Broadcasting in UDG Radio Networks with Unknown Topology Yuval Emek, Leszek Gąsieniec, Erez Kantor, Andrzej Pelc, David Peleg, Chang Su, Weizmann Liverpool.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

SINR Diagram with Interference Cancellation Merav Parter Joint work with Chen Avin, Asaf Cohen, Yoram Haddad, Erez Kantor, Zvi Lotker and David Peleg SODA.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Distributed Leader Election Algorithms in Synchronous Ring Networks
Small-world networks.
Two absolute bounds for distributed bit complexity Yefim Dinitz, Noam Solomon, 2007 Presented by: Or Peri & Maya Shuster.
Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.
TDMA Scheduling in Wireless Sensor Networks
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU)
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Ad Hoc and Sensor Networks – Roger Wattenhofer –7/1Ad Hoc and Sensor Networks – Roger Wattenhofer – MAC Theory Chapter 7 TexPoint fonts used in EMF. Read.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Polylogarithmic Inapproximability of Radio Broadcast Guy Kortsarz Joint work with: Michael Elkin.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Dariusz Kowalski University of Connecticut & Warsaw University Andrzej Pelc University of Quebec en Outaouais Broadcasting in Undirected Ad hoc Radio Networks.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 Brief Announcement: Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg: Open University of Israel Moshe Schwartz:
Adaptiveness vs. obliviousness and randomization vs. determinism Dariusz Kowalski University of Connecticut & Warsaw University Andrzej Pelc University.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Power Optimization for Connectivity Problems MohammadTaghi Hajiaghayi, Guy Kortsarz, Vahab S. Mirrokni, Zeev Nutov IPCO 2005.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
Introduction to Wireless Networks Davide Bilò
GS 3 GS 3 : Scalable Self-configuration and Self-healing in Wireless Networks Hongwei Zhang & Anish Arora.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
Distributed Algorithms on a Congested Clique Christoph Lenzen.
Distributed Verification and Hardness of Distributed Approximation Atish Das Sarma Stephan Holzer Danupon Nanongkai Gopal Pandurangan David Peleg 1 Weizmann.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
ACSS 2006, T. Radzik1 Communication Algorithms for Ad-hoc Radio Networks Tomasz Radzik Kings Collage London.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Wireless Communication using Directional Antennas.
Andrea CLEMENTI Radio Networks The Model Broadcast.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
Ad Hoc Radio Networks Radio Network is a collection of transmitter-receiver devices (denoted as notes). Each node can transmit data to nodes which exist.
Michael Langberg: Open University of Israel
The Model & Basic Computations
Leveraging Linial's Locality Limit
Deterministic Leader Election in Multi-Hop Beeping Networks
Outline Introduction Network Model and Problem Formulation
TexPoint fonts used in EMF.
Research: algorithmic solutions for networking
Near-Optimal (Euclidean) Metric Compression
Introduction Wireless Ad-Hoc Network
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Overview: Chapter 4 Infrastructure Establishment
Survey on Coverage Problems in Wireless Sensor Networks
Presentation transcript:

Broadcasting in UDG Radio Networks with Unknown Topology Yuval Emek, Leszek Gąsieniec, Erez Kantor, Andrzej Pelc, David Peleg, Chang Su, Weizmann Liverpool Weizmann Québec Weizmann Liverpool

UDG radio networks stations = points in in every round: transmit or receive transmitting range = 1 unit disk graph – UDG (nodes, edges, paths, …) message heard iff exactly one neighbor transmits else: silence or collision (same effect) distributed synchronous model

w u v (2) single transmission(1) no transmission (silence) (3) multiple transmission v can receive the message from u v cannot receive the message distributed synchronous model

w u v (1) no transmission (silence) (3) multiple transmission v cannot receive the message collisions cannot be distinguished from silence distributed synchronous model

Unknown topology (ad hoc) each node knows its own coordinates does not know the: the number of nodes the diameter a unique coordinate system coordinates of any other node

Unknown topology (ad hoc) known granularity g = inverse of minimum Euclidean distance typically: d is much smaller then 1 and g is much larger than 1, for every pair of nodes

Broadcasting a distinguished source node source’s message should be heard by all nodes remote nodes – use graph’s paths connected graphs

Broadcasting conditional wake up: - nodes are initially idle spontaneous wake up: – all nodes are awake from the beginning wakes up upon hearing a message two models are considered: execution time = #rounds until all nodes hear the source’s message

Deterministic model decisions of a node on round t depends only on: own coordinates messages heard so far t itself

This work execution time depends on two parameters: = diameter of the UDG network (in hops) not Euclidean diameter = granularity: inverse of min Euclidean distance sv

This work conditional wake up lower boundupper bound spontaneous wake up

Previous results roughly divided into 2 subareas: centralized: complete knowledge, designing fast schedulers distributed: local knowledge, designing fast protocols (this work)

Centralized model Chlamtac, Kutten ’85: formulating the model of radio networks Chlamtac, Weinstein ‘91 Gaber, Mansour ‘95 Elkin, Kortsarz ‘05 Gasieniec, Peleg, Xin ‘05 Kowalski, Pelc (to appear) from to Alon, Bar-Noy, Linial, Peleg ’91: constant D

Distributed model Bar-Yehuda, Goldreich, Itai ’92: Kushilevitz, Mansour ’98: unknown topology, no labels, randomized: first to study distributed broadcasting (also deterministic) Czumaj, Rytter ’03: (tight!)

Distributed model Kowalski, Pelc ’05: unknown topology, knowing own labels, conditional wake up, deterministic Chlebus, Gasieniec, Gibbons, Pelc, Rytter ’02: unknown topology, knowing own labels, spontaneous wake up, deterministic: Kowalski, Pelc ’05:

Distributed model Ravishankar, Singh ’94: points randomly placed on a line geometric embedding: Kranakis, Krizanc, Pelc ’01: fault-tolerant Diks, Kranakis, Krizanc, Pelc ’01: points on a line, restricted knowledge radius Dessmark, Pelc ‘07: points in the plane, restricted knowledge radius, consecutive labels #stations may be

Spontaneous wake up – lower bound Theorem.  deterministic broadcasting algorithm A, and  choice of parameters D,g,  UDG network N of diameter D and granularity g s.t. A requires rounds to broadcast in N under the spontaneous wake up model.

Chain networks clusters  k consists of cells each cell may be occupied with a node or empty source cell (always occupied) in source cluster  0 each cluster contain at least one occupied cell

Chain networks there is no edge between any and any for |k-i|>1 clustersform a clique

the message go from directly to Chain networks from to when only one node from transmit the message

the message go from directly to Chain networks from to when only one node from transmit the message

Chain networks if there exists a node in that heard the message then all the nodes of must being heard the source message

The broadcasting algorithm A does not know which cells are occupied and which are empty (except the source) knows that there is at least one occupied cell in every cluster knows the coordinates of the cells S t = cells scheduled to transmit on round t by A a typical instruction: “transmit if occupied”

The adversary decides for every cell whether occupied or empty goal: slow down the broadcasting algorithm decisions are made separately for every  k and online based on

Game between the algorithm and the adversary (2) silence / collision (1) single transmission algorithm can learn?what u can learn? u S t schedule to transmit adversary decide: = number of occupied cells in

u Game between the algorithm and the adversary (1) reveal these cells (occupied/empty) (2) report silence / collision must be consists with previous reports adversary:

u Game between the algorithm and the adversary algorithm knows v ( u hear v ) (2) (1) v algorithm can learn whether: ( u did not hear v ) S t schedule to transmit by the algorithm

u Game between the algorithm and the adversary (1) reveal these cells (2) report silence / collision must be consists with previous reports (2) report that collision occur adversary:

t i = first round on which the nodes of  i receive the message, number of round for delivering the message from  i to  i+1 Lower bound

for t i <cg 2, for i<cg 2 /log (g) adversary guarantees : execution time:

Conditional wake up – lower bound

chain network diameter 2 N1N1 N2N2 N3N3 N D/2 rounds execution time:

Conditional wake up – lower bound Theorem.  deterministic broadcasting algorithm A, and  g,  UDG network N of diameter 2 and granularity g s.t. A requires rounds to broadcast in N under the conditional wake up model.

The network N blocks in each block: auxiliary cells opposite each block: a target cell g auxiliary cellstarget exactly 1 target cell is occupied 1>

The network N auxiliarytarget there is at least one occupied cell in the block that opposite to the occupied target cell the network is connected target cell is outside of the transmitting range of any other blocks

Adversary can no longer guarantee that no messages are being heard distinguish silence from collision (stronger model)

Game between the algorithm and the adversary Adversary: (1) reveal some cells (3) report: silence / collision (2) report: collision occur stst

Adversarial policy on every round we “kill” at most 1 block and reveal at most 1 cell in each “ live ” block execution continues forrounds dead blocks – all cells are revealed, target cell is empty

The concatenate network the target cell of N i is inside of the transmitting range of the next source node s i+1 the auxiliary cells of N i is outside the transmitting range of the next source node s i+1

The concatenate network the message must be delivered via target nodes and auxiliary nodes

The concatenate network execution time:

conditional wake up lower boundupper bound spontaneous wake up Summary

END Thank You!!!