Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban, Mayank Goswami, Wei Zeng, Jie Gao, Xianfeng David Gu Stony Brook University.

Slides:



Advertisements
Similar presentations
Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Advertisements

Path Splicing with Network Slicing
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
A Unified View to Greedy Routing Algorithms in Ad-Hoc Networks
Greedy Routing with Guaranteed Delivery Using Ricci Flow Jie Gao Stony Brook University Rik Sarkar, Xiaotian Yin, Feng Luo, Xianfeng David Gu.
Spherical Representation & Polyhedron Routing for Load Balancing in Wireless Sensor Networks Xiaokang Yu Xiaomeng Ban Wei Zeng Rik Sarkar Xianfeng David.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Discrete geometry Lecture 2 1 © Alexander & Michael Bronstein
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
1 Path Splicing Author: Murtaza Motiwala, Megan Elmore, Nick Feamster and Santosh Vempala Publisher: SIGCOMM’08 Presenter: Hsin-Mao Chen Date:2009/12/09.
PROXY FOR CONNECTIVITY We consider the k shortest edge disjoint paths between a pair of nodes and define a hyperlink, whose ‘connectivity’ is defined as:
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Multicast Routing in ATM Networks with Multiple Classes of QoS Ren-Hung Hwang, Min-Xiou Chen, and Youn-Chen Sun Department of Computer Science & Information.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers C. E. Perkins & P. Bhagwat Presented by Paul Ampadu.
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Range Queries in Distributed Networks Jie Gao Stony Brook University Dagstuhl Seminar, March 14 th,
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 A Topology Control Approach to Using Directional Antennas in Wireless Mesh Networks Umesh Kumar, Himanshu Gupta and Samir R. Das Department of Computer.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Distributed Asynchronous Bellman-Ford Algorithm
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
Scalable and Fully Distributed Localization With Mere Connectivity.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Thursday, May 9 Heuristic Search: methods for solving difficult optimization problems Handouts: Lecture Notes See the introduction to the paper.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Void Traversal for Guaranteed Delivery in Geometric Routing
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
On Optimal Geographic Routing in Wireless Networks with Holes and Non-Uniform Traffic Sundar Subramanian, Sanjay Shakkottai and Piyush Gupta INFOCOM 2007.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Introduction to Wireless Sensor Networks
A Study of Group-Tree Matching in Large Scale Group Communications
Routing in Packet Networks Shortest Path Routing
Shape Segmentation and Applications in Sensor Networks
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Presentation transcript:

Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban, Mayank Goswami, Wei Zeng, Jie Gao, Xianfeng David Gu Stony Brook University

Prob1: Scalable Multipath Routing Deliver data using multiple (disjoint) paths – Improving throughput – Lower delay – Improving data security Encode data and send different segments along different paths Q: How to generate multiple paths? s t

k Node Disjoint Paths Centralized solutions – Flow algorithm, node disjoint paths, O(n 3 ) Distributed solutions – Only exist for 2 node disjoint paths. – Relaxation: braided multi-paths. – High discovery costs.

Prob2: Fast Recovery from Failures Sudden node or link failure – Link quality fluctuates. – Unpredictable inference, e.g., hidden terminal problem – networks interfering with WiFi [MT 08] – Jamming attacks Q: how to quickly generate an alternative path? R. Musaloiu-E, A. Terzis, Minimising the effect of WiFi interference in wireless sensor networks, International Journal of Sensor Networks, 3(1):43-54, 2008.

Prior Work IP fast re-routing schemes – Avoid loop? Path splicing [SIGCOMM 08] – Perturb edge weights – Compute multiple shortest path trees for each root – Switch to another SPT under in-transit failures – Storage requirement is too high for sensornet. Motiwala, Elmore, Feamster, Vempala, Path splicing, SIGCOMM Comput. Commun,. Rev., 2008

Understanding of the Path Space Where are the paths connecting source and destination? How to quickly find them? How to minimize storage/computation costs? Multipath routing using greedy routing? – Find an embedding, route to the neighbor closer to destination.

Our Solution: Using Circular Domains Our previous work: deform a network into circular domain [IPSN’09]. Greedy routing guarantees delivery. 

Circular Domains are not Unique Embedding into a circular domain is not unique, they differ by a Möbius transformation. 8 

Main Idea: Use Different Metrics Find multiple paths: – Embed to a circular domain D. – Apply Mӧbius transformation f on D: f(D) – Find greedy routing in f(D). – Goal: find disjoint paths. Recover from link failure: – Apply a Mӧbius transformation f on D: f(D) – Goal: greedy routing on f(D) does not use the broken link.

Outline 1.Mӧbius transformation 2.Explain the idea in a continuous domain – Theoretical guarantee 3.Implementation issues on a discrete network 4.Simulation results

Möbius Transform Möbius transform – Conformal: maps circles to circles – Four basic elements: translation, dilation, rotation, inversions. 11 a, b, c, d are 4 complex numbers, ad ≠ bc

Outline 1.Mӧbius transformation 2.Explain the idea in a continuous domain – Theoretical guarantee 3.Implementation issues on a discrete network 4.Simulation results

Greedy Paths in Different Circular Domains Generate disjoint paths using different transformations s t s t f1f1

Greedy Paths in Different Circular Domains Generate disjoint paths using different transformations s t s t f2f2

Isn’t This Just Routing along Arcs? One can greedily route along an arc. [NN, 03] – But there is no guarantee of delivery! Our method follows an arc, which is actually the greedy route in another circular domain. – Delivery is always guaranteed. Nath and Niculescu, Routing on a curve, SIGCOMM Comput. Commun. Rev., 2003.

Networks with Holes When a circular arc route hits a hole, it is diverted along the boundary – Two paths can converge on the boundary s t

Finding Disjoint Paths Each hole defines two angle ranges Inside each range there can only be one path Goal: find a max number of paths.

Finding Disjoint Paths – Project all intervals on a unit circle – Order the endpoints angularly. – Adjacent endpoints define canonical segments. – Remove canonical segments NOT covered by any range

Finding Disjoint Paths Greedy algorithm: – For each segment as the starting segment, – Choose it, move clockwise. – Choose the first one not in conflict – Ex: choose 5.

Finding Disjoint Paths Greedy algorithm: – Different starting segments give different solns. – Take the solution with maximum # segments Theorem: GREEDY is optimal.

Outline 1.Mӧbius transformation 2.Explain the idea in a continuous domain – Theoretical guarantee 3.Implementation issues on a discrete network 4.Simulation results

Preprocessing Into a Circular Domain Embed the network into a circular domain – Follows [IPSN’09] – Compute a triangulation locally – Non-triangular faces are “holes” – Nodes locally compute curvature – Modify edge lengths iteratively – When converge, obtain the requested embedding Distributed, gossip-style algorithm.

How to compute a Mӧbius Transformation? Uniquely determined by mapping 3 points z 1, z 2, z 3, to w 1, w 2, w 3, respectively. I.e., mapping one circle to another circle

How to compute a Mӧbius Transformation? New metric can be locally determined. s t s t f1f1 p p

Generate Multiple Paths No holes: – Evenly spread the tangent vectors of the paths at source and dest. – Heuristic – Bounded degree. With holes: – Know: locations & sizes of holes – Very limited global info s t

How to Apply the Mӧbius Transformation in Routing? A packet carries the four parameters a, b, c, d as a matrix. Composition of 2 transformations is simply matrix multiplication

Recovery from Temporary Link Failure We compute a Möbius transformation – S.t. the broken link is NOT on the greedy path. – Make big jumps 27

Recovery from Temporary Link Failure Map the “live” neighbor p to be on the straight path – On-demand recovery of in-transit failures. – Möbius transform attached to packet. 28 s ts t f1f1 p p

Simulation Results Relatively dense network: – 1K nodes, avg deg ≈ 20. Multi-path routing – Compare with centralized flow algorithm. – Vary parameter m: # paths we seek. – Check # disjoint paths we got – Compare with the OPT.

Multipath Routing Results Max # disjoint paths

Simulation Results for Recovery from Failures Regional failure – Inside a geometric region: prob[failure] = p 1. – Outside a geometric region: prob[failure] = p 2. – p 1 > p 2. Compare with – Greedy routing with geographical coordinates – Greedy routing in a circular domain – Recovery with Möbius transformation – Recovery with random walk.

Simulation Results for Recovery from Failures Circular + Möbius > Circular + RandWalk > Circular >> Geographical + RandWalk ≈ Geographical p 1 =0.8 p 2 =0 Random walk makes local, random steps and is likely trapped inside the failure region

Simulation Results for Recovery from Failures Success rate: Circular + Möbius > Circular + RandWalk > Circular Circular + Möbius Circular + RandWalk Circular p 1 p 2 Consistently better by making big jumps

Conclusion and Future Work Regulating a sensor network shape – Helps to explore path space with limited global info Open problem: bridging the gap – Provable results in the continuous space – Heuristic methods in the discrete network

Questions & Comments?