 1 Unbalanced Allocation 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8

Probability-Based Allocation Scheme Allocate dominatees to dominators deterministically cannot guarantee the load-balance. Probability-based allocation: Expected allocated dominatees on each dominator are exactly the same. 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 1 3/8 2/8 d4’ = 5 d3’ = 3 2/7 5/7 d7’ = 2 d6’ = 2 d7’ = 2 2/7 * 5 = 5/7 * 2 2/8 * 3 = 3/8 * 2 = 3/8 * 2