Tracking Murat Demirbas SUNY Buffalo. A Pursuer-Evader Game for Sensor Networks Murat Demirbas Anish Arora Mohamed Gouda.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Distributed Deadlocks
Chapter 7 - Local Stabilization1 Chapter 7: roadmap 7.1 Super stabilization 7.2 Self-Stabilizing Fault-Containing Algorithms 7.3 Error-Detection Codes.
Chapter 15 Basic Asynchronous Network Algorithms
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Garbage Collecting the World Bernard Lang Christian Queinnec Jose Piquer Presented by Yu-Jin Chia See also: pp text.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
A Survey on Tracking Methods for a Wireless Sensor Network Taylor Flagg, Beau Hollis & Francisco J. Garcia-Ascanio.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
Self-stabilizing Distributed Systems Sukumar Ghosh Professor, Department of Computer Science University of Iowa.
Self-Stabilization in Distributed Systems Barath Raghavan Vikas Motwani Debashis Panigrahi.
Garbage Collection  records not reachable  reclaim to allow reuse  performed by runtime system (support programs linked with the compiled code) (support.
Lecture 4: Elections, Reset Anish Arora CSE 763 Notes include material from Dr. Jeff Brumfield.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
K-structure, Separating Chain, Gap Tree, and Layered DAG Presented by Dave Tahmoush.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
SASH Spatial Approximation Sample Hierarchy
Scalable Tracking & Querying for Wireless Sensor Networks Murat Demirbas SUNY Buffalo CSE Dept.
Chapter 4 - Self-Stabilizing Algorithms for Model Conservation4-1 Chapter 4: roadmap 4.1 Token Passing: Converting a Central Daemon to read/write 4.2 Data-Link.
LSRP: Local Stabilization in Shortest Path Routing Hongwei Zhang and Anish Arora Presented by Aviv Zohar.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Peer-to-Peer Spatial Queries in Sensor Networks Murat Demirbas Hakan Ferhatosmanoglu The Ohio State University.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
LSRP: Local Stabilization in Shortest Path Routing Anish Arora Hongwei Zhang.
Distributed Transactional Memory Presented by Gala Yadgar.
Time Synchronization Murat Demirbas SUNY Buffalo.
Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
Adaptive Topology Discovery in Hybrid Wireless Networks
1 Random Walks in WSN 1.Efficient and Robust Query Processing in Dynamic Environments using Random Walk Techniques, Chen Avin, Carlos Brito, IPSN 2004.
Self Stabilization Classical Results and Beyond… Elad Schiller CTI (Grece)
Glance: A lightweight querying service for wireless sensor networks Murat Demirbas SUNY Buffalo Anish Arora, Vinod Kulathumani Ohio State Univ.
Building Suffix Trees in O(m) time Weiner had first linear time algorithm in 1973 McCreight developed a more space efficient algorithm in 1976 Ukkonen.
GS 3 GS 3 : Scalable Self-configuration and Self-healing in Wireless Networks Hongwei Zhang & Anish Arora.
CIS 720 Distributed algorithms. “Paint on the forehead” problem Each of you can see other’s forehead but not your own. I announce “some of you have paint.
The Zone Routing Protocol (ZRP)
1 By: MOSES CHARIKAR, CHANDRA CHEKURI, TOMAS FEDER, AND RAJEEV MOTWANI Presented By: Sarah Hegab.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Fault-containment in Weakly Stabilizing Systems Anurag Dasgupta Sukumar Ghosh Xin Xiao University of Iowa.
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Services and Algorithms for Sensor Networks: a Theoretical Perspective Nancy Lynch, MIT NEST PI Meeting July, 2003.
Fault-containment in Weakly Stabilizing Systems Anurag Dasgupta Sukumar Ghosh Xin Xiao University of Iowa.
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
Computer Networks Dr. Jorge A. Cobb The Performance of Query Control Schemes for the Zone Routing Protocol.
The Performance of Query Control Schemes for the Zone Routing Protocol Zygmunt J. Haas Marc R. Pearlman.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
Union-find Algorithm Presented by Michael Cassarino.
Chapter 18: Searching and Sorting Algorithms. Objectives In this chapter, you will: Learn the various search algorithms Implement sequential and binary.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
1 Multi-Level Indexing and B-Trees. 2 Statement of the Problem When indexes grow too large they have to be stored on secondary storage. However, there.
University of Iowa1 Self-stabilization. The University of Iowa2 Man vs. machine: fact 1 An average household in the developed countries has 50+ processors.
Self-stabilizing energy-efficient multicast for MANETs.
Superstabilizing Protocols for Dynamic Distributed Systems Authors: Shlomi Dolev, Ted Herman Presented by: Vikas Motwani CSE 291: Wireless Sensor Networks.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
1 Routing on a Logical Grid Mohamed Gouda, Anish Arora, Young-ri Choi, Vinayak Naik The University of Texas at Austin The Ohio-State University January.
Distributed Algorithms for Dynamic Coverage in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Networks.
Synchronization: Distributed Deadlock Detection
Vineet Mittal Should more be added here Committee Members:
Lectures on Network Flows
Intra-Domain Routing Jacob Strauss September 14, 2006.
Introduction Wireless Ad-Hoc Network
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
Presentation transcript:

Tracking Murat Demirbas SUNY Buffalo

A Pursuer-Evader Game for Sensor Networks Murat Demirbas Anish Arora Mohamed Gouda

Pursuer-evader problem Evader is omniscient; Strategy of evader is unknown Pursuer can only see state of nearest node; Pursuer moves faster than evader ( ratio = f ) Required is to design a program for nodes and pursuer so that pursuer can catch evader (despite the occurrence of faults)

Model  Connected graph of sensor nodes  Transient faults; connectivity still maintained  Maximal parallelism in node actions

Two approaches Evader-centric program  move is costly, find is for free  sensor nodes communicate periodically with neighbors  stabilizes and tracks faster Pursuer-centric program  find is costly, move is for free  sensor nodes communicate with neighbors only upon request  minimizes number of messages and energy efficient Hybrid program  find & move are both tunable

Outline Evader-centric program Pursuer-centric program Hybrid program Extensions

Evader-centric program Nodes collectively maintain a tracking tree  ts.j : latest timestamp that j knows about detection of evader  p.j : parent of j in tree  d.j : distance of j from evader  root is the node where the evader resides {Evader resides at j} ---> p.j := j; ts.j :=clock.j; d.j :=0  every node sets its parent to be the nbr with maximum ts ts.k > ts.j ---> p.j :=k ; ts.j := ts.(p.j); d.j:= d.(p.j)+1 Find is for free: pursuer follows the tracking tree to its root

Evader-centric program (cont.) Tracking tree is dynamically rooted at the evader Parent of a node is closer to the evader

Evader-centric program (cont.) Tracking tree is dynamically rooted at the evader Parent of a node is closer to the evader

Evader-centric program (cont.) Tracking tree is dynamically rooted at the evader Parent of a node is closer to the evader

Evader-centric program (proof of stabilization) Tracking tree is rooted at the evader within D steps  soft-state stabilization The distance between pursuer and evader does not increase once the constructed tree includes the pursuer Starting from an arbitrary state pursuer catches evader in at most D+ 2D * f/(1-f) steps

Pursuer-centric program Move is for free: ts.j is maintained locally {evader detected at j} ---> ts.j := clock.j Nodes communicate with nbrs only at the request of pursuer; pursuer is directed to nbring node with highest recorded time {pursuer detected at j} ---> next.j :in {k | ts.k= max ts.nbr.j }; ts.j :=0 Pursuer action is to move to next.j  pursuer does a random walk until it reaches a node that evader has visited

Pursuer-centric program (cont.) If the pursuer reaches a node j with ts.j>0, pursuer catches evader within N*f/(1-f) steps

Pursuer-centric program (stabilization) Since ts.j is reset to 0 when pursuer visits j, bad values disappear From random walk result, pursuer reaches a node j, ts.j >0, within O( N 2 * log N ) steps Then, pursuer catches evader within N*f/(1-f) steps

Hybrid program Tracking tree is bounded to a depth R Pursuer-centric program is executed at nodes outside tracking tree

Hybrid program (stabilization) Since tracking tree is bounded to a depth R, soft-state stabilization is not available for nodes outside tree  Cycles are detected and removed by counting to R Starting from an arbitrary state pursuer finds the tracking tree in at most O( (N-n) 2 * log (N-n) ) steps  n : number of nodes in tracking tree Then, pursuer catches evader within R*f/(1-f) steps Hybrid program is tunable by assigning R appropriately

Outline Evader-centric program Pursuer-centric program Hybrid program Extensions

Asynchronous model : Readily available Faster convergence : Extended hybrid program Better scalability : Hierarchical tracking program

Asynchronous model Evader-centric program  instead of ts.j maintain val.j  val.j denotes the number of detections of the evader that j is aware of  when j detects evader it increments val.j  tracking tree is rooted at evader in 2D steps  we have implemented the asynchronous version for June 2002 DARPA/NEST demo Pursuer-centric program  readily available

Extended hybrid program Pursuer-centric program can be modified query a radius R p (instead of 1) s.t. R+ R p = D

Self-Stabilizing Hierarchical Tracking Service for Sensor Networks Murat Demirbas, Anish Arora, Tina Nolte, Nancy Lynch

STALK: Scalable tracking Maintain tracking structure  over fewer number of nodes  with accuracy inversely proportional to the distance from evader  communication cost of msg j,k = distance(j,k), delay= δ * distance(j,k)  nearby nodes (cheap to update) have recent & accurate info  distant nodes (expensive to update) have stale & rough info Local operations : — Cost of move proportional to the distance the evader moves — Cost of find proportional to the distance from the evader — Cost of healing proportional to the size of the initial perturbation To this end we employ a hierarchical partitioning of the network M. Demirbas, A. Arora, T. Nolte, and N. Lynch. A Hierarchy-based Fault-local Stabilizing Algorithm for Tracking in Sensor Networks. OPODIS, 2004.

Hierarchical clustering R: dilation factor of clustering to determine size at higher levels Radius at level L is ≈ R L M. Demirbas, A. Arora, V. Mittal, and V. Kulathumani. Design and Analysis of a Fast Local Clustering Service for Wireless Sensor Networks. BroadNets 2004.

evader Hierarchical tracking path evader Grow action for building a tracking path Shrink action for cleaning unrooted paths

Local find Searching phase:  A find operation at j queries j ’ s neighbors & j ’ s clusterhead at increasingly higher levels to find the tracking path Tracing phase:  Once path is found, operation follows the path to its root

evaderfind Examples of find A find for an evader d away incurs O(d) work/time cost  guaranteed to hit the tracking path at level log R d of hierarchy

A problem for move evader dithering between cluster boundaries may lead to nonlocal updates evader

Local move Lateral links to avoid nonlocal updates When evader moves to new location j:  a new path is started from j  the new path checks neighbors at each level to see whether insertion of a lateral link is possible Restricts lateral links to 1 per level in order not to deteriorate the tracking path  otherwise find would not be local since it could not hit the path at level log R d for an evader d away

evader Examples of move A move to distance d away incurs O(d*log R d) work/time cost  a level L pointer is updated at every  i L-1 R i distance; level L is updated d/ i L-1 R i times  update at L incurs O(R L ) cost

Local healing Local healing means work/time for recovery proportional to perturbation size & not the network size In the presence of faults a grow can be mistakenly initiated; shrink should contain grow a shrink can be mistakenly initiated; grow should contain shrink

Fault-containment Give more priority to the action that has more recent info regarding the validity of the path A shrink or grow action is delayed for longer periods as the level of the node executing the action gets higher j.grow-timer = g * R lvl(j) j.shrink-timer = s * R lvl(j) Catching occurs within a constant number of levels  For g=5δ, s=11δ, b=11δR grow catches shrink in 2 levels: log R ((bR–b+sR 2 –gR-δR)/(sR-gR-3δ)) shrink catches grow in 4 levels: log R ((bR–b+sR+gR-2s+3δR)/(gR-s-δ))

Seamless tracking Fault-containment does not affect responsiveness  Total delaying up to l is a constant factor of communication delay up to l, δR l Concurrent move operations  move occurs before tracking path is updated  a complete path is no longer possible; discontinuity in the path  give a bound on evader speed to maintain a reachable path Concurrent find operations  when find reaches a dead-end, search phase is re-executed  reachability condition guarantees that new path is nearby Cost of find & move unaffected find