Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
TDMA Scheduling in Wireless Sensor Networks
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Andrea Richa1 Interference Models: Beyond the Unit-disk and Packet-Radio Models Andrea W. Richa Arizona State University.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
1 An O(log n) Dominating Set Protocol for Wireless Ad- Hoc Networks under the Physical Interference Model Andrea W. Richa Arizona State University Joint.
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Mingyuan Yan, Shouling Ji, and Zhipeng Cai Presented by: Mingyuan Yan.
Distributed Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopDistributed Algorithms1.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta NCA’03 speaker : Chi-Chih.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
4 Introduction Broadcasting Tree and Coloring System Model and Problem Definition Broadcast Scheduling Simulation 6 Conclusion and Future Work.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
Prof. Yu-Chee Tseng Department of Computer Science
Ad Hoc Radio Networks Radio Network is a collection of transmitter-receiver devices (denoted as notes). Each node can transmit data to nodes which exist.
Computing and Compressive Sensing in Wireless Sensor Networks
Wireless Sensor Network Architectures
Net 435: Wireless sensor network (WSN)
TexPoint fonts used in EMF.
Introduction Wireless Ad-Hoc Network
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
Protocols.
Protocols.
Presentation transcript:

Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1

Ad hoc Networks ●Network created by wireless stations communicating over a wireless medium ●Two challenges –Lack of centralized infrastructure –Mobility 2

Ad hoc Networks ●Network created by wireless stations communicating over a wireless medium ●Two challenges –Lack of centralized infrastructure –Mobility ●Need topology control in ad hoc networks –Local control strategies are needed –Support time and energy efficient routing ●How to model ad hoc networks? –Need models that are close to reality –But can still design algorithms using the model 2

Modeling Wireless Networks ●Wireless communication very difficult to model accurately –Shape of transmission range –Interference –Mobility –Physical Carrier Sensing 3

Outline Introduction → Models of Wireless networks ●Our model ●Our results ●Problem description –Running Example ●Conclusions 4

Models of Wireless Networks ●Unit Disk Graph (UDG) –Given a transmission radius R, nodes u, v are connected if d(u,v) ≤ R –Too simple model 5 u R v u'

●What is the problem? –Transmission range could be arbitrary shape 5 R R u R v u' u Models of Wireless Networks ●Unit Disk Graph (UDG) –Given a transmission radius R, nodes u, v are connected if d(u,v) ≤ R –Too simple model

●Packet Radio Network (PRN) –Can handle arbitrary shapes –Widely used –Nodes u, v can communicate directly if they are within each other's transmission range, r t. 6 u v w v' Models of Wireless Networks

What is the problem? ●Model for interference too simplistic 7 u v w v'

●w can still interfere at u ●PRN model fails to address certain interference problems in practice v n-2 s t ≤rt ≤rt ≤ r t ≤ r i ≥ r t 7 What is the problem? u v w v'

8 ●Transmission Range, Interference Range –Separate values for transmission range, interference range. –Interference range constant times bigger than transmission range. –Used in e.g., [Adler and Scheideler '98], [Kuhn et. al., '04] Models of Wireless Networks u rtrt v w u' riri

8 ●Transmission Range, Interference Range –Separate values for transmission range, interference range. –Interference range constant times bigger than transmission range. –Used in e.g., [Adler and Scheideler '98], [Kuhn et. al., '04] ●What is the problem? –Extension of unit disk model to handle interference Models of Wireless Networks u rtrt v w u' riri

9 Outline Introduction Models of Wireless Networks → Our Model ● Our results ●Problem description –Running Example ●Conclusions

Our Model ●Transmission range, interference range via cost function ●Carrier sensing –Two types 1)Physical carrier sensing 2)Virtual carrier sensing 10

Cost Function ●G r = (V, E r ), set of nodes V, Euclidean distance d(,) ●c is a cost function on nodes –symmetric: c(u,v) = c(v,u) −  [0,1), depends on the environment –c(u,v)  [(1-  ) d(u,v), (1+  ) d(u,v)] ● Edge (u,v)  E r if and only if c(u,v) ≤ r w u v a b 11

Transmission and Interference Range ●Transmission range denoted r t (P), Interference range, r i (P) –If c(v,w) ≤ r i (P), node v can cause interference at node w. –If c(v,w) ≤r t (P) then v is guaranteed to receive the message from w provided no other node v' with c(v, v') ≤ r i (P) also transmits at the same time. 12 w rt(P)rt(P) v' ri(P)ri(P) u v c(v,w)  r t (P) c(v, v')  r i (P)

Physical Carrier Sensing ●Provided by Clear Channel Assessment (CCA) circuit: –Monitor the medium as a function of Received Signal Strength Indicator (RSSI) –Energy Detection (ED) bit set to 1 if RSSI exceeds a certain threshold –Has a register to set the threshold in dB 13

Physical Carrier Sensing ●Carrier sense transmission (CST) range, denoted r st (T, P) ●Carrier sense interference (CSI) range, denoted r si (T, P) ●Both the ranges grow monotonically in both T and P. w v r st (T,P) v' v'' 14 r si (T,P) c(w,v)  r st (T, P) c(w, v')  r si (T, P) c(w, v'')  r si (T, P)

Virtual Carrier Sensing 1. RTS s t 15 ●Done with the use of two control signals –Request To Send (RTS) –Clear To Send (CTS) ●DATA transmission begins after receipt of CTS

Virtual Carrier Sensing ●Done with the use of two control signals –Request To Send (RTS) –Clear To Send (CTS) ●DATA transmission begins after receipt of CTS CTS s t

Virtual Carrier Sensing DATA s t ●Done with the use of two control signals –Request To Send (RTS) –Clear To Send (CTS) ●DATA transmission begins after receipt of CTS

16 Outline Introduction Models of Wireless Networks Our Model → Our Results ●Problem description –Running Example ●Conclusions

Our Results ●More general model for ad hoc wireless networks ●Constant density topological spanner for the original network –Local-control –Self-stabilizing [Dijkstra '74] –No knowledge of size or topology of network, including estimate of size –Nodes do not need globally distinct labels –Constant storage and constant size messages 17

18 Outline Introduction Models of Wireless Networks Our Model Our Results → Problem Description –Running Example ●Conclusions

Topological Spanners ●Definition: Given a graph G = (V,E), find a sub- graph H = (V, E') such that d H (u,v) ≤ t d G (u,v) –H is also called a t-spanner. ●Previous Work –[Alzoubi et. al., '03] 5-spanner –[Dubhashi et. al., '03] log n – spanner 19

Our Approach 20 ●Dominating set: Given a graph G = (V,E) a subset U such that all nodes are either in U or have a neighbor in U. –Density of U is the maximum number of neighbors that any node has in U. Dominator Density = 3

●Seek a connected dominating set of constant density. 20 Our Approach ●Dominating set: Given a graph G = (V,E) a subset U such that all nodes are either in U or have a neighbor in U. –Density of U is the maximum number of neighbors that any node has in U. Dominator Density = 3

Our Approach ●Each round has time slots reserved for each phase of the protocol 21 Time One round Phase IPhase II Phase III Phase IPhase IIPhase III ●Three phase protocol 1.Phase I: Dominating set 2.Phase II: Distributed Coloring 3.Phase III: Gateway Discovery

22 Outline Introduction Models of Wireless Networks Our Model Our Results Problem Description → Running Example ●Conclusions

Phase I: Constant Density Dominating Set ●Observation: In G r = (V, E r ) any Maximal Independent Set (MIS) is also a dominating set of constant density ●Maximal Independent Set –well studied starting from [Luby '85], [Dubhashi et. al., '03], [Kuhn et. al., '04], [Gandhi and Parthasarathy '04] ●Our solution –Uncertainties in our model make it harder –Without knowing size of network, have to use physical carrier sensing –Randomized protocol that runs in O(log 4 n) w.h.p. 23

●Nodes choose a state {Active, Inactive} ●Two different sensing thresholds: –active nodes use CSI range = r t –inactive nodes use CST range = r i 24 Inactive Active Phase I: Constant Density Dominating Set

●If an active node sends a LEADER signal, the nodes that receive/sense the leader signal stay inactive Changed from Active  Inactive ●Nodes choose a state {Active, Inactive} ●Two different sensing thresholds: – active nodes use CSI range = r t – inactive nodes use CST range = r i 24 Inactive Active and sent LEADER Phase I: Constant Density Dominating Set

Dominators Inactive nodes ●Nodes choose a state {Active, Inactive} ●Two different sensing thresholds: –active nodes use CSI range = r t –inactive nodes use CST range = r i ●If an active node sends a LEADER signal, the nodes that receive/sense the leader signal stay inactive ●If no active node available, inactive nodes become active again 24

Phase II: Distributed Coloring ●U := output of phase I, also called active nodes ●Active nodes choose colors (equiv. time rounds) such that nodes that are not r i  r i apart have different colors. 25 riri riri u v w u v w

Output of Phase II ●Time arranged as rounds ●Each round has time slots reserved for communication in each phase ●Transmission of active node during the corresponding round is free of interference! 26 One round Phase IPhase II Phase III Phase IPhase IIPhase III Time

Phase III: Gateway Discovery ●Dominating set U may not be a connected dominating set –Extend U by gateway nodes. ●Observation: Each node in U needs O(1) gateways. ●Uses coloring achieved in Phase II to minimize interference problems ●Approach similar to that used in [Wang and Li, '03] 27

Phase III Gateway Discovery u l l' CLIENT(u) v ● If CLIENT messages interfere at active node, l, then the active nodes sends a COLLISION signal 28

Phase III Gateway Discovery ACK ● Eventually only one inactive node sends a CLIENT message to an active node 28 u l l' v

Phase III Gateway Discovery 28 ●After receiving ACK from l, u advertises presence of l via ADV message. ADV(u,l) (( () )) u l l' v

Phase III Gateway Discovery Phase III 28 GATEWAY(l,u,v,l') (( () )) u l l' v u l v Active node Inactive node Gateway node Gateway edge Other edges

3-Spanner ●Our construction achieves a 3-spanner of constant density for the original network. ●Total runtime = O(log 4 n + (D log D) log n) whp. –D is the density of the original network 29 u l l' v s t Active node Inactive node Gateway node Gateway edge Other edges

30 Outline Introduction Models of Wireless Networks Our Model Our Results Problem Description Running Example → Conclusions

Conclusions and Future Work ●More realistic model for wireless networks ●Still possible to design efficient algorithms –Constant density 3-spanner –Algorithms are simple and use constant sized messages, constant storage at nodes ●Further applications –Higher communication primitives e.g., broadcasting, gathering –Handling mobility 31