Roger WISARD 2008 –1 The Complexity of Connectivity in Wireless Networks TexPoint fonts used in EMF. Read the TexPoint manual before you.

Slides:



Advertisements
Similar presentations
Impact of Interference on Multi-hop Wireless Network Performance
Advertisements

Ad Hoc and Sensor Networks – Roger Wattenhofer –11/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Capacity Chapter 11 TexPoint fonts used in EMF. Read.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
The Capacity of Wireless Networks
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Exponential.
NCKU CSIE CIAL1 How Optimal are Wireless Scheduling Protocols? Authors: Thomas Moscibroda, Yvonne Anne Oswald and Roger Wattenhofer Publisher: IEEE INFOCOM.
Roger Wattenhofer Distributed Algorithms Sensor Networks Reloaded or Revolutions?
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
$ Spectrum Aware Load Balancing for WLANs Victor Bahl Ranveer Chandra Thomas Moscibroda Yunnan Wu.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Roger Wattenhofer TexPoint fonts used.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Uniform Power Connectivity University of the Negev
ETH Zurich – Distributed Computing Group Jasmin Smula 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Let’s get Physical! ETH Zurich – Distributed Computing – ICALP 2010 – Roger Wattenhofer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
Roger ALGOSENSORS 2008 –1 …What Is It Good For?! TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley MIT LIDS May 7, 2007 Joint work.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Roger RAWNET 2008 –1 The Worst-Case Capacity of Wireless Networks TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley AISP Workshop May 2, 2007 Joint.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Efficient Gathering of Correlated Data in Sensor Networks
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
TRANSMISSION POWER CONTROL FOR AD HOC WIRELESS NETWORKS: THROUGHPUT, ENERGY AND FAIRNESS Lujun Jia; Xin Liu; Noubir, G.; Rajaraman, R.; Wireless Communications.
MAGNÚS MÁR HALLDÓRSSON, PROFESSOR SCHOOL OF COMPUTER SCIENCE | RU LECTURE MARATHON Capacity of Wireless Networks.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Ad Hoc and Sensor Networks – Roger Wattenhofer –11/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Capacity Chapter 11 TexPoint fonts used in EMF. Read.
1 The Power of Non-Uniform Wireless Power ETH Zurich – Distributed Computing Group Magnus M. Halldorsson Reykjavik University Stephan Holzer ETH Zürich.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas A. Capone, I. Filippini, F. Martignon IEEE international.
Impact of Interference on Multi-hop Wireless Network Performance
Does Topology Control Reduce Interference?
Monitoring Churn in Wireless Networks
Computing and Compressive Sensing in Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Capacity TexPoint fonts used in EMF.
TexPoint fonts used in EMF.
The Capacity of Wireless Networks
Presentation transcript:

Roger WISARD 2008 –1 The Complexity of Connectivity in Wireless Networks TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A

Roger WISARD 2008 –2 The paper Joint work with Thomas Moscibroda –Former PhD student of mine –Now researcher at Microsoft Research, Redmond –Infocom 2006 presentation by Thomas –Some slides by Thomas. Thanks! Paper is about wireless networking in general –This talk: new introduction/motivation for sensor networks

3 Power Processor Radio Sensors Memory And we’re usually carefully deployed Today, we look much cuter!

Roger WISARD 2008 –4 Data gathering & aggregation –Classic application of sensor networks –Sensor nodes periodically sense environment –Relevant information needs to be transmitted to sink Functional Capacity of Sensor Networks –Sink peridically wants to compute a function f n of sensor data –At what rate can this function be computed? Data Gathering in Wireless Sensor Networks sink,f n (2) fnfn (1),f n (3)

Data Gathering in Wireless Sensor Networks sink x 3 =4 x 2 =6 x 1 =7 x 4 =3 x 5 =1 x 6 =4 x 8 =5 x 9 =2 x 7 =9 Example: simple round-robin scheme  Each sensor reports its results directly to the root one after another Simple Round-Robin Scheme:  Sink can compute one function per n rounds  Achieves a rate of 1/n fnfn (1) fnfn (2) fnfn (3) fnfn (4) t

Data Gathering in Wireless Sensor Networks There are better schemes using Multi-hop relaying In-network processing Spatial Reuse Pipelining fnfn (1) fnfn (2) fnfn (3) fnfn (4) t sink

Roger WISARD 2008 –7 Capacity in Wireless Sensor Networks At what rate can sensors transmit data to the sink? Scaling-laws  how does rate decrease as n increases…?  (1/√n)  (1/log n)  (1)  (1/n) Answer depends on: Function to be computed Coding techniques Network topology Wireless communication model Only perfectly compressible functions (max, min, avg,…) No fancy coding techniques

“Classic” Capacity… The Capacity of Wireless Networks Gupta, Kumar, 2000 [Toumpis, TWC’03] [Li et al, MOBICOM’01] [Gastpar et al, INFOCOM’02] [Gamal et al, INFOCOM’04] [Liu et al, INFOCOM’03] [Bansal et al, INFOCOM’03] [Yi et al, MOBIHOC’03] [Mitra et al, IPSN’04] [Arpacioglu et al, IPSN’04] [Giridhar et al, JSAC’05] [Barrenechea et al, IPSN’04] [Grossglauser et al, INFOCOM’01] [Kyasanur et al, MOBICOM’05] [Kodialam et al, MOBICOM’05] [Perevalov et al, INFOCOM’03] [Dousse et al, INFOCOM’04] [Zhang et al, INFOCOM’05] etc…

Roger WISARD 2008 –9 Capacity studies so far make very strong assumptions on node deployment, topologies –randomly, uniformly distributed nodes –nodes placed on a grid –etc... Worst-Case Capacity What if a network looks differently…?

Roger WISARD 2008 –10 Like this?

Roger WISARD 2008 –11 Or rather like this?

Worst-Case Capacity Capacity studies so far have made very strong assumptions on node deployment, topologies –randomly, uniformly distributed nodes –nodes placed on a grid –etc... What if a network looks differently…? We assume arbitrary node distribution Classic Capacity worst-case topologies Worst-Case Capacity How much information can be transmitted in nice, well-behaving networks How much information can be Transmitted in any network

Roger WISARD 2008 –13 Two standard models in wireless networking Models Protocol Model (graph-based, simpler) Physical Model (SINR-based, more realistic)

(1+  )r x (1+  )r y Protocol Model Based on graph-based notion of interference Transmission range and interference range ryry y rxrx x R(x) R(y) R(x) is in interference range of y R(x) and R(y) cannot simultaneously receive! Algorithmic work on worst-case topologies usually in protocol models (unit disk graph,…)

Roger WISARD 2008 –15 Physical Model Based on signal-to-noise-plus-interference (SINR) Simplest case:  packets can be decoded if SINR is larger than  at receiver Minimum signal-to- interference ratio Power level of sender u Path-loss exponent Noise Distance between two nodes Received signal power from sender Received signal power from all other nodes (=interference)

Roger WISARD 2008 –16 Two standard models of wireless communication Algorithms typically designed and analyzed in protocol model Justification: Capacity results are typically (almost) the same in both models (e.g., Gupta, Kumar, etc...) Models Protocol Model (graph-based, simpler) Physical Model (SINR-based, more realistic) Premise: Results obtained in protocol model do not divert too much from more realistic model!

Roger WISARD 2008 –17 Example: Protocol vs. Physical Model 1m A sends to D, B sends to C Assume a single frequency (and no fancy decoding techniques!) Let  =3,  =3, and N=10nW Transmission powers: P B = -15 dBm and P A = 1 dBm SINR of A at D: SINR of B at C: 4m 2m A B C D Is spatial reuse possible? NOProtocol Model YESPhysical Model In Reality!

This works in practice! We did measurements using standard mica2 nodes! Replaced standard MAC protocol by a (tailor-made) „SINR-MAC“ Measured for instance the following deployment... Time for successfully transmitting 20‘000 packets: Speed-up is almost a factor 3 u1u1 u2u2 u3u3 u4u4 u5u5 u6u6 [Moscibroda, Wattenhofer, Weber, Hotnets’06]

Upper Bound Protocol Model There are networks, in which at most one node can transmit!  like round-robin Consider exponential node chain Assume nodes can choose arbitrary transmission power Whenever a node transmits to another node  All nodes to its left are in its interference range!  Network behaves like a single-hop network sink d(sink,x i ) = (1+1/  ) i-1 xixi In the protocol model, the achievable rate is  (1/n).

Roger WISARD 2008 –20 Much better bounds in SINR-based physical model are possible (exponential gap) Paper presents a scheduling algorithm that achieves a rate of  (1/log 3 n) Algorithm is centralized, highly complex  not practical But it shows that high rates are possible even in worst-case networks Basic idea: Enable spatial reuse by exploiting SINR effects. Lower Bound Physical Model In the physical model, the achievable rate is  (1/polylog n).

Roger WISARD 2008 –21 High-level idea is simple Construct a hierarchical tree T(X) that has desirable properties 1) Initially, each node is active 2) Each node connects to closest active node 3) Break cycles  yields forest 4) Only root of each tree remains active Scheduling Algorithm – High Level Procedure loop until no active nodes The resulting structure has some nice properties  If each link of T(X) can be scheduled at least once in L(X) time-slots  Then, a rate of 1/L(X) can be achieved Can be adjusted if transmission power limited Phase Scheduler: How to schedule T(X)?

Scheduling Algorithm – Phase Scheduler How to schedule T(X) efficiently We need to schedule links of different magnitude simultaneously! Only possibility: senders of small links must overpower their receiver! If senders of small links overpower their receiver… … their “safety radius” increases (spatial reuse smaller) If we want to schedule both links… … R(x) must be overpowered  Must transmit at power more than ~d  R(x) x d Subtle balance is needed! 1) 2)

Roger WISARD 2008 –23 Scheduling Algorithm – Phase Scheduler 1)Partition links into sets of similar length 2)Group sets such that links a and b in two sets in the same group have at least d a ¸ (  )  (  a-  b) ¢ d b  Each link gets a  ij value  Small links have large  ij and vice versa  Schedule links in these sets in one outer-loop iteration  Intuition: Schedule links of similar length or very different length 3)Schedule links in a group  Consider in order of decreasing length (I will not show details because of time constraints.) Factor 2 between two sets smalllarge  =1  =2  =3 Together with structure of T(x)   (1/log 3 n) bound

Worst-Case Capacity in Wireless Networks 24 Protocol Model Physical Model Max. rate in arbitrary, worst-case deployment  (1/n) The Price of Worst-Case Node Placement -Exponential in protocol model -Polylogarithmic in physical model (almost no worst-case penalty!)  (1/log 3 n) Exponential gap between protocol and physical model! Max. rate in random, uniform deployment  (1/log n)  (1/log n) Worst-Case Capacity Networks Model Traditional Capacity [Giridhar, Kumar, 2005]

Conclusions Introduce worst-case capacity of sensor networks  How much data can periodically be sent to data sink Complements existing capacity studies Many novel insights 1) Possibilities and limitations of wireless communication 2) Fundamentals of wireless communication models 3) How to devise efficient scheduling algorithms, protocols 1) Possibilities and limitations of wireless communication 2) Fundamentals of wireless communication models 3) How to devise efficient scheduling algorithms, protocols Sensor Networks Scale! Efficient data gathering is possible in every (even worst-case) network! Protocol Model Poor! Exponential gap between protocol and physical model! Efficient Protocols! Must use SINR-effects and power control to achieve high rate!

Roger WISARD 2008 –26 Overview of results so far Moscibroda, Wattenhofer, Infocom 2006 –First paper in this area, O(log 3 n) bound for connectivity, and more –This is essentially the paper I presented on the previous slides Moscibroda, Wattenhofer, Zollinger, MobiHoc 2006 –First results beyond connectivity, namely in the topology control domain Moscibroda, Wattenhofer, Weber, HotNets 2006 –Practical experiments, ideas for capacity-improving protocol Moscibroda, Oswald, Wattenhofer, Infocom 2007 –Generalizion of Infocom 2006, proof that known algorithms perform poorly Goussevskaia, Oswald, Wattenhofer, MobiHoc 2007 –Hardness results & constant approximation for constant power Chafekar, Kumar, Marathe, Parthasarathy, Srinivasan, MobiHoc 2007 –Cross layer analysis for scheduling and routing Moscibroda, IPSN 2007 –Connection to data gathering, improved O(log 2 n) result Locher, von Rickenbach, Wattenhofer, ICDCN 2008 –Still some major open problems

Roger WISARD 2008 –27 Main open question in this area Most papers so far deal with special cases, essentially scheduling a number of links with special properties. The general problem is still wide open: A communication request consists of a source and a destination, which are arbitrary points in the Euclidean plane. Given n communication requests, assign a color (time slot) to each request. For all requests sharing the same color specify power levels such that each request can be handled correctly, i.e., the SINR condition is met at all destinations. The goal is to minimize the number of colors. E.g., for arbitrary power levels not even hardness is known…

Thank You! Questions & Comments? TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A