CS728 Lecture 17 Web Indexes III. Last Time Showed how build indexes for graph connectivity Based on 2-hop covers Today Look at more general problem of.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
Lecture 7. Network Flows We consider a network with directed edges. Every edge has a capacity. If there is an edge from i to j, there is an edge from.
Dynamic Graph Algorithms - I
Dynamic Planar Convex Hull Operations in Near- Logarithmic Amortized Time TIMOTHY M. CHAN.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Distributed Structures for Multi-Hop Networks Rajmohan Rajaraman Northeastern University Partly based on a tutorial, joint with Torsten Suel, at the DIMACS.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
2-dimensional indexing structure
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
CS Lecture 9 Storeing and Querying Large Web Graphs.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
CS728 Lecture 16 Web indexes II. Last Time Indexes for answering text queries –given term produce all URLs containing –Compact representations for postings.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Distance-Based Location Update and Routing in Irregular Cellular Networks Victor Chepoi, Feodor Dragan, Yan Vaxes University of Marseille, France Kent.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
R-Trees 2-dimensional indexing structure. R-trees 2-dimensional version of the B-tree: B-tree of maximum degree 8; degree between 3 and 8 Internal nodes.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Introduction Outline The Problem Domain Network Design Spanning Trees Steiner Trees Triangulation Technique Spanners Spanners Application Simple Greedy.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
The Zone Routing Protocol (ZRP)
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Improved Sparse Covers for Graphs Excluding a Fixed Minor Ryan LaFortune (RPI), Costas Busch (LSU), and Srikanta Tirthapura (ISU)
Network Aware Resource Allocation in Distributed Clouds.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
A correction The definition of knot in page 147 is not correct. The correct definition is: A knot in a directed graph is a subgraph with the property that.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Agenda Review: –Planar Graphs Lecture Content:  Concepts of Trees  Spanning Trees  Binary Trees Exercise.
Spatial Indexing Techniques Introduction to Spatial Computing CSE 5ISC Some slides adapted from Spatial Databases: A Tour by Shashi Shekhar Prentice Hall.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Does Topology Control Reduce Interference?
Topology Control –power control
Minimum Spanning Tree 8/7/2018 4:26 AM
B+ Tree.
Net 435: Wireless sensor network (WSN)
Accessing nearby copies of replicated objects
Enumerating Distances Using Spanners of Bounded Degree
Distance and Routing Labeling Schemes in Graphs
Research: algorithmic solutions for networking
Robustness of wireless ad hoc network topologies
Robustness of wireless ad hoc network topologies
Introduction Wireless Ad-Hoc Network
How to use spanning trees to navigate in Graphs
Routing in Networks with Low Doubling Dimension
Presentation transcript:

CS728 Lecture 17 Web Indexes III

Last Time Showed how build indexes for graph connectivity Based on 2-hop covers Today Look at more general problem of compact encodings for graphs and network problems Applications - Fast queries for path information - routing & routing table construction - topology control - spanning trees - dominating sets & clustering - hierarchical clustering

Main Problem Considered arbitrary topology goal small routing tables to find path to destination related problem: finding closest item of certain type Routing: how do I get there from here? source destination

Definitions: Spanner: subgraph whose distance between two nodes is close to that in the original graph We will see that radio networks need energy-spanners, i.e, subgraphs that contain energy-efficient paths

Spanning Trees: K-Dominating Sets: minimum connected subgraph useful for routing single point of failure non-minimal routes many variants set of nodes that are within K hops of every node used to defines partition of the network into zones 1-dominating set

Graph Clustering: Hierarchical Clustering K-center problem – find k nodes such that minimize the max distance to all nodes – Flat Clustering Hierarchical Clustering tree clustering with internal and border nodes and edges

Hierarchical Clustering The hierarchy imposes a natural addressing scheme Each node labeled with the path in the hierarchy tree Problem: give a compact labeling for a tree –Clearly need logn bits to identify some nodes. –Need to add information about tree structure –Complete binary tree –Other n-node trees

Interval labeling scheme –Label the leaves of the tree uniquely logn bits –Label each internal node with the range of its descendents 2log n bits. –Given two nodes x,y and their labels Can you test if x is an ancestor or y? Can you describe the path from x to y?

Greedy Dewey Labeling scheme Label each edge with small unique string Nodes are concatenation of edge labels

Theorem: Upper bound on GDL label length with unary delimiters is bits, - is the depth of v in T - n is number of nodes in T Alternative use binary (fixed length) for delimiting each edge –Seems to do worse in practice Can remove dependence on depth by converting encodings of long interior paths using count labels

Spanners and Stretch Stretch of a subgraph H is the maximum ratio of the distance between two nodes in H to that between them in G –Extensively studied in the graph algorithms and graph theory literature [Eppstein 96] Distance stretch and topological stretch A spanner is a subgraph that has constant stretch –The Delaunay triangulation yields a planar Euclidean distance-spanner –The Yao-graph [Yao 82] is also a simple distance- spanner

Energy Stretch and Energy Spanners Commonly adopted power attenuation model: – is between 2 and 4 Assuming uniform threshold for reception power and interference/noise levels, energy consumed for transmitting from to needs to be proportional to Power control: Radios have the capability to adjust their power levels so as to reach destination with desired fidelity Energy consumed along a path is simply the sum of the transmission energies along the path links Define energy-stretch analogous to distance-stretch

Energy-Aware Routing A path with many short hops consumes less energy than a path with a few large hops –Which edges to use? (Considered in topology control) –Can maintain “energy cost” information to find minimum- energy paths [Rodoplu-Meng 98] Routing to maximize network lifetime [Chang- Tassiulas 99] –Formulate the selection of paths and power levels as an optimization problem –Suggests the use of multiple routes between a given source- destination pair to balance energy consumption Energy consumption also depends on transmission rate –Schedule transmissions lazily [Prabhakar et al 2001] –Can split traffic among multiple routes at reduced rate [Shah- Rabaey 02]

Topology Control Given: –A collection of nodes in the plane –Transmission range of the nodes (assumed equal) Goal: To determine a subgraph of the transmission graph G that is –Connected –Low-degree –Small stretch, hop-stretch, and power- stretch

The Yao Graph Divide the space around each node into sectors (cones) of angle Each node has an edge to nearest node in each sector Number of edges is For any edge (u,v) in transmission graph – There exists edge (u,w) in same sector such that w is closer to v than u is Theorem: The Yao Graph has stretch u w v

Dominating Set Applications Facility location –A set of -dominating centers can be selected to locate servers or copies of a distributed directory –Dominating sets can serve as location database for storing routing information in ad hoc networks [Liang Haas 00] NP-hard for general graphs Reduces to the minimum set cover problem Recall last time: Greedy gives logn approximation Admits a PTAS for planar graphs [Baker 94]

An Example Greedy Algorithm

Hierarchical Network Decomposition Sparse neighborhood covers [Awerbuch-Peleg 89, Linial-Saks 92] –Applications in location management, replicated data management, routing –Provable guarantees, though difficult to adapt to a dynamic environment Routing scheme using hierarchical partitioning [Dolev et al 95] –Adaptive to topology changes –Weak guarantees in terms of stretch and memory per node

Sparse Neighborhood Covers An r-neighborhood cover is a set of overlapping clusters such that the r-zone of any node is in one of the clusters Aim: Have covers that are low diameter and have small overlap Overlap is measured by the max number of clusters a node is in Tradeoff between diameter and overlap –Set of all r-zones: Have diameter 2r but overlap n –The entire network single cluster: Overlap 1 but diameter could be n Sparse r-neighborhood with O(r log(n)) diameter clusters and O(log(n)) overlap [Peleg 89, Awerbuch- Peleg 90]

Sparse Neighborhood Covers Set of sparse neighborhood covers –{ -neighborhood cover: } For each node: –For any, the -zone is contained within a cluster of diameter –The node is in clusters Applications: –Tracking mobile users –Distributed directories for replicated objects

Online Tracking of Mobile Users Given a fixed network with mobile users Need to support location query operations Home location register (HLR) approach: –Whenever a user moves, corresponding HLR is updated –Inefficient if user is near the seeker, yet HLR is far Performance issues: –Cost of query: ratio with “distance” between source and destination –Cost of updating the data structure when a user moves

Mobile User Tracking: Initial Setup The sparse -neighborhood cover forms a regional directory at level At level, each node u selects a home cluster that contains the -zone of u Each cluster has a leader node. Initially, each user registers its location with the home cluster leader at each of the levels

The Location Update Operation When a user X moves, X leaves a forwarding pointer at the previous host. User X updates its location at only a subset of home cluster leaders –For every sequence of moves that add up to a distance of at least, X updates its location with the leader at level Amortized cost of an update is for a sequence of moves totaling distance

The Location Query Operation To locate user X, go through the levels starting from 0 until the user is located At level, query each of the clusters u belongs to in the -neighborhood cover Follow the forwarding pointers, if necessary Cost of query:, if is the distance between the querying node and the current location of the user

Comments on the Tracking Scheme Distributed construction of sparse covers in time [Awerbuch et al 93] The storage load for leader nodes may be excessive; use hashing to distribute the leadership role (per user) over the cluster nodes Distributed directories for accessing replicated objects [Awerbuch-Bartal-Fiat 96] –Allows reads and writes on replicated objects –An -competitive algorithm assuming each node has times more memory than the optimal Unclear how to maintain sparse neighborhood covers in a dynamic network

Bubbles Routing and Partitioning Scheme Adaptive scheme by [Dolev et al 95] Hierarchical Partitioning of a spanning tree structure Provable bounds on efficiency for updates 2-level partitioning of a spanning tree root

Bubbles (cont.) Size of clusters at each level is bounded Cluster size grows exponentially # of levels equal to # of routing hops Tradeoff between number of routing hops and update costs Each cluster has a leader who has routing information General idea: - route up the tree until in the same cluster as destination, - then route down - maintain by rebuilding/fixing things locally inside subtrees

Bubbles Algorithm A partition is an [x,y]-partition if all its clusters are of size between x and y A partition P is a refinement of another partition P’ if each cluster in P is contained in some cluster of P’. An (x_1, x_2, …, x_k)-hierarchical partitioning is a sequence of partitions P_1, P_2,.., P_k such that - P_i is an [x_i, d x_i] partitioning (d is the degree) - P_i is a refinement of P_(i-1) Choose x_(k+1) = 1 and x_i = x_(i+1) n 1/k

Clustering Construction Build a spanning tree, say, using BFS Let P_1 be the cluster consisting of the entire tree Partition P_1 into clusters, resulting in P_2 Recursively partition each cluster Maintenance rules: - when a new node is added, try to include in existing cluster, else split cluster - when a node is removed, if necessary combine clusters

memory requirement adaptability k hops during routing matching lower bound for bounded degree graphs Note: Bubbles does not provide a non-trivial upper bound on stretch in the non-hop model Performance Bounds