A Unified View to Greedy Routing Algorithms in Ad-Hoc Networks

Slides:



Advertisements
Similar presentations
Costas Busch Louisiana State University CCW08. Becomes an issue when designing algorithms The output of the algorithms may affect the energy efficiency.
Advertisements

ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
Scalable Content-Addressable Network Lintao Liu
Chapter 4 Distributed Bellman-Ford Routing
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Greedy Routing with Guaranteed Delivery Using Ricci Flow Jie Gao Stony Brook University Rik Sarkar, Xiaotian Yin, Feng Luo, Xianfeng David Gu.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
指導教授:許子衡 教授 報告學生:馬敏修 2010/8/ Introduction 2. Geocast Routing Protocols  2.1 GAMER Overview 3. GAMER Details  3.1 Building the Mesh  3.2 Adaptation.
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Ad-Hoc Networks Beyond Unit Disk Graphs
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Global Connectivity from Local Geometric Constraints for Sensor Networks with Various Wireless Footprints Authors: Raissa D’Souza, David Galvin, Cristopher.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006.
Speaker: Li-Sheng Chen 1 Jan 2, 2012 EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing Protocol for Wireless Ad Hoc Networks.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 Two-step Routing and Apex Angle Routing for Delaunay Triangulations PhD Candidate: Weisheng Si Supervisor: Prof. Albert Y. Zomaya School of Information.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
1 Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Fast Failover for Control Traffic in Software-defined Networks Globecom 2012 Neda B. & Ying Z. Presented by: Szu-Ping Wang.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
David S. L. Wei Dept of Computer and Information Sciences Fordham University Bronx, New York Szu-Chi Wang and Sy-Yen Kuo Dept of Electrical Engineering.
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
COSC 2007 Data Structures II Chapter 14 Graphs III.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Routing and Scheduling for mobile ad hoc networks using an EINR approach Harshit Arora Advisor : Dr. Harlan Russell Mobile ad Hoc Networks A self-configuring.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Power Control in Wireless Ad Hoc Networks Background An ad hoc network is a group of self configuring wireless nodes that lack infrastructure. Motivation—Power.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
© Yamacraw, 2001 Selecting Forwarding neighbors in Wireless Ad Hoc Networks A. Zelikovsky GSU G. Calinescun, Illinois IT I. Mandoiu,
Minimizing Recovery State In Geographic Ad-Hoc Routing Noa Arad School of Electrical Engineering Tel Aviv University Yuval Shavitt School of Electrical.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
“Controlled Straight Mobility and Energy-Aware Routing in Robotic Wireless Sensor Networks ” Rafael Falcon, Hai Liu, Amiya Nayak and Ivan Stojmenovic
Ad Hoc Multicast Routing
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Massively Distributed Database Systems In-Network Query Processing (Ad-Hoc Sensor Network) Fall 2015 Ki-Joune Li Pusan.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
VORONOI DIAGRAM AND CONVEX HULL BASED GEOCASTING AND ROUTING IN WIRELESS NETWORKS 指導教授:許子衡 報告學生:翁偉傑 1 Copyright # 2006 John Wiley & Sons, Ltd. Wirel. Commun.
Fundamentals of Computer Networks ECE 478/578
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Asstt. Professor Adeel Akram. Other Novel Routing Approaches Link reversal Aimed for highly dynamic networks Goal: to identify some path, as opposed.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Prof. Yu-Chee Tseng Department of Computer Science
Midpoint Routing algorithms for Delaunay Triangulations
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ECE453 – Introduction to Computer Networks
Presentation transcript:

A Unified View to Greedy Routing Algorithms in Ad-Hoc Networks ○Truong Minh Tien Joint work with Jinhee Chun, Akiyoshi Shioura, and Takeshi Tokuyama Tohoku University Japan

Our Problem and Results Problem: Geometric routing in ad-hoc network. Main Results: Give unified view to known greedy-type routing algorithms. Propose new routing algorithms that works on Delaunay graphs. Compare previous/new algorithms from the viewpoint of guaranteed delivery, fast transmission & power consumption.

Contents Ad-hoc network and geometric routing Previous geometric routing algorithms Desirable properties of routing algorithms Comparison of algorithms Generalized greedy routing algorithm New greedy-type algorithms Sufficient condition for guaranteed packet delivery

Ad-hoc Network Self-organizing network without fixed pre-existing infrastructure Communication between nodes are achieved by multi-hop links Decentralized, mobility-adaptive operation Network topology can be represented by undirected graph G=(V, E) First, I will explain briefly about wireless ad hoc network.

Geometric Routing on Ad-hoc Network Geometric Routing on Ad-hoc network G=(V,E) Send packet from source node S to destination node T (position of T is known in advance) . Packet is repeatedly sent from a node to its neighboring node. No information of entire network; only local information around current node. The routing algorithm used in the ad hoc network is geometric routing. More specifically, geometric routing is a routing algorithm from the source S to the destination T that satisfies: T S V

Greedy Approach for Routing Algorithms Geometric Routing on Ad-hoc network G=(V,E) Greedy approach is often useful: Choose “closer” neighbor to destination in each iteration Which neighbor to choose?  Greedy Routing, Compass Routing, Midpoint Routing, etc. The routing algorithm used in the ad hoc network is geometric routing. More specifically, geometric routing is a routing algorithm from the source S to the destination T that satisfies: T S V

Contents Ad-hoc network and geometric routing Previous geometric routing algorithms Desirable properties of routing algorithms Comparison of algorithms Generalized greedy routing algorithm New greedy-type algorithms Sufficient condition for guaranteed packet delivery

Greedy Routing v t Well, the first and most popular routing algorithm is greedy routing , that was proposed by Finn in 1987. The greedy routing algorithm is based on the idea that we want to get as closer to the destination as possible. Therefore when the packet arrives at V, the next neighbor that we want to send the packet to is the node nearest to the destination. In the figure, the next neighbor is w4 Finn, 1987 The next neighbor w is the node nearest to t smallest 𝑑𝑖𝑠𝑡(𝑤,𝑡)

Compass Routing v t Kranakis, Singh, Urrutia, 1999 smallest ∠𝑤𝑣𝑡 v t The next routing algorithm is compass routing proposed in 1999. In the compass routing, among all the neighbors of V, the packet will be sent to w if the line vw form with the line vt the smallest angle. Kranakis, Singh, Urrutia, 1999 Packet will be sent to w if the line vw forms with vt the smallest angle.

Midpoint Routing v m t Si, Zomaya, 2010 smallest 𝑑𝑖𝑠𝑡(𝑤,𝑚) v m t Next is midpoint routing, proposed recently by Si and Zomaya in 2010. Here we will choose the next neighbor w that is closest to the midpoint m, the midpoint between v and t. Si, Zomaya, 2010 Choose next neighbor w that is closest to midpoint m between v an t

Modified Midpoint Routing v m p t smallest 𝑑𝑖𝑠𝑡(𝑤,𝑝) Finally, we consider the Modified midpoint routing. Let p be any node between m and t and the algorithms will choose the next neighbor that is closest to p. We notice that if p coincide t, the algorithm will become greedy routing. If p coincide m, the algorithm will become midpoint routing. Si, Zomaya, 2010 The next node w closest to p p = t : Greedy routing p = m : Midpoint routing

Contents Ad-hoc network and geometric routing Previous geometric routing algorithms Desirable properties of routing algorithms Comparison of algorithms Generalized greedy routing algorithm New greedy-type algorithms Sufficient condition for guaranteed packet delivery

Desirable Properties of Routing Algorithms Guaranteed Delivery: It is guaranteed that a packet is delivered from source to destination. Fast Transmission: Each packet should be sent with a small number of hops. S T

Desirable Properties of Routing Algorithms Power Consumption: Long edges should not be used as much as possible.

Comparison of Routing Algorithms Guaranteed delivery Number of hops Power Consumption Greedy guaranteed on Delaunay graph very small very large Midpoint small large Modified Midpoint Compass average Need appropriate routing algorithm satisfying desirable properties in response to the request of applications.

Contents Ad-hoc network and geometric routing Previous geometric routing algorithms Desirable properties of routing algorithms Comparison of algorithms Generalized greedy routing algorithm New greedy-type algorithms Sufficient condition for guaranteed packet delivery

Generalized Greedy Routing Unify greedy-type routing algorithms using general objective function. Obtain better understanding of previous algorithms. Propose new algorithms. T = {(w ,v ,t) | w ,v ,t: distinct nodes} (w: next node, v: current node, t: terminal node) General objective function Generalized greedy routing: Choose a neighbor w of v that minimizes f (w, v, t) in each iteration Let T be the set of triplets of w, v and t, where w, v, and t are distinct nodes. We define the general objective function f to be function from T to the union of R and infinity. Here we can unify greedy routing algorithms by generalized greedy routing with objective functions.

Generalized Greedy Routing: Example Choose next node w that minimize f (w, v, t) Example: 7 3 v t 2 The algorithm is that: we choose the next node w that minimize the function value f(w,v,t). In the example here, the function values are 7, 3, 2, and infinity, so we choose w3 to be next node on the route to the destination. +∞

Congruence-Invariant Function w t v w’ v’ In particular, we consider a restricted class of objective functions, that is congruence-invariant function. We say that f is congruence-invariant if the function value f(w ,v ,t) depends only on the shape and size of the triangle wvt. In other words, the function value does not change if we transform the triangle wvt by a combination of translation, rotation and reflection. f is congruence-invariant if function value f (w ,v ,t) depends only on shape and size of .

Congruence-Invariant Function f is congruence-invariant function if there exists a function h such that: w More precisely, f is said to be congruence-invariant function if there exists a function h such that … Now we show that many existing greedy routing algorithms that I explained earlier are special cases of generalized greedy routing. t v

w t w t v v w w t t p m v v Greedy Routing: Min d(w, t) function Compass Routing: Min function w t w t v v Midpoint Routing: Min d(w, m) function M. Midpoint Routing: Min d(w, p) function w w t t p m v v

New routing algorithms

New Greedy I New Greedy II New Greedy III w t v w t v w t v max function w t v New Greedy II min function w t v New Greedy III min function w t v

Contour Map GREEDY - concentric circles about t COMPASS – rays with same endpoint v Figures here show the contour maps of the corresponding functions of these four routings. For the greedy routing, it’s a set of concentric circles about t. For compass routing it’s a set of rays with same endpoint v. For the midpoint routing, it’s a set of concentric circles about m. For the modified midpoint routing, it’s a set of concentric circles about p. Next we will propose 3 new routing algorithms that are also special cases of generalized greedy routing. MIDPOINT - concentric circles about m MODIFIED MIDPOINT - concentric circles about p

Contour Map of New Routings New Greedy I – curves with same chord vt Figures here show the contour maps of the corresponding functions of these four routings. For the greedy routing, it’s a set of concentric circles about t. For compass routing it’s a set of rays with same endpoint v. For the midpoint routing, it’s a set of concentric circles about m. For the modified midpoint routing, it’s a set of concentric circles about p. Next we will propose 3 new routing algorithms that are also special cases of generalized greedy routing. New Greedy II – circles tangent at v New Greedy III – circles tangent at t

Comparison of Routing Algorithms Guaranteed Delivery Number of hops Power Consumption Greedy guaranteed on Delaunay graph Very small Very large Midpoint Small Large Modified Midpoint Compass New Greedy I Average New Greedy II New Greedy III

Properties of New Greedy II, III If graph G contains Delaunay graph. New Greedy II : always selects Delaunay edge without calculating which edge is Delaunay edge. New Greedy III : always selects Delaunay neighbor of t if there is a two-hop path from v to t . Desired by many occasions. New Greedy II – circles tangent at v Let T be the set of triplets of w, v and t, where w, v, and t are distinct nodes. We define the general objective function f to be function from T to the union of R and infinity. Here we can unify greedy routing algorithms by generalized greedy routing with objective functions. New Greedy III – circles tangent at t

Comparison of Routing Algorithms Guaranteed Delivery Number of hops Power Consumption Greedy guaranteed on Delaunay graph Very small Very large Midpoint Small Large Modified Midpoint Compass New Greedy I Average New Greedy II New Greedy III

Contents Ad-hoc network and geometric routing Previous geometric routing algorithms Desirable properties of routing algorithms Comparison of algorithms Generalized greedy routing algorithm New greedy-type algorithms Sufficient condition for guaranteed packet delivery

Delivery on Delaunay graph Known results: Each of greedy, compass, midpoint and modified midpoint routing guarantee delivery of packet on Delaunay graph. Our result: Sufficient condition for guaranteed delivery of generalized greedy routing on Delaunay graph.

Delaunay Delivery Guarantee Condition (DDG) ∀distinct nodes w, v, t ∈ P, if f(w ,v ,t) ≤ max{ f(u ,v ,t) | u ∈D(v ,t)}, then d(w ,t) < d(v ,t) holds d(a ,b) : distance between a and b D(v ,t): open disk of diameter d(v,t) The DGS condition is that : For every distinct nodes w, v and t of P such that w and v are adjacent and t and v are not adjacent, if … , then the distance between w and t is less than the distance between v and t. Here c is the midpoint between v and t.

DDG Condition D C : open disk with diameter vt D : open disk with radius tv about t A = max{f(u, v, t) | u ∈ C} DDG Condition : For all w with f(w, v, t) ≤ A ; w ∈ D w C v t u We can see how the DGS condition works in this figure.

Strong DDG Condition w C : open disk with diameter vt For all      and Strong DDG implies DDG C v t u We can see how the DGS condition works in this figure.

Delivery Guarantee on Delaunay triangulations Theorem. f is a function satisfying (strong) DDG condition.  The algorithm with function f guarantees packet delivery on Delaunay triangulations. w v t u

Routing Algorithms and DDG Condition Theorem. Greedy Routing, Midpoint Routing and Modified Midpoint Routing satisfy DDG condition Theorem. New Greedy Routing I, II, III satisfy Strong DDG condition  Guarantee delivery of packet on Delaunay graphs

Example: New Greedy I on Delaunay triangulation S Or by using midpoint routing And it can also be delivered by using modified midpoint routing, and New greedy I, II and III T

Hybrid of algorithms Theorem. If f and g satisfy (strong) DDG condition, af+bg (a,b>0) also satisfies (strong) DDG condition.  Corresponding algorithm guarantees delivery on Delaunay triangulation Possible to design appropriate hybrid of algorithms based on requirement of application. Now we move on to the second part of finding the sufficient condition for delivery guarantee on the Delaunay triangulation.

Conclusion Our Problem: Geometric routing in Ad-hoc network Our Results: We gave unified view to known greedy-type routing algorithms. We proposed new routing algorithms that works on Delaunay graphs. We compared previous/new algorithms from the viewpoint of guaranteed delivery, fast transmission, & power consumption.

Future Work Consider a metric space with the existence of obstacles and other natural/social conditions in real ad hoc network design. That concludes my talk. Thank you for your attention

Thank You