Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Comments We consider in this topic a large class of related problems that deal with proximity of points in the plane. We will: 1.Define some proximity.
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
Combinatorial Algorithms
1st Meeting Industrial Geometry Computational Geometry ---- Some Basic Structures 1st IG-Meeting.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Trade-Offs and Topology Control 6th Week.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
A Unified Energy Efficient Topology for Unicast and Broadcast Xiang-Yang Li*, Wen-Zhang Song † and WeiZhao Wang* *Illinois Institute of Technology † Washington.
Chapter 9 Graph algorithms. Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Chapter 9 Graph algorithms Lec 21 Dec 1, Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Lost in Space or Positioning in Sensor Networks Michael O’Dell Regina O’Dell Mirjam Wattenhofer Roger Wattenhofer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 20th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Topology Control Algorithms Davide Bilò
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
1 University of Denver Department of Mathematics Department of Computer Science.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Introduction Outline The Problem Domain Network Design Spanning Trees Steiner Trees Triangulation Technique Spanners Spanners Application Simple Greedy.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Minimizing interference for the highway model in Wireless Ad-hoc and Sensor Networks Haisheng Tan, Tiancheng, Lou, Francis C.M. Lau, YuexuanWang, Shiteng.
Theory of Computing Lecture 10 MAS 714 Hartmut Klauck.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Coverage and Connectivity Issues in Sensor Networks
GRAPHS CSE, POSTECH. Chapter 16 covers the following topics Graph terminology: vertex, edge, adjacent, incident, degree, cycle, path, connected component,
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Data Structures & Algorithms Graphs
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
© Yamacraw, Fall 2002 Power Efficient Range Assignment in Ad-hoc Wireless Networks E. Althous (MPI) G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) S. Prasad.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
Spanning Tree Definition:A tree T is a spanning tree of a graph G if T is a subgraph of G that contains all of the vertices of G. A graph may have more.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
Does Topology Control Reduce Interference?
Topology Control –power control
Application of Computational Geometry in Wireless Networks
CS 3343: Analysis of Algorithms
Clustering TexPoint fonts used in EMF.
Topology Control and Its Effects in Wireless Networks
Introduction Wireless Ad-Hoc Network
Presentation transcript:

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/2 Inventory Tracking (Cargo Tracking) Current tracking systems require line- of-sight to satellite. Count and locate containers Search containers for specific item Monitor accelerometer for sudden motion Monitor light sensor for unauthorized entry into container

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/3Ad Hoc and Sensor Networks – Roger Wattenhofer – Rating Area maturity Practical importance Theory appeal First steps Text book No apps Mission critical Boooooooring Exciting

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/4Ad Hoc and Sensor Networks – Roger Wattenhofer – Proximity Graphs: Gabriel Graph et al. Practical Topology Control: XTC Interference Overview – Topology Control

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/5Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Drop long-range neighbors: Reduces interference and energy! But still stay connected (or even spanner)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/6Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control as a Trade-Off Network Connectivity Spanner Property Topology Control Conserve Energy Reduce Interference Sparse Graph, Low Degree Planarity Symmetric Links Less Dynamics d TC (u,v) · c ¢ d(u,v)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/7Ad Hoc and Sensor Networks – Roger Wattenhofer – Spanners Let the distance of a path from node u to node v, denoted as d(u,v), be the sum of the Euclidean distances of the links of the shortest path. –Writing d(u,v) p is short for taking each link distance to the power of p, again summing up over all links. Basic idea: S is spanner of graph G if S is a subgraph of G that has certain properties for all pairs of nodes, e.g. –Geometric spanner: d S (u,v) ≤ c ¢ d G (u,v) –Power spanner: d S (u,v) α ≤ c ¢ d G (u,v) α, for path loss exponent α –Weak spanner: path of S from u to v within disk of diameter c ¢ d G (u,v) –Hop spanner: d S (u,v) 0 ≤ c ¢ d G (u,v) 0 –Additive hop spanner: d S (u,v) 0 ≤ d G (u,v) 0 + c –(α, β) spanner: d S (u,v) 0 ≤ α ¢ d G (u,v) 0 + β –The stretch can be defined as maximum ratio d S / d G

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/8Ad Hoc and Sensor Networks – Roger Wattenhofer – Gabriel Graph Let disk(u,v) be a disk with diameter (u,v) that is determined by the two points u,v. The Gabriel Graph GG(V) is defined as an undirected graph (with E being a set of undirected edges). There is an edge between two nodes u,v iff the disk(u,v) including boundary contains no other points. As we will see the Gabriel Graph has interesting properties. disk(u,v) v u

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/9Ad Hoc and Sensor Networks – Roger Wattenhofer – Delaunay Triangulation Let disk(u,v,w) be a disk defined by the three points u,v,w. The Delaunay Triangulation (Graph) DT(V) is defined as an undirected graph (with E being a set of undirected edges). There is a triangle of edges between three nodes u,v,w iff the disk(u,v,w) contains no other points. The Delaunay Triangulation is the dual of the Voronoi diagram, and widely used in various CS areas –the DT is planar –the DT is a geometric spanner disk(u,v,w) v u w

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/10Ad Hoc and Sensor Networks – Roger Wattenhofer – Other Proximity Graphs Relative Neighborhood Graph RNG(V) –An edge e = (u,v) is in the RNG(V) iff there is no node w in the “lune” of (u,v), i.e., no noe with with (u,w) < (u,v) and (v,w) < (u,v). Minimum Spanning Tree MST(V) –A subset of E of G of minimum weight which forms a tree on V. v u

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/11Ad Hoc and Sensor Networks – Roger Wattenhofer – Properties of Proximity Graphs Theorem 1: MST µ RNG µ GG µ DT Corollary: Since the MST is connected and the DT is planar, all the graphs in Theorem 1 are connected and planar. Theorem 2: The Gabriel Graph is a power spanner (for path loss exponent  ¸ 2). So is GG Å UDG. Remaining issue: either high degree (RNG and up), and/or no spanner (RNG and down). There is an extensive and ongoing search for “Swiss Army Knife” topology control algorithms.

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/12Ad Hoc and Sensor Networks – Roger Wattenhofer – More Proximity Graphs  -Skeleton –Disk diameters are  ¢ d(u,v), going through u resp. v –Generalizing GG (  = 1) and RNG (  = 2) Yao-Graph –Each node partitions directions in k cones and then connects to the closest node in each cone Cone-Based Graph –Dynamic version of the Yao Graph. Neighbors are visited in order of their distance, and used only if they cover not yet covered angle

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/13Ad Hoc and Sensor Networks – Roger Wattenhofer – Lightweight Topology Control Topology Control commonly assumes that the node positions are known. What if we do not have access to position information?

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/14 XTC: Lightweight Topology Control without Geometry Each node produces “ranking” of neighbors. Examples –Distance (closest) –Energy (lowest) –Link quality (best) –Must be symmetric! Not necessarily depending on explicit positions Nodes exchange rankings with neighbors C D E F A 1. C 2. E 3. B 4. F 5. D 6. G B G

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/15 XTC Algorithm (Part 2) Each node locally goes through all neighbors in order of their ranking If the candidate (current neighbor) ranks any of your already processed neighbors higher than yourself, then you do not need to connect to the candidate. A B C D E F G 1. C 2. E 3. B 4. F 5. D 6. G 1. F 3. A 6. D 7. A 8. C 9. E 3. E 7. A 2. C 4. G 5. A 3. B 4. A 6. G 8. D 4. B 6. A 7. C

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/16Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Analysis (Part 1) Symmetry: A node u wants a node v as a neighbor if and only if v wants u. Proof: –Assume 1) u  v and 2) u  v –Assumption 2)  9 w: (i) w Á v u and (ii) w Á u v Contradicts Assumption 1) In node u’s neighbor list, w is better than v

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/17Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Analysis (Part 1) Symmetry: A node u wants a node v as a neighbor if and only if v wants u. Connectivity: If two nodes are connected originally, they will stay so (easy to show if rankings are based on symmetric link-weights). If the ranking is energy or link quality based, then XTC will choose a topology that routes around walls and obstacles.

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/18Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Analysis (Part 2) If the given graph is a Unit Disk Graph (no obstacles, nodes homogeneous, but not necessarily uniformly distributed), then … The degree of each node is at most 6. The topology is planar. The graph is a subgraph of the RNG. Relative Neighborhood Graph RNG(V): –An edge e = (u,v) is in the RNG(V) iff there is no node w with (u,w) < (u,v) and (v,w) < (u,v). v u

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/19Ad Hoc and Sensor Networks – Roger Wattenhofer – Unit Disk Graph XTC XTC Average-Case

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/20Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Average-Case (Degrees) XTC avg GG avg UDG avg XTC max GG max UDG max v u

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/21Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Average-Case (Stretch Factor) GG vs. UDG – Power XTC vs. UDG – Power GG vs. UDG – Geometric XTC vs. UDG – Geometric

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/22Ad Hoc and Sensor Networks – Roger Wattenhofer – Implementing XTC, e.g. BTnodes v3

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/23Ad Hoc and Sensor Networks – Roger Wattenhofer – Implementing XTC, e.g. on mica2 motes Idea: –XTC chooses the reliable links –The quality measure is a moving average of the received packet ratio –Source routing: route discovery (flooding) over these reliable links only –(black: using all links, grey: with XTC)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/24Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control as a Trade-Off Network Connectivity Spanner Property Topology Control Conserve Energy Reduce Interference Sparse Graph, Low Degree Planarity Symmetric Links Less Dynamics Really?!?

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/25Ad Hoc and Sensor Networks – Roger Wattenhofer – What is Interference? Link-based Interference Model Node-based Interference Model „How many nodes are affected by communication over a given link?“ Exact size of interference range does not change the results „By how many other nodes can a given network node be disturbed?“ Interference 2 Problem statement –We want to minimize maximum interference –At the same time topology must be connected or spanner Interference 8

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/26Ad Hoc and Sensor Networks – Roger Wattenhofer – Low Node Degree Topology Control? Low node degree does not necessarily imply low interference: Very low node degree but huge interference

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/27Ad Hoc and Sensor Networks – Roger Wattenhofer – Let’s Study the Following Topology! …from a worst-case perspective

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/28Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Algorithms Produce… All known topology control algorithms (with symmetric edges) include the nearest neighbor forest as a subgraph and produce something like this: The interference of this graph is  (n)!

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/29Ad Hoc and Sensor Networks – Roger Wattenhofer – But Interference… Interference does not need to be high… This topology has interference O(1)!!

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/30Ad Hoc and Sensor Networks – Roger Wattenhofer – u v Link-based Interference Model There is no local algorithm that can find a good interference topology The optimal topology will not be planar

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/31Ad Hoc and Sensor Networks – Roger Wattenhofer – Link-based Interference Model LIFE (Low Interference Forest Establisher) –Preserves Graph Connectivity –Attribute interference values as weights to edges –Compute minimum spanning tree/forest (Kruskal’s algorithm) LIFE Interference 4 LIFE constructs a minimum- interference forest

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/32Ad Hoc and Sensor Networks – Roger Wattenhofer – Average-Case Interference: Preserve Connectivity UDG GG RNG LIFE

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/33Ad Hoc and Sensor Networks – Roger Wattenhofer – Connecting linearly results in interference O(n) Node-based Interference Model Already 1-dimensional node distributions seem to yield inherently high interference but the exponential node chain can be connected in a better way

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/34Ad Hoc and Sensor Networks – Roger Wattenhofer – Connecting linearly results in interference O(n) Node-based Interference Model Already 1-dimensional node distributions seem to yield inherently high interference......but the exponential node chain can be connected in a better way Matches an existing lower bound Interference

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/35Ad Hoc and Sensor Networks – Roger Wattenhofer – Node-based Interference Model Arbitrary distributed nodes in one dimension –Approximation algorithm with approximation ratio in O( ) Two-dimensional node distributions –Simple randomized algorithm resulting in interference O( ) –Can be improved to O(√n)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/36Ad Hoc and Sensor Networks – Roger Wattenhofer – Open problem On the theory side there are quite a few open problems. Even the simplest questions of the node-based interference model are open: We are given n nodes (points) in the plane, in arbitrary (worst-case) position. You must connect the nodes by a spanning tree. The neighbors of a node are the direct neighbors in the spanning tree. Now draw a circle around each node, centered at the node, with the radius being the minimal radius such that all the nodes’ neighbors are included in the circle. The interference of a node u is defined as the number of circles that include the node u. The interference of the graph is the maximum node interference. We are interested to construct the spanning tree in a way that minimizes the interference. Many questions are open: Is this problem in P, or is it NP-complete? Is there a good approximation algorithm? Etc.