Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Self Stabilizing Algorithms for Topology Management Presentation: Deniz Çokuslu.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
LOCALITY IN DISTRIBUTED GRAPH ALGORITHMS Nathan Linial Presented by: Ron Ryvchin.
Christoph Lenzen, PODC What is a Maximal Independet Set (MIS)? inaugmentable set of non-adjacent nodes well-known symmetry breaking structure many.
Ad-Hoc Networks Beyond Unit Disk Graphs
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Exponential.
A Unified Energy Efficient Topology for Unicast and Broadcast Xiang-Yang Li*, Wen-Zhang Song † and WeiZhao Wang* *Illinois Institute of Technology † Washington.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
ETH Zurich – Distributed Computing Group Jasmin Smula 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Minimum.
Ad Hoc and Sensor Networks – Roger Wattenhofer –10/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Clustering Chapter 10 TexPoint fonts used in EMF.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Distributed Computing Group Locality and the Hardness of Distributed Approximation Thomas Moscibroda Joint work with: Fabian Kuhn, Roger Wattenhofer.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Computer Algorithms Submitted by: Rishi Jethwa Suvarna Angal.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
Connected Dominating Sets. Motivation for Constructing CDS.
A graph problem: Maximal Independent Set Graph with vertices V = {1,2,…,n} A set S of vertices is independent if no two vertices in S are.
Ad Hoc and Sensor Networks – Roger Wattenhofer –7/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Clustering Chapter 7 TexPoint fonts used in EMF. Read.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Union Find ADT Data type for disjoint sets: makeSet(x): Given an element x create a singleton set that contains only this element. Return a locator/handle.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Portland, Oregon, 13 August, 2007 A Randomized Distributed Algorithm for the Maximal Independent Set Problem in Growth-Bounded Graphs Beat Gfeller, Elias.
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
1 Distributed Vertex Coloring. 2 Vertex Coloring: each vertex is assigned a color.
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Distributed Algorithms for Network Diameter David Peleg, Liam Roditty and Elad Tal.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
ETH Zurich – Distributed Computing Group Stephan HolzerETH Zurich – Distributed Computing – Stephan Holzer - ETH Zürich Thomas Locher.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
Monitoring Churn in Wireless Networks
Leveraging Linial's Locality Limit
Clustering TexPoint fonts used in EMF.
TexPoint fonts used in EMF.
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Presentation transcript:

Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA

Johannes Schneider –2 Motivation Maximal Independent Set (MIS) algorithms allow to get Connected Dominating Sets (CDS) and Minimum Dominating Sets (MDS) for wireless multi-hop networks MDS and CDS are useful for –Routing –Media access control –Coverage –… Compute CDS/MDS with little communication to save valuable time and energy

Johannes Schneider –3 Model and Definitions Maximal Independent Set (MIS) –Node v in MIS or ≥1 neighbor in MIS –Nodes u,v in MIS cannot be adjacent Unit Disk Graph (UDG) –Geometrical graph –Edge between nodes u,v if dist(u,v) < 1 –Growth bounded –Maximum size of an independent set in the neighborhood of a node is at most 5 Every node has an ID in [1,n] A node communicates with neighbors in synchronized rounds without interference Definition log* –How often one has to take the logarithm to get 1 –Example: log* 16 = 3 since log 16 = 4; loglog 16 = 2; logloglog 16 = 1

Johannes Schneider –4 Every node performs competitions (with breaks) until it (or a neighbor) is in the MIS Competition –First one based on ID to obtain result r –Node v picks neighbor u with smallest ID –If ID_v ≤ ID_u – result r_v is 0 –If ID_v > ID_u –result r_v is the maximum position where ID_v has a 1 and ID_u has a 0. –Example: Position ID_v ID_u  r_v = 11 (binary) Algorithm ID_a 10 r_a 0 ID_u 1010 r_u 100 ID_v 1101 r_v 11 ID_d 1100 r_d 11

Johannes Schneider –5 What to do with the result of a competition? Node v changes its state depending on its result and those of neighbors. Dominator –If result r_v < r_u for all neighbors u –Joins the MIS –Neighbors are dominated and stay quiet Ruler –if result r_v ≤ r_u for all neighbors u and at least one has same result –All neighbors become ruled (if not dominated or rulers themselves) –Ruled nodes stay quiet until all neighbors become ruled or dominated. –Rulers immediately become competitors again and compete again based on IDs Competitor –None of above conditions applies –Compete again based on the result of the last competition

Johannes Schneider –6 How many competitions? How often must a competitor compete before changing its state? –at most log* n times The result of log* n consecutive competitions must be 1. Proof –The result of the 1 st competition is in [0,log n] –The result gives an index of a bit of the ID –An ID in [1,n] => needs log n bits –… 2 nd … in [0,loglog n] –Since the previous result has up to loglog n bits –a.s.o. Once a node has result 1, it must change its state. –Either its own result is a minimum or a neighbor has smallest result possible, i.e. 0.

Johannes Schneider –7 How often can a node be before changing to ? Let S be the set of connected competitors with v in S A node not in S cannot join before v is ruled or dominated v

Johannes Schneider –8 How often can a node be before changing to ? S shrinks with every transition –When v becomes a ruler, one 2-hop neighbor w in S is not reachable by a path of rulers! –Node w (and all its neighbors) cannot be in S any more. v w

Johannes Schneider –9 How many of such 2-hop neighbors W exist? For the UDG there exist only 13 such 2 hop neighbors W for a node v. v w

Johannes Schneider –10 After a competitor has become a ruler 13 times (without becoming ruled), no 2 hop neighbor can be reached by a path of rulers. Thus all neighbors of ruler v, that are still rulers form a clique. In the next competition based on the ID, the ruler of the clique with the smallest ID becomes a dominator! How often can a node be before changing to ?

Johannes Schneider –11 After log* n competitions a competitor changes its state. –If dominated or dominator it is done A competitor can become a ruler at most 13 times in a row. After 13·log* n competitions every node gets a dominator within distance 13. Within distance 13 there are at most 13 2 nodes in an independent set, thus the maximum comptetions the algorithm needs are 13 3 ·log* n. How many competitions for an arbitrary node? … … … … … Distance <= 13 |W|

Johannes Schneider –12 Related work How many rounds of communication to get a MIS? –Lower bounds –on ring  (log* n) [Lineal92] –on general graphs  (log n/loglog n) [Kuhn05] –Upper bounds –On general graphs O(log n) [Luby86] … a CDS? –Lower bounds –on UDG  (log* n) [Lenzen08] –Upper bounds –on UDG O(loglog n log*n) [VicariGfeller07] –on UDG with distance information O(log* n) [Kuhn05] Here: MIS, CDS, MDS and Coloring on UDG in O(log* n)

Johannes Schneider –13 Thanks for your attention