Roger Wattenhofer MACbeth The Three Witches of Media Access Theory.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Improvement on LEACH Protocol of Wireless Sensor Network
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
Algorithms for Ad Hoc Networks Roger Wattenhofer MedHocNet 2005 alg hoc net 2005.
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
NCKU CSIE CIAL1 How Optimal are Wireless Scheduling Protocols? Authors: Thomas Moscibroda, Yvonne Anne Oswald and Roger Wattenhofer Publisher: IEEE INFOCOM.
Roger Wattenhofer Distributed Algorithms Sensor Networks Reloaded or Revolutions?
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
$ Spectrum Aware Load Balancing for WLANs Victor Bahl Ranveer Chandra Thomas Moscibroda Yunnan Wu.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Ad Hoc and Sensor Networks – Roger Wattenhofer –10/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Clustering Chapter 10 TexPoint fonts used in EMF.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Roger WISARD 2008 –1 The Complexity of Connectivity in Wireless Networks TexPoint fonts used in EMF. Read the TexPoint manual before you.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad- Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Ad Hoc and Sensor Networks – Roger Wattenhofer –7/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Clustering Chapter 7 TexPoint fonts used in EMF. Read.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
Andrea CLEMENTI Radio Networks The Model Broadcast.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
MAC Protocols for Sensor Networks
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
Mobile Communications Chapter 3 : Media Access
TexPoint fonts used in EMF.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Algorithms for Ad Hoc Networks
Protocols.
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Protocols.
Presentation transcript:

Roger Wattenhofer MACbeth The Three Witches of Media Access Theory

Roger Wattenhofer, FAWN What has been studied? Link Layer Network Layer Services Theory/Models MAC Layer (e.g. Coloring) Topology and Power Control Interference and Signal-to-Noise-Ratio Clustering (e.g. Dominating Sets) Deployment (Unstructured Radio Networks) New Routing Paradigms (e.g. Link Reversal) Geo-Routing Broadcast and Multicast Data Gathering Location Services and Positioning Time Synchronization Capacity and Information Theory Lower Bounds for Message Passing Selfish Agents, Economic Aspects, Security …most ardently? #5 #4 #3 #2 #1 What is really important?! ? #1

Roger Wattenhofer, FAWN Media Access Control (MAC) Layer The MAC layer protocol controls the access to the shared physical transmission medium –In other words, which station is allowed to transmit at which time (on which frequency, etc.) MAC layer principles/techniques –Space and frequency multiplexing (always, if possible) –TDMA: Time division multiple access (GSM) –CSMA/CD: Carrier sense multiple access / Collision detection (Ethernet) –CSMA/CA: Carrier sense multiple access / Collision avoidance (802.11) –CDMA: Code division multiple access (UMTS)

Roger Wattenhofer, FAWN Why is the MAC layer so important? In a wireless multi-hop network, many design issues are central –Application –Hardware design –Physical layer (e.g. antenna) –Operating system –Sensor network: Sensors –… more topics not really related to algorithms/theory/fundamentals However, also really critical is the MAC Layer –In my opinion much more essential than, e.g. routing –Higher throughput –Saving energy (long sleeping cycles)

Roger Wattenhofer, FAWN Why?! What?!? How? An Orthodox TDMA MAC algorithm Given a connectivity graph G, often a unit disk graph Interference? Two-hop neighbors! (“Hidden terminal problem”) Algorithm: G’ = G + two-hop links, min-color G’ –Frame length = number of colors, slot = color. BAC #1 #2 #3

Roger Wattenhofer, FAWN The Three Witches (Talk Outline) Introduction –Why MAC is important –Orthodox MAC Witch #1: The Chicken-and-Egg Problem Witch #2: Power Control is Essential Witch #3: Models, Models, Models! Please mind, this is talk about theory/algorithms/fundamentals, not systems. Systems are more difficult, or at least different…

Roger Wattenhofer, FAWN Witch #1: The Chicken-and-Egg Problem Excerpt from a typical paper: #1

Roger Wattenhofer, FAWN Coloring Algorithms Assume an Established MAC Layer... How do you know your neighbors? How can you exchange data with them?  Collisions (Hidden-Terminal Problem) Most papers assume that there is a MAC Layer in place! This assumption may make sense in well-established, well-structured networks,......but it is certainly invalid during and shortly after the deployment of ad hoc and sensor networks, when there is not yet a MAC layer established

Roger Wattenhofer, FAWN Or a Global Clock How do nodes know when to start the loop? What if nodes join in afterwards?  Asynchronous wake-up! Paper assumes that there is a global clock and synchronous wake-up! This assumption greatly facilitates the algorithm‘s analysis......but it is certainly invalid during and shortly after the deployment of ad hoc and sensor networks, when there is not yet a MAC layer established

Roger Wattenhofer, FAWN We have a Chicken-And-Egg-Problem TDMA MAC protocols can be reduced to two-hop coloring Coloring algorithms assume a working MAC layer

Roger Wattenhofer, FAWN Deployment and Initialization Ad Hoc & Sensor Networks  no built-in infrastructure During and after the deployment  complete chaos Neighborhood is unknown There is no existing MAC-layer providing point-to-point connections! Self-Organization „Initialization“

Roger Wattenhofer, FAWN Deployment and Initialization Initialization in current systems often slow (e.g. Bluetooth) Ultimate Goal: Come up with an efficient MAC-Layer quickly. Theory Goal: Design a provably fast and reliable initialization algorithm. We have to consider the relevant technicalities! We need to define a model capturing the characteristics of the initialization phase.

Roger Wattenhofer, FAWN Unstructured Radio Network Model (1) Adapt classic Radio Network Model to model the conditions immediately after deployment. Multi-Hop –Hidden-Terminal Problem No collision detection –Not even at the sender No knowledge about (the number of) neighbors Asynchronous Wake-Up –No global clock Node distribution is completely arbitrary –No uniform distribution

Roger Wattenhofer, FAWN Quasi Unit Disk Graph (QUDG) to model wireless multi-hop network –Two nodes can communicate if Euclidean distance is · d –Two nodes cannot communicate if Euclidean distance is >1 –In the range [d..1], it is unspecified whether a message arrives [Barrière, Fraigniaud, Narayanan, 2001] Upper bound N for number of nodes in network is known –This is necessary due to  (n / log n) lower bound [Jurdzinski, Stachowiak, 2002] Unstructured Radio Network Model (2) Q: Can we efficiently (and provably!) compute a MAC-Layer in this harsh model? A: Hmmm,... d 1 Q: Can we efficiently (and provably!) compute an initial structure in this harsh model? A: Yes, we can!

Roger Wattenhofer, FAWN Results Thomas Moscibroda, Roger Wattenhofer, SPAA 2005 With high probability, the distributed coloring algorithm... ... achieves a correct coloring using O(  ) colors ... every node irrevocably decides on a color within time O(  log n) after its wake-up ... the highest color depends only on the local maximum degree

Roger Wattenhofer, FAWN Idea: Color in a two-step process! First, nodes select a (sparse) set of leaders among themselves  induces a clustering Leaders assign initial coloring that is correct within the cluster Problem: Nodes in different clusters may be neighbors! In a final verification phase, nodes select final (conflict-free) color from color-range! Algorithm Overview (system’s view) Interpret initial color as a color-range!

Roger Wattenhofer, FAWN Algorithm Overview (a node’s view) Messages are sent with state-specific probabilities! Sleeping nodes Initial waiting period Competing nodes try to become leader Leaders Slaves requesting a color-range Slaves that have received a color-range verify its color Colored slaves MAMA MLML MLML M L (c) M Request M Verification M color Wake-up M L received else M L (c) received Each node increases a local counter. When counter reaches threshold  Move to next state!

Roger Wattenhofer, FAWN Problems:  Everything happens concurrently!  Nodes do not know in which state neighbors are (they do not even know whether there are any neighbors!)  Messages may be lost due to collisions  New nodes may join in at any time... Correctness!  No two neighbors must choose the same color. No starvation!  Every node must be able to choose a color within time O(  log n) after its wake-up. Algorithm Overview (Challenges) How to achieve both?

Roger Wattenhofer, FAWN MobiCom 2004 (Kuhn, Moscibroda, Wattenhofer) A model capturing the characteristics of the initialization phase A fast algorithm for computing a good dominating set from scratch MASS 2004 (Moscibroda, Wattenhofer): A fast algorithm for computing more sophisticated structures (MIS) Conclusions Initialization of ad hoc and sensor network of great importance! Relevant technicalities must be considered! GOAL SPAA 2005 (Moscibroda, Wattenhofer): A fast algorithm for computing a coloring A fast algorithm for establishing a MAC Layer from scratch! …

Roger Wattenhofer, FAWN Initial MAC layer this talk  current work The Deployment Problem: Future Work time Nodes know neighbors, etc. Fair MAC layer Ad hoc networks High-Throughput MAC layer Multimedia Energy-Efficient MAC layer Long lifetime Sensor networks There’s more to deployment Time synchronization Topology control, etc. Failures ? Mobility ? Late arrivals

Roger Wattenhofer, FAWN Algorithm Classes Global Algorithm Distributed Algorithm LocalLocalized For some problems we don’t even understand the non-distributed case “Reiceive msg X  Transmit msg Y” Every algo can be made distributed +Node can only communicate with neighbors k times. +Strict time bounds – Often synchronous Unstructured +Often simple – Nodes can wait for neighbor actions – Often linear chain of causality +Implement MAC layer yourself; you control everything – Often complicated – Argumentation overhead

Roger Wattenhofer, FAWN The Three Witches (Talk Outline) Introduction –Why MAC is important –Orthodox MAC Witch #1: The Chicken-and-Egg Problem Witch #2: Power Control is Essential Witch #3: Models, Models, Models!

Roger Wattenhofer, FAWN Witch #2: Power Control is Essential Modeling interference in a typical algorithms paper: The model is a simplification, sure, but is the hidden terminal problem really a problem?!? #2 BAC

Roger Wattenhofer, FAWN The Hidden-Terminal Problem AB C D 1m Consider the following scenario: –A wants to sent to B, C wants to send to D –How many time slots are required? Can A and C send simultaneously...? No, they cannot! This is the Hidden-Terminal Problem! Interference causes a collision at B! But is this really true...?

Roger Wattenhofer, FAWN The Hidden-Terminal Problem AB C D 1m A wants to sent to B, C wants to send to D Let us look at the signal-to-noise-plus-interference (SINR) ratio! Message arrives if SINR is larger than  at receiver Minimum signal-to- interference ratio Power level of node u Path-loss exponent Noise Distance between two nodes

Roger Wattenhofer, FAWN The Hidden-Terminal Problem AB C D 1m A wants to sent to B, C wants to send to D Let  =3,  =4, and N=1 (these are realistic values in sensor networks) Set the transmission powers as follows P C =15 and P A =70 The SINR at D is: The SINR at B is: Simultaneous transmission is possible !

Roger Wattenhofer, FAWN Let’s make it tougher! A wants to sent to B, C wants to send to D Can A and C send simultaneously...? No, they cannot! Reasons D is in sending range of A  collision at D B hears either C or a collision, but not A! Common Sense.... But is this really true...? AB CD

Roger Wattenhofer, FAWN Let’s make it tougher! AB CD 4m 1m A wants to sent to B, C wants to send to D Let  =4,  =2, and N=1 Set the transmission powers as follows P C =100 and P A =3900 The SINR at D is: The SINR at B is: Again: Simultaneous transmission is possible ! 2m

Roger Wattenhofer, FAWN Theory vs. Reality! Graph Theoretical Models: There exists no graph-theoretic model that can capture the above ! –Unit Disk Graph  No! (C cannot send to D in this model!) –General Graph  No! (because success depends on A‘s power!) –Radio Network Models  No! (Collision garbles messages!) –Etc... Modeling networks as graphs appears to be inherently wrong!!! AB CD

Roger Wattenhofer, FAWN Theory vs. Reality! Power Assignment Policies: All nodes have uniform power  No! –Node B will receive the transmission of node C –Impossible even in SINR model! Powers are according to  No! –This linear power assignment often assumed in theory (minimum energy broadcast, topology control, etc... ) –Node D will receive the transmission of node A All typically studied power assignment schemes are bad! Constant power level Proportional to d α AB CD

Roger Wattenhofer, FAWN Theory vs. Reality! We have seen.... 1)Graph models are inherently flawed! 2)Standard power assignment assumptions are suboptimal! The question is.... How far from reality are graph models...? Some necessary, technical simplifications. Some necessary, technical simplifications. Fundamental aspects are captured and results remain essentially valid Obtained results are fundamentally different from reality!

Roger Wattenhofer, FAWN Theory vs. Reality! We have seen.... 1)Graph models are inherently flawed! 2)Standard power assignment assumptions are suboptimal! The question is.... How sub-optimal are common power assignment schemes...? Achieved throughput is acceptably high The resulting throughput is way below the theoretical limits Simple power assignment schemes can be employed More subtle power assignment schemes are required! 1) Uniform Power Levels... 2) Power according to P ¼  (d  )

Roger Wattenhofer, FAWN Consider the following simple scheduling task  : A Simple Scheduling Problem How far from reality are graph models...? How sub-optimal are common power assignment schemes...? Every node can send one message successfully? Nodes can choose receivers optimally! (e.g. nearest neighbor) How many time-slots are required to schedule this task? „The Scheduling Complexity in Wireless Networks“ 

Roger Wattenhofer, FAWN An example: A Simple Scheduling Problem - Example How far from reality are graph models...? How sub-optimal are common power assignment schemes...? Time-SlotSenders: t 1 :v 1, v 4, v 7 t 2 :v 1, v 3, v 6 t 3 :v 5, v 8 This scheme uses 3 time slots!  Scheduling complexity of  is 3 in this example.

Roger Wattenhofer, FAWN A Simple Scheduling Problem How far from reality are graph models...? How sub-optimal are common power assignment schemes...? This is possibly the simplest possible scheduling problem! Define: Scheduling Complexity S(  ) of  The number of time-slots required until every node can transmit at least once!  Problem describes a fundamental property of wireless networks.  Because the problem is so simple standard MAC protocols are expected to perform reasonably well graph-based models are expected to be reasonably close to reality. Clearly, S(  ) · n

Roger Wattenhofer, FAWN Lower Bound for Power Assignment Consider again the exponential chain:

Roger Wattenhofer, FAWN Consider again the exponential chain: How many links can we schedule simultaneously? Let us start with the first node v 1...  its power is P 1 ¸  2  (i+10) for some constant  This creates interference of at least  /2  at every other node! The second node v 2 also sends with power P 2 =  2  (i+7) Again, this creates an additional interference of at least  /2  at every other node! 2i2i 2 i+1 2 i+2 2 i+3 2 i+4 2 i+5 2 i+6 2 i+7 2 i+8 2 i+9 2 i+10 Why…??? f1f1 v1v1  (f 1 )  Power Interference    (f 2 )  v2v2 f2f2   Lower Bound for Power Assignment

Roger Wattenhofer, FAWN Consider again the exponential chain: How many links can we schedule simultaneously? Let us start with the first node v 1...  its power is P 1 ¸  2  (i+10) for some constant  This creates interference of at least  /2  at every other node! The second node v 2 also sends with power P 2 ¸  2  (i+7) Again, this creates an additional interference of at least  /2  at every other node! 2i2i 2 i+1 2 i+2 2 i+3 2 i+4 2 i+5 2 i+6 2 i+7 2 i+8 2 i+9 2 i+10 Why…??? f1f1 v1v1  (f 1 )  Power Interference    (f 2 )  v2v2 f2f2   And so on… v3v3 f3f3  (f 3 )    Lower Bound for Power Assignment

Roger Wattenhofer, FAWN Assume we can schedule R nodes in parallel. The left-most receiver x r faces an interference of R ¢  /2   yet, x r receives the message, say from x s. How large can R be? The SINR at x r must be at least , and hence From this, it follows that R is at most 2  /  and therefore...  at least n¢ min{1,  /2  } time slots are required for all links! Lower Bound for Power Assignment Any power assignment algorithm has scheduling complexity: S(  )2  (n)

Roger Wattenhofer, FAWN The trivial algorithm (scheduling each node individually) requires n time slots. Any algorithm with power assignment requires  (n) time slots. Any algorithm with uniform power assignment requires  (n) time slots. Lower Bounds and Lessons Learned… S(  ) 2 O(n) S(  ) 2  (n) Hidden constants Are very small! Theoretical performance of current MAC layer protocols almost as bad as scheduling every single node individually! Current MAC layer protocols have a severe scaling problem! Theoretically efficient MAC protocols must use non-trivial power levels! Observations:

Roger Wattenhofer, FAWN Can we break the  (n) barrier...? Observation: Scheduling a set of links of roughly the same length is easy...  Partition the set of links in length-classes  Schedule each length-class independently one after the other... The problem is...  there may be many (up to n) different length-classes  We must schedule links of different lengths simultaneously ! How can we assign powers to nodes?  Making the transmission power dependent on the length of link is bad! We must make the power assigned to simultaneous links dependent on their relative position of the length class! Can we do better…? e.g. exponential node-chain... S(  ) 2 O(#of Length-classes) e.g. uniform and ~d  examples before Ooops, now it gets complicated...!

Roger Wattenhofer, FAWN A node v in length-class and a link of length d transmit roughly with a power of P(v) ¼  ¢ d  Unfortunately, it still does not work yet we also need to carefully select the transmitting nodes! Can we do better…? Intuitively, nodes with small links must overpower their receivers! Ooops, now it gets complicated...!

Roger Wattenhofer, FAWN Yes, we can but it is somewhat complicated! Our results are [Moscibroda, Wattenhofer, INFOCOM 06]: Problem  can be scheduled in time: S(  ) 2 O(log 2 n) What about scheduling more complex topologies than  ? In any network, a strongly-connected topology can be scheduled in time:S(Connected) 2 O(log 3 n) What about arbitrary set of requests? Any topology can be scheduled in time: S(Arbitrary) 2 O(I in ¢ log 2 n) Can we do better…? Compare to  n)

Roger Wattenhofer, FAWN The Three Witches (Talk Outline) Introduction –Why MAC is important –Orthodox MAC Witch #1: The Chicken-and-Egg Problem Witch #2: Power Control is Essential Witch #3: Models, Models, Models!

Roger Wattenhofer, FAWN Let´s Talk about Models! Why models for sensor networks? – Allows precise evaluation and comparison of algorithms – Analysis of correctness and efficiency (proofs) Goal of model designer? – Simplifications and abstractions, … but not too simple. There are models for connectivity, interference, algorithm type, node distribution, energy consumption, etc. –Survey by Stefan Schmid, Roger Wattenhofer, WPDRTS 2006 –This talk: A few examples for connectivity models

Roger Wattenhofer, FAWN The model determines the distributed complexity of a problem Example: Comparison of Two Algorithms for Dominating Set Algorithm 1 Algorithm computes DS k 2 +O(1) transmissions/node O(  O(1)/k log  ) approximation Quite complex! Performance OK Algorithm 2 Algorithm computes DS 1 transmission/node O(1) approximation Easy! Performance great! General Graph! No Position Information! Unit Disk Graph Only! Requires GPS Device!

Roger Wattenhofer, FAWN Connectivity Models too pessimistic too optimistic General Graph UDG Quasi UDG d 1 Bounded Independence Unit Ball Graph

Roger Wattenhofer, FAWN Connectivity: Bounded Independence Graph (BIG) How realistic is QUDG? –u and v can be close but not adjacent –model requires very small d in obstructed environments (walls) However: in practice, neighbors are often also neighboring Solution: BIG Model –Bounded independence graph –Size of any independent set grows polynomially with hop distance r –e.g. O(r 2 ) or O(r 3 )

Roger Wattenhofer, FAWN Connectivity: Unit Ball Graph (UBG) 9 metric (V,d) describing distances between nodes u,v 2 V such that: d(u,v) · 1 : (u,v) 2 E such that: d(u,v) > 1 : (u,v) 2 E Assume that doubling dimension of metric is constant –Doubling dimension: log(#balls of radius r/2 to cover ball of radius r) UBG based on underlying doubling metric.

Roger Wattenhofer, FAWN Models can be put in relation Try to proof correctness in an as “high” as possible model For efficiency, a more optimistic (“lower”) model might be fine

Roger Wattenhofer, FAWN The model determines the complexity tx / node quality O(1) log √n 12O(log*)O(log) General Graph 2 UDG 67 UDG 4 UDG 5 UDG/GPS 1 GBG 8 UDG = Unit Disk Graph UBG = Unit Ball Graph GBG = Growth Bounded G. /GPS = With Position Info /D = With Distance Info Lower Bound for General Graphs 9 better UBG/D 3 loglog ?

Roger Wattenhofer, FAWN References 1.Folk theorem, e.g. Kuhn, Wattenhofer, Zhang, Zollinger, PODC Kuhn, Wattenhofer, PODC 2003 Improved: Kuhn, Moscibroda, Wattenhofer, SODA 2006 CDS by Dubhashi et al, SODA Kuhn, Moscibroda, Wattenhofer, PODC Alzoubi, Wan, Frieder, MobiHoc Wu and Li, DIALM Gao, Guibas, Hershberger, Zhang, Zhu, SCG Wattenhofer, MedHocNet 2005 talk, Improving on Wu and Li 8.Kuhn, Moscibroda, Nieberg, Wattenhofer, DISC Kuhn, Moscibroda, Wattenhofer, PODC 2004

Roger Wattenhofer, FAWN My Own Private View on Networking Research ClassAnalysisCommuni cation model Node distribution Other drawbacks Popu larity Imple- mentation TestbedRealityReality(?)“Too specific”5% HeuristicSimulationUDG to SINR Random, and more Many…! (no benchmarks) 80% Scaling law Theorem/ proof SINR, and more RandomExistential (no protocols) 10% AlgorithmTheorem/ proof UDG, and more Any (worst- case) Worst-case unusual 5%

Roger Wattenhofer, FAWN Conclusions MAC Layer is important –Not much (theoretical) work done –There are issues chicken-egg power control models It seems that the algorithms/foundations community is striving for new, more realistic models –I showed parts of the connectivity hierarchy –But there is much more, everything in flux Thanks to Thomas Moscibroda, Fabian Kuhn, Stefan Schmid, and more of my students for their work.

Roger Wattenhofer, FAWN 2006 Roger Wattenhofer Thank You! Questions? Remarks?