Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006.

Slides:



Advertisements
Similar presentations
Fundamental Relationship between Node Density and Delay in Wireless Ad Hoc Networks with Unreliable Links Shizhen Zhao, Luoyi Fu, Xinbing Wang Department.
Advertisements

Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
The Capacity of Wireless Networks
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Secure connectivity of wireless sensor networks Ayalvadi Ganesh University of Bristol Joint work with Santhana Krishnan and D. Manjunath.
A Unified View to Greedy Routing Algorithms in Ad-Hoc Networks
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Random Geometric Graph Diameter in the Unit Disk Robert B. Ellis, Texas A&M University coauthors Jeremy L. Martin, University of Minnesota Catherine Yan,
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
A Unified Energy Efficient Topology for Unicast and Broadcast Xiang-Yang Li*, Wen-Zhang Song † and WeiZhao Wang* *Illinois Institute of Technology † Washington.
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information 梁紀翔 王謙志 NETLab.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
E. AlthausMax-Plank-Institut fur Informatik G. CalinescuIllinois Institute of Technology I.I. MandoiuUC San Diego S. Prasad Georgia State University N.
Robust Communications for Sensor Networks in Hostile Environments Ossama Younis and Sonia Fahmy Department of Computer Sciences, Purdue University Paolo.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
1 University of Denver Department of Mathematics Department of Computer Science.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Modeling Data-Centric Routing in Wireless Sensor Networks Bhaskar Krishnamachari, Deborah Estrin, Stephan Wicker.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
An Algorithmic Approach to Geographic Routing in Ad Hoc and Sensor Networks - IEEE/ACM Trans. on Networking, Vol 16, Number 1, February 2008 D
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Coverage and Connectivity Issues in Sensor Networks
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Wireless Networks Spring 2005 Capacity of Ad Hoc Networks.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Routing and Scheduling for mobile ad hoc networks using an EINR approach Harshit Arora Advisor : Dr. Harlan Russell Mobile ad Hoc Networks A self-configuring.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Barrier Coverage With Wireless Sensors
Void Traversal for Guaranteed Delivery in Geometric Routing
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
E. AlthausMax-Plank-Institut fur Informatik G. CalinescuIllinois Institute of Technology I.I. MandoiuUC San Diego S. Prasad Georgia State University N.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
Topology Control –power control
On the Critical Total Power for k-Connectivity in Wireless Networks
Hidden Terminal Decoding and Mesh Network Capacity
Coverage and Connectivity in Sensor Networks
Random Geometric Graph Diameter in the Unit Disk
Introduction Wireless Ad-Hoc Network
Capacity of Ad Hoc Networks
Presentation transcript:

Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006

2 Wireless Ad Hoc Networks

3 Greedy Forward Routing What is greedy forward routing? –Packets are discarded if there is no neighbor which is nearer to the destination node than the current node; otherwise, packets are forwarded to the neighbor which is nearest to the destination node. –Each node needs to know the locations of itself, its 1-hop neighbors and destination node. Pros: easy implement Cons: deliverability

4 Examples u w4w4 v w1w1 w2w2 w3w3 w5w5 w6w6 w 6 is a local minimum w.r.t. v

5 Each node has an omni-directional antenna, and all nodes have the same transmission radii. CTR for GFR: Critical Transmission Radius for Greedy Forward Routing vu w

6 Random Deployment Deterministic deployment at some regular pattern is prohibited due to –Large network size –Harsh environment –Mobility Random deployment –Nodes are independently and uniformly distributed in the deployment region

7 r-Disk Graphs D : deployment region of unit-area V n : a random point process with rate n over D r: transmission radius (a function of n) G r ( V n ): r-disk graph over V n

8 Relative Works: Critical Transmission Radius for Connectivity D is a unit-area square or disk. V n is a uniform point process or Poisson point process.

9 Relative Works: the Longest Edge of the Gabriel Graph D is a unit-area disk. V n is a Poisson point process. Let A Gabriel edge is called long if its length is larger than r n. The number of long Gabriel edges is asymptotically Poisson with mean 2e -ξ. The probability of the event that the length of the longest edge is less than r n is asymptotically equal to exp(-2e -ξ ).

10 Main Results D is a convex unit-area region. V n is a Poisson point process with rate n over D, denoted by P n. Let Suppose n  r n 2 = (  +o(1))lnn for some . –If  >  0, then  ( P n ) ≤ r n is a.a.s.. –If  <  0, then  ( P n )  r n is a.a.s.. Let L uv denote the lune area B(u,||u-v||)  B(v,||u-v||). –If ||u-v|| = (1/  ) 1/2, |L uv | = 1/  0. –|L uv | = (  ||u-v|| 2 )/  0.

11 A Sufficient Condition v uw If some node exists on L uv, packets can be forwarded from u toward v. Assume u needs to forward packets to v. Let w denote the intersection point of the ray uv and circle  B(u,r).

12 Minimum Scan Statistic Minimum scan statistic –D : the deployment region –C : the scanning set –V  D : a point set –The minimum scan statistic for V (with scanning set C) is the smallest number of points of V covered by a copy of C. Assume C n =B(o,r n ) and n  r n 2 =  lnn. Let S m ( V n,C n ) = min x  D | V n ∩(C n +x)|.  =1 is a threshold. –If  >1, S m ( V n,C n )>0 is a.a.s.. –If  <1, S m ( V n,C n )=0 is a.a.s..

13 Upper Bounds of the CTR For any  >  0 and ||u-w|| = r n, we have Since  /  0 > 1, according to minimum scan statistics, there almost surely exist nodes on L uw. Therefore, u can forward packets toward v.

14 A Necessary Condition uv Assume ||u-v||>r. If u can forward packets to v, there must exit nodes in L uv. If we can find a pair of nodes u and v such that there doesn’t exist node in L uv, it implies ρ( P n )  r n.

15 Lower Bounds of the CTR u v For any  <  0, we can find a pair of nodes u and v whose distance is larger than r n such that there is no other node on the lune L uv.

16 Conclusion Threshold of critical transmission radius for greedy forward routing Future works –Critical transmission radius for other geographic routing heuristics –Relation between the length of the longest edge of the relative neighbor graph and the critical transmission radius for the greedy forward routing