Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Network Design with Degree Constraints Guy Kortsarz Joint work with Rohit Khandekar and Zeev Nutov.
Chapter 5: Tree Constructions
Lower Bound for Sparse Euclidean Spanners Presented by- Deepak Kumar Gupta(Y6154), Nandan Kumar Dubey(Y6279), Vishal Agrawal(Y6541)
Approximations for Min Connected Sensor Cover Ding-Zhu Du University of Texas at Dallas.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Compact Routing in Theory and Practice Lenore J. Cowen Tufts University.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
1 Caching/storage problems and solutions in wireless sensor network Bin Tang CSE 658 Seminar on Wireless and Mobile Networking.
Ad Hoc and Sensor Networks – Roger Wattenhofer –11/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Routing Chapter 11 TexPoint fonts used in EMF. Read.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
An Efficient Location Service for Mobile Ad Hoc Networks Roland Flury Roger Wattenhofer Distributed Computing Group MLS.
Collective Tree Spanners of Graphs F.F. Dragan, C. Yan, I. Lomonosov Kent State University, USA Hiram College, USA.
Collective Tree Spanners and Routing in AT-free Related Graphs F.F. Dragan, C. Yan, D. Corneil Kent State University University of Toronto.
Additive Spanners for k-Chordal Graphs V. D. Chepoi, F.F. Dragan, C. Yan University Aix-Marseille II, France Kent State University, Ohio, USA.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Ad Hoc and Sensor Networks – Roger Wattenhofer –12/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Selected slides from Roger Wattenhofer on Routing.
Nirmalya Roy School of Electrical Engineering and Computer Science Washington State University Cpt S 223 – Advanced Data Structures Graph Algorithms: Minimum.
Distributed Algorithms 2014 Igor Zarivach A Distributed Algorithm for Minimum Weight Spanning Trees By Gallager, Humblet,Spira (GHS)
Broadcast & Convergecast Downcast & Upcast
Improved Sparse Covers for Graphs Excluding a Fixed Minor Ryan LaFortune (RPI), Costas Busch (LSU), and Srikanta Tirthapura (ISU)
Ad Hoc and Sensor Networks – Roger Wattenhofer –11/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Routing Chapter 11 TexPoint fonts used in EMF. Read.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Improved Approximation Algorithms for the Quality of Service Steiner Tree Problem M. Karpinski Bonn University I. Măndoiu UC San Diego A. Olshevsky GaTech.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Design and Analysis of an MST-Based Topology Control Algorithm Ning Li, Jennifer C. Hou, and Lui Sha Department of Computer Science University of Illinois.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
Connected Dominating Sets. Motivation for Constructing CDS.
An optimal dynamic spanner for points residing in doubling metric spaces Lee-Ad Gottlieb NYU Weizmann Liam Roditty Weizmann.
Ad Hoc and Sensor Networks – Roger Wattenhofer –12/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Routing Chapter 12 TexPoint fonts used in EMF. Read.
A correction The definition of knot in page 147 is not correct. The correct definition is: A knot in a directed graph is a subgraph with the property that.
Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks.
A light metric spanner Lee-Ad Gottlieb. Graph spanners A spanner for graph G is a subgraph H ◦ H contains vertices, subset of edges of G Some qualities.
Ad Hoc Multicast Routing
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Data Structures for Emergency Planning Cyril Gavoille (LaBRI, University of Bordeaux) 8 th FoIKS Bordeaux – March 3, 2014.
ECE 544 Protocol Design Project 2016 Nirali Shah Thara Philipson Nithin Raju Chandy.
Succinct Routing Tables for Planar Graphs Compact Routing for Graphs Excluding a Fixed Minor Ittai Abraham (Hebrew Univ. of Jerusalem) Cyril Gavoille (LaBRI,
Routing Chapter 12 TexPoint fonts used in EMF.
Selected slides from Roger Wattenhofer on Routing
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
Forbidden-Set Distance Labels for Graphs of Bounded Doubling Dimension
A Distributed Algorithm for Minimum-Weight Spanning Trees
Accessing nearby copies of replicated objects
Greedy Routing with Bounded Stretch
Enumerating Distances Using Spanners of Bounded Degree
Graphs & Graph Algorithms 2
Near-Optimal (Euclidean) Metric Compression
Connected Dominating Sets
Introduction Wireless Ad-Hoc Network
Compact routing schemes with improved stretch
Brad Karp UCL Computer Science
Clustering.
Routing in Networks with Low Doubling Dimension
Presentation transcript:

Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group

Roland Flury, ETH Infocom 20072

3 All-In-One Solution

Roland Flury, ETH Infocom Routing in Mesh and Sensor Networks Unicast Routing (send message to a given node) Multicast Routing (send message to a given set of nodes)

Roland Flury, ETH Infocom Routing in Mesh and Sensor Networks (2) Anycast Routing (send message to any node of a given set) UnicastMulticastAnycast Unicast Anycast Multicast ALL IN ONE

Roland Flury, ETH Infocom Modeling Wireless Networks Routing in limited, wireless networks –Limited Storage –Limited Power –No central unit, fully distributed algorithms Description of network topology –Undirected Graph G=(V,E) –Vertices V: Set of network nodes –Edges E: present between any two connected nodes Wireless Networks –Nodes tend to be connected to other nodes in proximity –Connectivity graphs: constant doubling

Roland Flury, ETH Infocom Constant Doubling Metrics Ball: B u (r) := { v | v 2 V and dist(u, v) · r } 8 u 2 V, r > 0 : 9 S µ B u (r) s.t. 8 x 2 B u (r) : 9 s 2 S : dist(x, s) · r/2 |S| = 2  = O(1) doubling dimension 

Roland Flury, ETH Infocom Routing, Anycast, and Multicast Labeled routing scheme (1+  )-approximation for Unicast Routing Constant approximations to Multicast and Anycast -approximate Distance Queries Label size: O(log  ) (bits) –  is the diameter of the network Routing table size: O(1/  )  (log  ) (O(  ) + log  ) (bits) –  is the doubling dimension of the graph (2..5) –  is the max degree of any node

Roland Flury, ETH Infocom Some Related Work Gavoille, Gengler. Space Efficiency for Routing Schemes of Stretch Factor Three. No labeling and stretch < 3 requires routing tables of size  (n) Routing Table (bits)Label (bits) Talwar, 2004 O(1/(   ))  log 2+   O(  log  ) Chan et al (  /  ) O(  ) log  log  O(  log(1/  )) log  Slivkins, 2005  -O(  ) log  log  O(  log(1/  )) log  Slivkins, 2005  -O(  ) log  log log  log n2 O(  ) log n log(  -1 log  ) Abraham et al  -O(  ) log n log(min( ,n)) d log n e This work O(1/  )  log  (O(  ) + log  )2 O(  ) log  nNumber of nodes in network  Diameter of network  Doubling dimension of network  Max. degree of any node  Approximation factor for unicast routing Not only Unicast Routing, but also Multicast, Anycast, and distance queries & distributed construction

Roland Flury, ETH Infocom Outline Introduction Related Work Construction of Labels Construction of Routing Tables Unicasting Multicasting Anycasting

Roland Flury, ETH Infocom Node Labeling:  -net Given a graph G=(V,E) U ½ V is a  -net if a) 8 v 2 V: 9 u 2 U : d(u,v) ·  b) 8 u 1, u 2 2 U : d(u 1, u 2 ) >  Net centers of the  -net

Roland Flury, ETH Infocom Dominance Net Hierarchy Build  -nets for  2 {1, 2, 4, …, 2 d log  e  }  = 2  = 4  = 8  = 1 Level 0 Level 1 Level 2 Level 3

Roland Flury, ETH Infocom Naming Scheme Select parent from next higher level Parent enumerates all of its children –At most 2 2  children –2  bits are sufficient for the enumeration Name of net-center obtained by concatenation of enum values –Name at most 2  log  bits long Root R:6:3:2

Roland Flury, ETH Infocom Node Labeling Each net-center c of a  -net advertises itself to B c (2  ) Any node n stores ID of all net-centers from which it receives advertisements –Per level at most 2 2  net-centers to store –If net-center c covers n, then also the parent of c covers n –The set of net-centers to store form a tree Level 0 Level 1 Level 2 Level 3 –Per level at most 2 2  ¢ 2  bits – d log  e levels ) Label size of O(log  ) for a constant  n

Roland Flury, ETH Infocom Outline Introduction Related Work Construction of Labels Construction of Routing Tables Unicasting Multicasting Anycasting

Roland Flury, ETH Infocom Routing Tables Routing tables to support (1+  ) stretch routing Recall: Routing table size of O(1/  )  (log  ) (O(  ) + log  ) bits Every net-center c 2  -net of the dominance net advertises itself to B c (  (8/  + 6)) Every node stores direction to reach all advertising net-centers B c (  (8/  + 6)) c

Roland Flury, ETH Infocom Routing Tables – Analysis Each node needs to store direction for at most 2 2  (8/  + 6)   net- centers per level If a node needs to store a routing entry for net-center c, then it also needs to store a routing entry for the parent of c. –The routing table can be stored as a tree For each net-center, we need to store its enumeration value, and the next-hop information, which takes at most 2  + log  bits Total storage cost is 2 2  (8/  + 6)   log  (2  + log  ) bits.

Roland Flury, ETH Infocom Unicast Routing Problem:From a sender node s, send a message to a target node t, given the ID and label L(t). Algorithm: From all net-centers listed in L(t), s picks the net-center c on the lowest level to which it has routing information and forwards the message towards c. Main idea:Once we reach a first net-center of t, we are sure to find a closer net-center on a lower layer. The path to the first net-center causes only little overhead as the net-centers advertise themselves quite far. s t c1c1 c2c2 c3c3

Roland Flury, ETH Infocom Multicast Routing Problem:From a sender node s, send a message to a set of target nodes U. Algorithm: Build a Minimum Spanning Tree (MST) on s  U and send the message on this tree. Main idea:The MST is a 2-approximation to the Minimum Steiner Tree problem. Our distance estimates may be wrong up to a factor 6, and message routing on the tree has stretch (1+  ), which results in a 12(1+  )-approximation.

Roland Flury, ETH Infocom Anycast Routing Problem:From a sender node s, send a message to an arbitrary target chosen from a set U. Algorithm: Determine u 2 U with minimal distance to s, and send the message to u. Main idea:Our distance estimates may be wrong up to a factor 6, and message routing on the tree has stretch (1+  ), which results in a 6(1+  )-approximation.

Roland Flury, ETH Infocom Summary Unicast Multicast Anycast Unicast Anycast Multicast (1+  ) approximation 12 (1+  ) approximation 6 (1+  ) approximation ALL IN ONE Label size: O(log  ) Routing table size: O(1/  )  (log  ) (O(  ) + log  )

Roland Flury, ETH Infocom Questions / Comments Thank you! Questions / Comments? Roland Flury Roger Wattenhofer

Roland Flury, ETH Infocom  nets on  Doubling Metrics Property 1 (Sparseness): Any ball B v (2 x  ) covers at most 2 (1+x)  nodes from an arbitrary  -net. 2-net v B v (4  )

Roland Flury, ETH Infocom  nets on  Doubling Metrics (2) Property 2 (Dominance): Given a  -net, and each net-center u covers B u (2  ), then any network node is covered by at most 2 2  net-centers. u 2-net B u (4)

Roland Flury, ETH Infocom Distance Queries Problem:Determine the distance between two nodes u and v, given their labels L(u) and L(v) Solution: Determine the smallest level i for which the labels of u and v have at least one common net-center… Theorem:Thedistance query is a -approximation. Proof:Lower bound: dist(u, v) > 2 i -1, otherwise L(u) and L(v) have a common net-center on level i-1. Upper bound: By distinction of cases and applying triangle inequality… (see paper)

Roland Flury, ETH Infocom Constant Doubling Metrics