May 21, 2003Wu and Dai, ICDCS 20031 A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu and Fei Dai Dept. of Comp. Sci. & Eng. Florida.

Slides:



Advertisements
Similar presentations
Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Advertisements

A. BobbioBertinoro, March 10-14, Dependability Theory and Methods 3. State Enumeration Andrea Bobbio Dipartimento di Informatica Università del Piemonte.
Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks L. Li, J. Y. Halpern Cornell University P. Bahl, Y. M.
TinyOS Tutorial, Part I Phil Levis et al. MobiSys 2003.
WS Choreography v.0-1 Overview This is work-in-progress David Burdett, Commerce One 18 June 2003.
TRACES TRAde Control and Expert System
Milano 25/2/20031 Bandwidth Estimation for TCP Sources and its Application Prepared for QoS IP 2003 R. G. Garroppo, S.Giordano, M. Pagano, G. Procissi,
Distributed AI an overview. D Goforth - COSC 4117, fall Why distributed AI? situated expert – the importance of general knowledge and incorporation.
28 July Doors Creating Time Zones. 28 July What is a Time Zone? A designated period of time in which access can be granted to a secure area.
Algorithms and Data Structures Lecture III
Eigen-decomposition Techniques for Skywave Interference Detection in Loran-C Receivers Abbas Mohammed, Fernand Le Roux and David Last Dept. of Telecommunications.
Digital System Clocking:
SWCAP Budgeting July 30, 2003.
CompTest Residual Curing Stresses in Thin [0/90] Unsymmetric Composite Plates Marco Gigliotti°, Michael R. Wisnom, Kevin Potter Department of Aerospace.
A. BobbioReggio Emilia, June 17-18, Dependability & Maintainability Theory and Methods 3. Reliability Block Diagrams Andrea Bobbio Dipartimento di.
Constraint Satisfaction taking advantage of internal structure of states when paths don’t matter.
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Andrea Bobbio Dipartimento di Informatica
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
Topic: Routing and Aggregation An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks (Li,Peng,Chu-
Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks ACM Wireless Networks Journal, 2002 BENJIE CHEN,
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Enhanced Gateway Multipoint Relays for Constructing a Small Connected Dominating Set in Wireless Ad Hoc Networks Ou Liang, Ahmet Sekercioglu.
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 A Distributed and Efficient Flooding Scheme Using 1- Hop Information in Mobile Ad Hoc Networks Department of Computer Science and Information Engineering.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
1 On Multiple Point Coverage in Wireless Sensor Networks Shuhui Yangy, Fei Daiz, Mihaela Cardeiy, and Jie Wuy Department of Computer Science and Engineering.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Power saving technique for multi-hop ad hoc wireless networks.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
12/28/2003CNSF Workshop Localized Algorithms and Their Applications in Ad Hoc Wireless Networks Jie Wu Dept. of Computer Science & Engineering Florida.
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Presented by Fei Huang Virginia Tech April 4, 2007.
Ogier - 1 MANET Extension of OSPF Using CDS Flooding draft-ogier-manet-ospf-extension-03.txt Richard Ogier March 2, 2005 IETF Meeting - OSPF WG.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Efficient Backbone Construction Methods in MANETs Using Directional Antennas 1 Shuhui Yang, 1 Jie Wu, 2 Fei Dai 1 Department of Computer Science and Engineering.
Connected Dominating Sets. Motivation for Constructing CDS.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Broadcast Scheduling in Mobile Ad Hoc Networks ——Related work and our proposed approach By Group 4: Yan Qiao, Yilin Shen, Bharat C. and Zheng Li Presenter:
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
BROADCASTING TECHNIQUES IN AD-HOC NETWORKS A survey on Shubham Bhat Surendra Shenoy References: 1.“
Backbone Topology Synthesis for Multi- Radio Meshed Wireless LANs Huei-jiun Ju and Izhak Rubin University of California, Los angeles(UCLA) Keon Jang, SA.
On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks By J. Wu and H. Li Instructor: Dr. Yinghsu Li Presented by: Chinh.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
SPAN: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks Benjie Chen, Kyle Jamieson, Hari Balakrishnan, Robert.
指導教授:許子衡 教授 學 生:黃群凱 2016/2/251 Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety Columbus, OH, USA. September 22-24,
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Reliable Mobicast via Face- Aware Routing Qingfeng Huang,Chenyang Lu and Gruia-Catalin Roman Department of Computer Science and Engineering Washington.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
Zhen Jiang Comp. Sci. Dept. West Chester University
Topology Control and Its Effects in Wireless Networks
Connected Dominating Sets
Effective Replica Allocation
Localized Algorithms and Their Applications in Ad Hoc Networks
On Constructing k-Connected k-Dominating Set in Wireless Networks
Presentation transcript:

May 21, 2003Wu and Dai, ICDCS A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu and Fei Dai Dept. of Comp. Sci. & Eng. Florida Atlantic University

May 21, 2003Wu and Dai, ICDCS Outline Broadcast Problem & Protocols A Generic Coverage Condition Existing Protocols as Special Cases Simulation Results Conclusions

May 21, 2003Wu and Dai, ICDCS Broadcast Problem & Protocols Promiscuous receive mode Coverage & efficiency Flooding: each node forwards the message once s u v w (a) s u v w (b) s u v w (c)

May 21, 2003Wu and Dai, ICDCS Motivation & Objectives Objective: determine a small set of forward nodes to ensure coverage in a localized way Existing works: different assumptions and models A generic framework to capture a large body of protocols One proof for the correctness of all protocols Address various assumptions/techniques Combine techniques to achieve higher efficiency

May 21, 2003Wu and Dai, ICDCS Classification Probabilistic vs. Deterministic* Deterministic algorithms: forward nodes (including the source) form a CDS CDS: connected dominating set Dominating set: every node in the network has at least one neighbor (dominator) in the DS Non-localized vs. Localized* Self-pruning* vs. Neighbor-designating*

May 21, 2003Wu and Dai, ICDCS Preliminaries: View Unit disk graph: ad hoc network G= (V, E) View: a snapshot of network topology and broadcast state View(t) = (G, Pr(V, t)) Priority: (forwarding status, id) Pr(v, t) = (S(v,t), id(v)), v є V

May 21, 2003Wu and Dai, ICDCS Preliminaries: Forwarding status Forwarding status: time-sensitive visited node (level: 2) vs. unvisited node (level: 1) (past view) Local view: View’, partial view within vicinity visible node vs. invisible node (level: 0) G’ is a subgraph of G and Pr’(V) < Pr(V) time past viewcurrent view broadcast period

May 21, 2003Wu and Dai, ICDCS Pr(v) > Pr(u) based on lexicographical order: visited (2) > unvisited (1) > invisible (0) Global view: {(2, s), (1, u), (2, v), (1, w)} Local 1-hop view of w: {(0, s), (1, u), (2, v), (1, w)} Preliminaries: Priority order s u v w local view of w

May 21, 2003Wu and Dai, ICDCS A Generic Coverage Condition Node v has a non-forwarding status if For any two neighbors u and w, a replacement path consisting of nodes with higher priorities than that of v exists u v w … replacement path

May 21, 2003Wu and Dai, ICDCS A Generic Coverage Condition Proof: Theorem 1 (Wu&Dai, Infocom’03): Forward node set V’ derived based on the coverage condition forms a CDS Each pair of nodes u and v are connected via forward nodes

May 21, 2003Wu and Dai, ICDCS A Generic Coverage Condition Proof :  Forward status f i (v i ) i is computed from G(v i ) and Pr i (V)  Assume f super (v i ) is computed from a global view  G super = (V(v 1 )  V(v 2 )...  V(v n ), E(v 1 )  E(v 2 )...  E(v n ))  Pr super (v i ) = max{Pr 1 (v i ), Pr 2 (v i ),..., Pr n (v i )}  We have f i (v i )  f super (v i ) and {v i |f super (v i )=1} is a CDS  Therefore, {v i |f i (v i )=1} is a CDS Theorem 2: Theorem 1 still holds when different nodes have different local views

May 21, 2003Wu and Dai, ICDCS Timing Issues Static: decision before the broadcast process Dynamic: decision during the broadcast process First-receipt First-receipt-with-backoff s>u>v>x>w vu sw (b) x source vu sw (a) x

May 21, 2003Wu and Dai, ICDCS Selection Issues Self-pruning: v’s status determined by itself Neighbor-designating: v’s status determined by its neighbors Hybrid: The status of v is determined by v and its neighbors

May 21, 2003Wu and Dai, ICDCS Space Issues Network topology information (long lived) Periodic “hello” message K-hop neighborhood information (k=2 or 3) Broadcast state information (short lived) Snooped: snoop the activities of its neighbors Piggybacked: attach h most-recently visited node information (including designated forward neighbors)

May 21, 2003Wu and Dai, ICDCS Priority Issues Pr(v): (forward status, id) 0-hop priority: id(v) 1-hop priority: deg(v) 2-hop priority: ncr(v) ncr (neighborhood connectivity ratio): the ratio of pairs of neighbors that are not directly connected to pairs of any neighbors.

May 21, 2003Wu and Dai, ICDCS A Generic Broadcast Scheme Dynamic approach: dependent on the location of the source and the process of the broadcast process Generic distributed broadcast protocol 1)Periodically v exchanges “hello” messages with neighbors to update local network topology G k (v). 2)v updates priority information Pr based on snooped/piggybacked messages. 3)v applies the coverage condition to determine its status. 4)If v is a non-forward node then stop. 5)v designates some neighbors as forward nodes if needed and updates its priority information Pr. 6)v forwards the packet together with Pr.

May 21, 2003Wu and Dai, ICDCS Existing Protocols as Special Cases Special cases Skipping some steps A strong coverage condition (step 3) Designated forward node selections (step 5) Strong coverage condition v is non-forwarding if it has a coverage set The coverage set belongs to a connected component of nodes with higher priorities than that of v Complexity: O(D 2 ) compared with O(D 3 ), where D is density

May 21, 2003Wu and Dai, ICDCS Static Algorithms (steps 1 and 3) Marking process with Rules 1 &2 (Wu&Li, 1999) with Rule k (Dai&Wu,2003) Span (Chen et al, 2001) (a)(b) (c)

May 21, 2003Wu and Dai, ICDCS Dynamic and Self-Pruning (steps 1, 2, 3, and 6) SBA (Peng&Lu,2000) LENWB (Sucec&Marsic,2000)

May 21, 2003Wu and Dai, ICDCS Dynamic and Neighbor Designating (steps 1,2,4,5,and 6) Multipoint relay (MPR) (Qayyum et al, 2002) Dominant pruning (Lim&Kim, 2001) Total/partial dominant pruning (Lou&Wu, 2003) uv N(v) N 2 (u)

May 21, 2003Wu and Dai, ICDCS Dynamic and Hybrid (new) Designate one neighbor before applying the coverage condition uv N(v) N 2 (u)

May 21, 2003Wu and Dai, ICDCS Simulation Parameters n: node#, d: average node degree r: transmission range, adjusted to keep a fixed d (6 or 18) as n varies k: neighborhood radius, e.g., k=2 represents 2- hop information Performance measure : forward node Confidence interval (90%):  1%

May 21, 2003Wu and Dai, ICDCS A Sample Broadcasting n=100, d=6, r=16, k=2

May 21, 2003Wu and Dai, ICDCS Timing Options Performance from worst to best Static First receipt First receipt with backoff delay

May 21, 2003Wu and Dai, ICDCS Selection Options One hybrid algorithm (MaxDeg) outperforms both self-pruning (SP) and neighbor-designating (ND) algorithms.

May 21, 2003Wu and Dai, ICDCS Space Options Larger k has higher performance Using more than 3-hop information cannot improve the performance significantly

May 21, 2003Wu and Dai, ICDCS Priority Options Performance from worst to best id degree ncr

May 21, 2003Wu and Dai, ICDCS Simulated Special Cases CategorySelf- pruning Neighbor- designating StaticRule k, SpanMPR First-receiptLENWBDP,PDP First-receipt- with-backoff SBA Three new algorithms (all labeled as Generic) are derived from the coverage condition, one for each category.

May 21, 2003Wu and Dai, ICDCS Static Algorithms Performance from worst to best MPR Span Rule k Generic

May 21, 2003Wu and Dai, ICDCS First-receipt Algorithms Performance from worst to best Dominant Pruning (DP) Partial Dominant Pruning (PDP) LENWB Generic

May 21, 2003Wu and Dai, ICDCS First-receipt-with-backoff Algorithms Performance from worst to best SBA Generic

May 21, 2003Wu and Dai, ICDCS Conclusions A generic broadcast scheme in ad hoc wireless network Future work Rule of unvisited but designated nodes In-depth simulation using ns-2