Locating and Bypassing Routing Holes in Sensor Networks Authors: Qing Fang, Jie Gao and Leonidas J. Guibas Presented by: Yinfei Pan.

Slides:



Advertisements
Similar presentations
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos.
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Two Segments Intersect?
Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1.
Data and Computer Communications
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Comments We consider in this topic a large class of related problems that deal with proximity of points in the plane. We will: 1.Define some proximity.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
A Presentation by: Noman Shahreyar
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Ruslana Mys Delaunay Triangulation Delaunay Triangulation (DT)  Introduction  Delaunay-Voronoi based method  Algorithms to compute the convex hull 
By Groysman Maxim. Let S be a set of sites in the plane. Each point in the plane is influenced by each point of S. We would like to decompose the plane.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Routing in WSNs 28 February 2005.
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks Zhen Jiang Computer Science Department West Chester University.
Steps in DP: Step 1 Think what decision is the “last piece in the puzzle” –Where to place the outermost parentheses in a matrix chain multiplication (A.
Ad-Hoc Networks Beyond Unit Disk Graphs
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Hannes Frey, Ivan Stojmenovic MobiCom 2006
1 Complexity of Network Synchronization Raeda Naamnieh.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
Computing the Delaunay Triangulation By Nacha Chavez Math 870 Computational Geometry; Ch.9; de Berg, van Kreveld, Overmars, Schwarzkopf By Nacha Chavez.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Chapter 4: Straight Line Drawing Ronald Kieft. Contents Introduction Algorithm 1: Shift Method Algorithm 2: Realizer Method Other parts of chapter 4 Questions?
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Sensor Network Routing Romit Roy Choudhury and Pradeep Kyasanur (Some slides are based on Dr. Nitin Vaidya’s tutorial)
1 University of Denver Department of Mathematics Department of Computer Science.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
 Jim has six children.  Chris fights with Bob,Faye, and Eve all the time; Eve fights (besides with Chris) with Al and Di all the time; and Al and Bob.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
Efficient Gathering of Correlated Data in Sensor Networks
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
EILEEN BALCI GPSR: Greedy Perimeter Stateless Routing for Wireless Networks.
Routing Considerations for Sensor Networks Lecture 12 October 12, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor Networks Andreas.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
RoamHBA : Maintaining Group Connectivity In Sensor Networks Qing Fang Jie Liu Leonidas Guibas Feng Zhao Department of Electrical Engineering, Stanford.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Agenda Fail Stop Processors –Problem Definition –Implementation with reliable stable storage –Implementation without reliable stable storage Failure Detection.
 Copyright 2007 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute Geographic Routing in Wireless.
GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang, Jie Gao, Leonidas J. Guibas, Vin de Silva, Li Zhang Department of Electrical.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
Massively Distributed Database Systems In-Network Query Processing (Ad-Hoc Sensor Network) Fall 2015 Ki-Joune Li Pusan.
UNC Chapel Hill M. C. Lin Delaunay Triangulations Reading: Chapter 9 of the Textbook Driving Applications –Height Interpolation –Constrained Triangulation.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
GPSR Greedy Perimeter Stateless Routing
Surviving Holes and Barriers in Geographic Data Reporting for
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
Locating and Bypassing Routing Holes
Routing: Distance Vector Algorithm
Shape Segmentation and Applications in Sensor Networks
Presentation transcript:

Locating and Bypassing Routing Holes in Sensor Networks Authors: Qing Fang, Jie Gao and Leonidas J. Guibas Presented by: Yinfei Pan

Introduction Sensor networks –Usually vast in their scale –Lost cost per node –mostly static –Energy is an very important consideration routing cannot be too heavy –AODV, DSR, and Flooding may have more cost –Need new routing mechanism design Geographical Routing may be a good choice

GPSR Location of the destination node is assumed to be known Each node knows location of its neighbors Each node forwards a packet to its neighbor closest to the destination (greedy forwarding) If routing holes are found, uses perimeter routing

GPSR Perimeter routing requires the maintenance of the underlying planar graph (too expensive in sensor networks) In fact, perimeter routing are not used most of the time –Karp and Kung’s results show that most forwarding is through greedy forwarding –So, keeping a planar graph at every node all the time, which is used only occasionally seems unnecessary.

The Purpose of This Paper Situation: packet stuck at a node all of whose 1 hop neighbors are further away from the destination (Local minimum) Find underlying geometric properties behind the local minimum phenomenon. –Seemingly unorganized structures have structures –Explore holes in sensor networks A closed cycle with no self intersections bounding a closed region

Why Holes Important Geographic multi-cast: routing to a geographic region Detection of the boundary of disaster regions Geographic properties of the underlying terrain Detecting regions with low sensor density due to depletion of node power. Information storage mechanisms

What’s Done by This Paper Incorporate stuck nodes into routing research Local TENT rule to determine whether a node is a stuck node Find holes: BOUNDHOLE (a distributed algorithm)

First Method to Identify Holes Definitions –Weak stuck node P P is the closest node to node Q (among P’s neighbors), and Q is out of the communication range of P (Assume each has radius 1) Q is called black node P J H Q

Holes Finding S is a set of nodes Vornoi Diagram partitions plane into Vornoi cells (All points within a cell are closest to only one node) Delaunay triangulation: connecting nodes that are in adjacent cells (dual graph of Vornoi) Delaunay triangle has “emptycircle” property –circumcircle contains no nodes of S inside

Holes Finding In the Delaunay triangulation if all the edges adjacent to a node p are not longer than 1, then P is not a stuck node (within communication range) Possible stuck nodes: nodes with at least one adjacent delaunay edges longer than 1.

Holes Finding Restricted Delaunay Graph (RDG): A sub graph of DT with only edges <=1 are kept. A hole is a face in the RDG with at least 4 vertices.

Drawback of The First Method The algorithm for computing the Delaunay triangulation is a centralized algorithm –a heavy algorithm for sensor networks the set of nodes identified using this method, is a super set of the set of real weak stuck nodes. the destination may not be a node in the network, –You just want you data multicast to a specific region

Improved Method to Identify Holes Strong Stuck nodes –Node p if there exists a location q outside p’s transmission range so that no neighbor of p is closer to q than itself. –Collection of Qs is called black region –So this strong definition is in fact to extend one black point to a black region (Includes weak def.) P J H Black Region Q

TENT Rule For each p, order all of its neighbors counterclockwise For each adjacent pair (u, v) draw perpendicular bisector of the two edges with p (u, p) (v p) These intersect at a center O. If O is in communication range of p, then no black region (all in communication range) We say p cannot be stuck in the direction upv

TENT Rule Define a stuck angle at a node p is the angle spanned by a pair of adjacent neighbors of node p in which the direction of p becomes the local minimum (no neighbor in this area was found to be more closer to the destination) A node is strong stuck if it has at least one stuck angle If angle upv is <120 degrees, p cannot be stuck (just the point black region disappear) a node can have at most 3 stuck directions The computation of TENT Rule can be preformed with only information on 1-hop neighbors.

Possible Stuck Node v

Holes Finding BOUNDHOLE –Simply greedy sweeping algorithm –Hole is a closed region bounded by a non self intersecting polygonal loop –A hole H belongs to a strong stuck node v if H is identical to the loop formed by BOUNDHOLE starting at v –u is an upstream node of v if u is the previous hop neighbor sharing same boundary of a Hole with v in a clockwise order –When finding a hole’s boundary, the right-hand side of the edge is inside the hole

BOUNDHOLE Assume P is a stuck node, stuck direction is spt1 Step 1. use the right hand rule starting at t1. Take the t2 by sweeping from p counterclockwise. Step 2. Continued until pt1t2 … tk goes back to p Step 3: Solve Edge Intersection (next slide)

BOUNDHOLE tj tj+1 intersects ti ti+1 There are two cases –tj not visible to ti and ti+1, Delete ti+1… tj+1 and continue Form a new sequence of t0t1 · · · (ti)(tj+1)(tj)

BOUNDHOLE Intersects solving (cont.) –ti not visible to tj and tj+1, take ti+1 as the next hop for tj Form a new sequence of t0 · · · (tj)(ti+1)(ti)

BOUNDHOLE Can Work For each three consecutive nodes in the sequence, the third one is not visible to the first one. Each node one the boundary of hole appear at most 6 times (prove see paper since too complex) So, in generating the sequence, we are indeed making progresses, and when travel through the boundary, we are in an finite set.

BOUNDHOLE is Distributed One stuck direction is simple and localized. The computation at each node depends only on the 1-hop neighbors. Thus the algorithm is distributed Thus, this method scales well to large networks

Result (Tighter than Delaunay Triangulation)

Optimizations Suppressed Start –The Hole finding stages Initially gather 1-hop info Then run TENT to determine if it is a stuck node BOUNDHOLE begin to find boundary of hole –Stuck nodes initiate messenger packet in direction of being stuck. Consider the graph in next slide

Suppressed Start All stuck nodes compute same hole (see left) Duplication causes unnecessary traffic So, assign each init package an ID, then drop redundant packets –When package comes from ingress edge that an earlier messenger packet with a lower ID has taken, drop it.

Wrong Case See right, consider two loop: j – l – n – o – p – i - j and loop k – m – n – o – p – i – j – k We have problem! k try to identify its hole, but its package will be dropped by o, p, or I How to fix: Set an Enforce Bit to not drop –Is this method actually solve the problem??

Node failures Failures can create new holes and change boundaries of existing holes periodically broadcast to its neighbors, if no response for 3 times, then do BOUNDHOLE NOTICE: To deal with Node failures, the enforce bit must be set this time However, won’t this cause more communication cost for only one node change –My suggestion: Use enforce state, not just a bit, when BOUNDHOLE in this case met the common edge stop the hole finding process and we still could get a hole correct whole loop

Routing Stages Greedy forwarding as GPSR Get stuck: route the packet along the boundary of the hole. When gets to a node more closer to destination, back to Greedy forwarding If inside the hole but not reachable after tour around the boundary, do "flooding“ –Can compute the better side by storing shape of the hole

Conclusion Information saving and computing is only on problematic parts of the network –only node on the body of a hole need to store additional information upstream and downstream neighbors boundary sharing he shape of the boundary (optional) Result: energy saving, low memory demand, fast response

Contribution Initiate research on studying the structures of sensor networks Provide an effective method to explore such structure Problems & Improvement see the following slides …

Problems & Improvement Suggestions on this paper Lack simulation results - only some topology graphs are available To find hole, it is necessary for the use of suppressed start, but as the paper itself shows, this is problematic and enforce bit seems do not solve the problem at all (When to set that bit in general case?) The underlying assumption of this paper, which we can say the fundamental issue of this paper is the communication range is an ideal circle which is not true in real world, so, this need to be improved Improvement suggestion see next slide …

Problems & Improvement Suggestions on this paper One stuck node own a hole, and there are many nodes on the boundary, is the hole be found actually like the physical structure? Highly untenable. Improvement Suggestion: In fact, this paper based on an ideal circle as the communication range, so the TENT Rule in fact is just to rule out all the possibility inside the communication range of a node since those nodes must not be in a void area which identified in this paper as a hole. For most of the other nodes which do not comply the TENT Rule, this paper in fact assumes them as in void region, so it get a super set of actual holes. In real world, communication range definitely is NOT that ideal and link quality is also a very important issue, the basic ideal of TENT Rule is still great valuable, but we can improve it, and make it more complex by incorporation the real geometrical shape of communication range.