Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

The Primal-Dual Method: Steiner Forest TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A AA A A A AA A A.
Network Design with Degree Constraints Guy Kortsarz Joint work with Rohit Khandekar and Zeev Nutov.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
David Chu--UC Berkeley Amol Deshpande--University of Maryland Joseph M. Hellerstein--UC Berkeley Intel Research Berkeley Wei Hong--Arched Rock Corp. Approximate.
Los Angeles September 27, 2006 MOBICOM Localization in Sparse Networks using Sweeps D. K. Goldenberg P. Bihler M. Cao J. Fang B. D. O. Anderson.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Network Correlated Data Gathering With Explicit Communication: NP- Completeness and Algorithms R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano,
Compressive Data Gathering for Large- Scale Wireless Sensor Networks Chong Luo Feng Wu Shanghai Jiao Tong University Microsoft Research Asia Jun Sun Chang.
On Computing Compression Trees for Data Collection in Wireless Sensor Networks Jian Li, Amol Deshpande and Samir Khuller Department of Computer Science,
Clustering short time series gene expression data Jason Ernst, Gerard J. Nau and Ziv Bar-Joseph BIOINFORMATICS, vol
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
1 Delay-efficient Data Gathering in Sensor Networks Bin Tang, Xianjin Zhu and Deng Pan.
CS Lecture 9 Storeing and Querying Large Web Graphs.
Cache Placement in Sensor Networks Under Update Cost Constraint Bin Tang, Samir Das and Himanshu Gupta Department of Computer Science Stony Brook University.
CS728 Lecture 16 Web indexes II. Last Time Indexes for answering text queries –given term produce all URLs containing –Compact representations for postings.
Sublinear Algorithms for Approximating Graph Parameters Dana Ron Tel-Aviv University.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
Networked Slepian–Wolf: Theory, Algorithms, and Scaling Laws R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano, Member, IEEE, Martin Vetterli,
1 A Dynamic Clustering and Scheduling Approach to Energy Saving in Data Collection from Wireless Sensor Networks Chong Liu, Kui Wu and Jian Pei Computer.
The Impact of Spatial Correlation on Routing with Compression in WSN Sundeep Pattem, Bhaskar Krishnamachri, Ramesh Govindan University of Southern California.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Minimum.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
WiOpt’04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks March 24-26, 2004, University of Cambridge, UK Session 2 : Energy Management.
[1][1][1][1] Lecture 2-3: Coping with NP-Hardness of Optimization Problems in Practice May 26 + June 1, Introduction to Algorithmic Wireless.
Rendezvous Planning in Mobility- assisted Wireless Sensor Networks Guoliang Xing; Tian Wang; Zhihui Xie; Weijia Jia Department of Computer Science City.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.
Routing and Network Design: Algorithmic Issues Kamesh Munagala Duke University.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Efficient Gathering of Correlated Data in Sensor Networks
The Minimal Communication Cost of Gathering Correlated Data over Sensor Networks EL 736 Final Project Bo Zhang.
07/21/2005 Senmetrics1 Xin Liu Computer Science Department University of California, Davis Joint work with P. Mohapatra On the Deployment of Wireless Sensor.
Joint Physical Layer Coding and Network Coding for Bi-Directional Relaying Makesh Wilson, Krishna Narayanan, Henry Pfister and Alex Sprintson Department.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
An Algorithmic Proof of the Lopsided Lovasz Local Lemma Nick Harvey University of British Columbia Jan Vondrak IBM Almaden TexPoint fonts used in EMF.
Graph Sparsifiers Nick Harvey Joint work with Isaac Fung TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Union Find ADT Data type for disjoint sets: makeSet(x): Given an element x create a singleton set that contains only this element. Return a locator/handle.
1 Algorithmic aspects of radio access network design in 4G cellular networks David Amzallag Computer Science Department, Technion Joint work with Seffi.
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
Approximating Buy-at-Bulk and Shallow-Light k-Steiner Trees Mohammad T. Hajiaghayi (CMU) Guy Kortsarz (Rutgers) Mohammad R. Salavatipour (U. Alberta) Presented.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
Minimum Dominating Set Approximation in Graphs of Bounded Arboricity
Clustering TexPoint fonts used in EMF.
TexPoint fonts used in EMF.
Distributed Network Measurements
Topology Control and Its Effects in Wireless Networks
Introduction Wireless Ad-Hoc Network
Clustering.
Presentation transcript:

Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A AA A A A A A

Data Collection in WSN Base Station

Data Collection in WSN Base Station

Data Collection in WSN Base Station Goal: Minimizing communication cost (in bit-hops) 5 bits Cost: 5 bits * 2 hops = 10

Data Collection in WSN  Optimal if all nodes are INDEPENDENT Naïve Solution: Every node independently sends its information to BS Base Station  What if STRONG CORRELATION is present ? Entropy:

Motivation Sensor networks exhibit very strong correlations Spatial: Knowing X1 gives us information about X2 ○ Especially true for geographically co-located sensors Temporal: Knowing X1 gives us information about future value of X1 Intel lab data, 2004

Motivation  Naïve is not optimal any more.  Distributed Source Coding (DSC) Theorem [Slepian & Wolf ’73] Two isolated sources can compress data as efficiently as though they are communicating with each other. Can be extended to more than two sources. [Cover ’75] 21 Base Station H(X 1 ) H(X 2 ) H(X 1 ) H(X 2 |X 1 )

Motivation  Distributed Source Coding (DSC) Need to know joint dist. of all nodes (exp. space) Data cannot deviate from the modeled correlations  Hence, we (1) require explicit communication, (2) utilize only pairwise correlations - less space to store - much easier to learn 21 Base Station H(X 1 ) H(X 2 ) H(X 1 ) H(X 2 |X 1 ) ✔ Compression Trees

DSC Lower Bound DSC Theorem can be used to derive a lower bound: Given: X i is closer to BS than X i+1 Assume H(X i )=h, H(Xi|X j )=ε ( ≈ 0) Naïve: 9h DSC: ≈ h Base Station In general, the lower bound is:

Compression Trees  A directed spanning tree of the network  A node is compressed using its parent  Note: it is not necessarily a subtree of G Base Station H(X 4 ) H(X 2 ) H(X 1 ) H(X 3 ) H(X 5 ) Base Station H(X 4 ) H(X 2 ) H(X 1 ) H(X 3 ) H(X 5 )

Compression Trees  A directed spanning tree of the network  A node is compressed using its parent A communication Scheme:  Broadcast model (no receiving cost)  E.g., nodes 1 and 4 broadcast Base Station H(X 4 ) H(X 2 ) H(X 1 ) H(X 3 ) H(X 5 ) Cost ≈ 2h+8ε

Problem Formulation  Given: G(V,E), H(X i ), H(X i |X j ) (typically learned from historical data)  Find: a compression tree and a communication scheme  Goal: Minimizing the communication cost (bit-hop metric)  Assumptions Broadcast model: When a node transmits information, all its neighbors receive it. Receiving cost at a sensor is negligible compared to sensing cost Node i can encode X i in H(X i ) bits No node or transmission failures

Our Results  The problem is NP-hard  Approximation algorithms Uniform Entropies: We show a connection to weakly connected dominating set General Cases: A generic greedy framework  Simulations

Related Work  Exploit spatial correlation in routing [Patterm et al., 2004]  Data collection in wired networks Unicast model [[Rickenbach et al., 2004] Unicast model & uniform entropy, compression tree=routing tree [Cristescu et al., 2006]  Clustering approach [Chu et al. 2006] Can be seen as a two level compression tree  Nearly optimal for large conditional entropies [Liu et al. 2006]

Uniform Entropies  H(X i ) = H(X j ) = h, H(X i | X j ) = ε  Observations: Compression tree is a subgraph of the communication graph For any edge in the tree, either the parent or the child must broadcast The nodes that locally broadcast their values form a weakly connected dominating set (WCDS) 1 2

Uniform Entropies  H(X i ) = H(X j ) = h, H(X i | X j ) = ε  S is a WCDS if S is a dominating set (for every v 2 V, either v 2 S, or v is a neighbor of S) G-{(x,y), x,y 2 V\S}, is connected  Algorithm: just find a min-cost WCDS The compression tree is any spanning tree in G-{(x,y), x,y 2 V\S}

Unifrom Entropies  Greedy algorithm for finding a WCDS Pick the node with highest number of neighbors Each time: grow the existing tree by picking a node that is: ○ At most one hop away from an already chosen node ○ Covers highest number of uncovered nodes  WCDS hard to approximate within lnΔ, where Δ is the max. degree  Has approximation ratio of: where d avg is the average distance to BS ≈ lnΔ if ε is very small Better if ε is large (i.e., weaker correlations)

Greedy Framework  We maintain a forest (Initially, each node is a singleton tree )  In each iteration, connect a few trees by the most cost-effective treestar

Greedy Framework r  We maintain a forest (Initially, each node is a singleton tree )  In each iteration, connect a few trees by the most cost-effective treestar where c(r,{ v j } j 2 S ) is the minimum cost for sending X r from r to all v j 's

Greedy Framework r  We maintain a forest (Initially, each node is a singleton tree )  In each iteration, connect a few trees by the most cost-effective treestar where c(r,{ v j } j 2 S ) is the minimum cost for sending X r from r to all v j 's

Greedy Framework  It is an O( α log n)-approx. where α is the approx. ratio for computing most cost-effective treestar Compression tree is a subgraph of G: O(log n)-approx. Compression tree is not necessarily a subgraph of G: O(n ε log n)-approx. (since α=O(n ε ) )  Can be extended to wired networks  The results generalize Cristescu et al.’s results [2006]

Greedy Framework-Subgraph  In each iteration, pick the most cost-effective treestar A treestar is a star in G

Greedy Framework-Subgraph  In each iteration, pick the most cost-effective treestar A treestar is a star in G We can compute the most cost-effective treestar in Polynomial time

Simulations  Synthetic dataset generated using a model learned from observed rainfall data in Northwest region [Pattem et al., 2004] IND: Naïve solution; Cluster: [Chu et al. 2006] ; NC: conditional information sent to BS dist(i,j): Euclidean distance c: parameter that controls correlation. larger c, stronger correlation

Future Directions  Extension to higher order correlations  Distributed algorithms  Better approximations for unit disk graphs  Dealing with failures (node or transmission failures)