1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU)

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
5/11/20151 Computer Networks COE 549 Random Access Tarek Sheltami KFUPM CCSE COE
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Andrea Richa1 Interference Models: Beyond the Unit-disk and Packet-Radio Models Andrea W. Richa Arizona State University.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Topology Control Algorithms Davide Bilò
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Ad Hoc Wireless Routing COS 461: Computer Networks
Modeling Data-Centric Routing in Wireless Sensor Networks Bhaskar Krishnamachari, Deborah Estrin, Stephan Wicker.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
CuMPE : CLUSTER-MANAGEMENT AND POWER EFFICIENT PROTOCOL FOR WIRELESS SENSOR NETWORKS ITRE’05 Information Technology: Research and Education Shen Ben Ho.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
1 An O(log n) Dominating Set Protocol for Wireless Ad- Hoc Networks under the Physical Interference Model Andrea W. Richa Arizona State University Joint.
Distributed Location-aware Transmission for Ad-Hoc Networks Bey-Ling Su 1/29/2004.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
1/30 Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Wireless and Sensor Network Seminar Dec 01, 2004.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Power Control in Wireless Ad Hoc Networks Background An ad hoc network is a group of self configuring wireless nodes that lack infrastructure. Motivation—Power.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
A Power Assignment Method for Multi-Sink WSN with Outage Probability Constraints Marcelo E. Pellenz*, Edgard Jamhour*, Manoel C. Penna*, Richard D. Souza.
A Multicast Mechanism in WiMax Mesh Network Jianfeng Chen, Wenhua Jiao, Pin Jiang, Qian Guo Asia-Pacific Conference on Communications, (APCC '06)
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Research: algorithmic solutions for networking
Introduction Wireless Ad-Hoc Network
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
A Distributed Clustering Scheme For Underwater Sensor Networks
Presentation transcript:

1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU) 2005 International Symposium on Parallel Architectures, Algorithms and Networks, Las Vegas Nevada

2 Ad-Hoc Networks Mobile devices communicating via radio Network without centralized control Broadcasting: Sending a packet from a source node to all nodes in the network Gathering: Sending one packet from a subset of nodes to a single sink node in the network

3 Our Results Near optimal algorithms for broadcasting and information gathering (time and work) A realistic wireless communication model which takes into account –Different transmission & interference ranges –Non-uniformity of signal propagation of real antennas –Physical carrier sensing

4 Communication Models Unit Disk Graph (UDG) Disk shaped transmission area u R v w Packet Radio Network (PRN) Transmission Range = Interference Range v u w

5 Communication model u v w rtrt riri For a given transmission range r t, transmission area of v is { u  V | c(v,u)  r t } Transmission range, interference area via cost function c For given interference range r i, interference area of v is { u  V | c(v,u)  r i } Cost Function: c(u,v)  [(1-  )d(u,v), (1+  )d(u,v)] d(u,v) is Euclidean distance   [0,1), depends on the environment

6 Communication model (cont.) u v w rtrt riri  If c(v,u) ≤r t then v is guaranteed to receive the message from u provided no other node w with c(v, w) ≤ r i also transmits at the same time. r t : Transmission range r i : Interference range  If c(v,w) ≤ r i, node w can cause interference at node v.

7 Physical Carrier Sensing These ranges grow monotonically in both the sensing threshold T and the transmission power. 14 u r si (T) v w r st (T): Carrier sense transmission (CST) range r st (T) r si (T): Carrier sense interference (CSI) range

8 Constant density spanner Constant density spanner: Given a graph G find a sparse subgraph G’ of G such that distance between any two nodes in G’ is less than a constant factor of original distance. Active node Inactive node Gateway node Gateway edge Other edges

9 Constant density spanner (cont.) Active nodes form a maximal independent set Gateway nodes connect active nodes which are within 2 or 3 hops from each other Active node Inactive node Gateway node Gateway edge Other edges

10 Motivation Previously proposed broadcasting and gathering algorithms will not work for the communication model that we have considered.

11 s ( )(( )) Isolated Broadcasting Active node Inactive node Gateway node Gateway edge Other edges Firstly, node s sends out the broadcast message. ((( ))) v u

12 message CTS RTS Isolated Broadcasting (cont.) If u is a gateway node and has already received the message, it sends out an RTS signal with probability p. If v is an active node or a gateway node and v has not received the broadcast message yet, then v checks if it correctly received an RTS signal. If so, v sends out a CTS signal. If v is a gateway node and sent out a RTS signal, then v checks if it received a CTS signal. If so, v sends out the broadcast message. s v u

13 Isolated Broadcasting (cont.) Active node Inactive node Gateway node Gateway edge Other edges s v u (( ))((( )))( ) If node v: – is an active node – received the broadcast message in the previous round – it is the first time it received the broadcast message Then, it sends out the broadcast message.

14 Our Results D(s): diameter with respect to s W(s): minimum work for broadcast The broadcast algorithm needs O(D(s)+log n) rounds, with high probability, to deliver the broadcast messages to all nodes. The broadcast algorithm needs O(W(s)) work Extendable to multiple broadcasts

15 Information Gathering Stage I: Building Gathering Tree T(s) Stage II: Gathering on Tree T(s)

16 Building Gathering Tree T(s) We select a shortest path tree rooted at s on the spanner graph by running a modified Bellman-Ford type algorithm that takes into account message interference. In order to show that this RTS/CTS scheme works efficiently, it is crucial to note that the spanner is of constant density: Hence a constant number of RTS/CTS handshakes are enough to guarantee the successful delivery of a message w.h.p..

17 RTS route m. Building Gathering Tree T(s) (cont.) CTS s v u Firstly, node s sends out the route message. (( ))((( )))( ) If the shortest path estimate d'(s,u) is not infinite and u needs to broadcast the latest update on d’(s,u), then u sends a RTS signal with probability p If v received an RTS signal then v sends a CTS signal. If u received a CTS signal, u sends out the route message.

18 Building Gathering Tree T(s) (cont.) s v u Each node u has a label which is the shortest path distance to sink node. Each node u has a parent node which is the node that node u received the route message

19 I-RTS Gathering on Tree T(s) (Inactive Nodes) Active node Inactive node Gateway node Gateway edge Other edges If w is inactive and has a packet to send and w is awake then w sends a I-RTS signal to its parent with a probability 1/2. s w Inactive nodes have a state {asleep, awake} v

20 Gathering on Tree T(s) (Inactive Nodes) Active node Inactive node Gateway node Gateway edge Other edges s w v  If v is active;  v receives an I-RTS signal, send an I-CTS signal  v senses a busy channel, send a collision message  v senses a free channel, send a free message I-RTS

21 Gathering on Tree T(s) (Inactive Nodes) Active node Inactive node Gateway node Gateway edge Other edges s w v  If w is inactive;  w receives an I-CTS signal, send the packet  w receives a collision message, become asleep with p=1/2  w receives a free message, become awake

22 Gathering on Tree T(s) (Active Nodes) Active node Inactive node Gateway node Gateway edge Other edges If v is active and has a message to send, then v sends the message to its parent. s v u message

23 RTS Gathering on Tree T(s) (Gateway Nodes) Active node Inactive node Gateway node Gateway edge Other edges  If u is a gateway node and has a non-empty queue then u sends an RTS message containing the id of its parent with probability p.  If u receives a CTS message from its parent, then u sends the message to its parent.  If an active node receives an RTS message containing its id, it sends a CTS message. s v u CTS message

24 Our Results  : maximum density of inactive nodes m: number of messages W’(s): the optimal work A gathering tree T(s) with sink node s, the information gathering algorithm presented above needs O(m+  (logn)(log  )+D(s)+logn) time steps w.h.p.. Once a stable gathering tree has been constructed, the gathering protocol described above needs O(W’(s)) work

25 Conclusions and Future work Algorithms for broadcasting and information gathering on a realistic model for wireless communication Node mobility and node faults Anycasting and multicasting