1 The Geodesic Broadcast Scheme for Wireless Ad Hoc Networks Dimitrios Katsaros, Ph.D. Yannis Manolopoulos, Dept. Informatics Aristotle University,

Slides:



Advertisements
Similar presentations
Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Advertisements

Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
May 21, 2003Wu and Dai, ICDCS A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu and Fei Dai Dept. of Comp. Sci. & Eng. Florida.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
TDMA Scheduling in Wireless Sensor Networks
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Nikos Dimokas1 Dimitrios Katsaros1,2 Yannis Manolopoulos1
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Topic: Routing and Aggregation An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks (Li,Peng,Chu-
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Cooperative Caching in Wireless Multimedia Sensor Nets Nikos Dimokas 1 Dimitrios Katsaros 1,2 (presentation) Yannis Manolopoulos 1 3 rd MobiMedia Conference,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 A Distributed and Efficient Flooding Scheme Using 1- Hop Information in Mobile Ad Hoc Networks Department of Computer Science and Information Engineering.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Efficient Flooding in Ad hoc Networks using On-demand (Passive) Cluster Formation ICNS Lab Na Gajin.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
WiOpt’03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks March 3-5, 2003, INRIA Sophia-Antipolis, France Session : Energy Efficiency.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
WiOpt’04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks March 24-26, 2004, University of Cambridge, UK Session 2 : Energy Management.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Wireless internet routing Philippe Jacquet. Internet and networking Internet –User plurality connected to –Sources plurality.
Presented by : Joseph Gunawan.  To get the optimal transmission radius for broadcasting using the energy as minimal as possible while it still guarantees.
POSTER TEMPLATE BY: Efficient Counter-Based Flooding for Mobile Ad Hoc Networks S. Al-Humoud, M. Ould Khaoua and L. M. Mackenzie.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Carlos Rodrigo Aponte OLSRv2 High Level Overview.
A Cluster-Based Backbone infrastructure for broadcasting in MANETs Student: Pei-Yue Kuo
Ogier - 1 MANET Extension of OSPF Using CDS Flooding draft-ogier-manet-ospf-extension-03.txt Richard Ogier March 2, 2005 IETF Meeting - OSPF WG.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Design and Analysis of an MST-Based Topology Control Algorithm Ning Li, Jennifer C. Hou, and Lui Sha Department of Computer Science University of Illinois.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Scalable Routing Protocols for
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
BROADCASTING TECHNIQUES IN AD-HOC NETWORKS A survey on Shubham Bhat Surendra Shenoy References: 1.“
On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks By J. Wu and H. Li Instructor: Dr. Yinghsu Li Presented by: Chinh.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
1 New metrics for characterizing the significance of nodes in wireless networks via path-based neighborhood analysis Leandros A. Maglaras 1 Dimitrios Katsaros.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Topology Control and Its Effects in Wireless Networks
Introduction Wireless Ad-Hoc Network
Nikos Dimokas1 Dimitrios Katsaros (presentation) Leandros Tassiulas2
On Constructing k-Connected k-Dominating Set in Wireless Networks
Presentation transcript:

1 The Geodesic Broadcast Scheme for Wireless Ad Hoc Networks Dimitrios Katsaros, Ph.D. Yannis Manolopoulos, Dept. Informatics Aristotle University, Thessaloniki, Greece IEEE Mobile Distributed Computing Workshop: 26/06/2006 Presentation by: Panickos Dept. of Computer Science University of Pittsburgh, USA

2 Mobile Ad Hoc Networks No wired infrastructure Self-organized All nodes act as routers Broadcasted signal Powered by battery (majority) Mobile (maybe) Potential Multi-hop routes

3 Wireless communication model r u Every node that falls inside the communication range r of a node u, is considered reachable (one-to-all broadcast). In practice, it is more complicated than this! We adopt this model due to its simplicity.

4 Broadcasting – Applications Alarm signal Route discovery in non-GPS routing Paging Destination search in GPS routing: Source S broadcasts short message that will search for destination D Destination D will route back to S with a short message location report S will route full message to D Location updates for routing, geocasting, …

5 Relevant work - Broadcasting A straightforward method for implementing broadcasting is by use of flooding (reliable, but broadcast-storm problem ) probability-based methods (non-reliable) area-based methods (reliable) neighbour-knowledge-based methods Are based on the concept of identifying a small forward node set, which has the property that the nodes of this set form a connected dominating set (CDS) for the ad hoc network graph

6 Relevant work – Topology control Relative Neighborhood Graph (RNG): An edge uv is included in RNG iff it is not the longest edge in any triangle uvw. Grabriel Graph (GG): An edge uv is included in GG iff the disk with diameter uv contains no other node inside it. Minimum Spanning Tree (MST) and Localized Minimum Spanning Tree (LMST): Calculated with Dijkstra’s algorithm and Li, Hou & Sha, respectively. uv uv included uv uv not included w w u v uv included uv not included v u w sample graph MST LMST Delaunay Triangulation (DT), Partial Delaunay Triangulation (PDT), Yao graph (YG), etc: A lot of other (variants of) geometric structures  Topology Control: Choosing a set of links from the possible ones. Not exactly our problem. So graph-theoretic concepts, than geometric ones.

7 Minimal Dominating Set A vertex set is DS (Dominating Set) Any other vertex connected to one DS vertex It is CDS, if it is connected It is MCDS if its size is minimum among CDS Discovery of the MCDS of a graph is in NP-complete DSCDS A lot of methods perform broadcasting with the aid of CDS …

8 Motivation for new broadcasting protocol The protocol should: be localized, and thus distributed incur moderate number of message exchange among the nodes be computationally efficient, and thus able to cope with frequent changes in the network topology due to high/moderate mobility not make use of “variants”, e.g., node IDs, because a (locally) best decision might not be reached (even if it does exist) fully exploit the locally available information in making the best decisions

9 Well-known CDS algorithm Each node exchanges its neighborhood information with all of its one-hop neighbors Any node with two unconnected neighbors becomes a dominator (red) The set of all the red nodes form a CDS Wu and Li ’ s algorithm

10 Well-known CDS algorithm A node v can be taken out from the CDS if there exists a node u such that N[v] is a subset of N[u] and the ID of v is smaller than the ID of u A node u can be taken out from the CDS if u has two neighbors v and w such that N(u) is covered by N(v) ∪ N(w) and its ID is the smallest of the other two nodes ’ IDs Open neighbor set N(v) = {u | u is a neighbor of v} Closed neighbor set N[v] = N(v) ∪ {v} Wu and Li ’ s algorithm (Pruning Rules 1 & 2) vuvuuv w

11 Weaknesses of current approaches Some approaches can not detect all possible eliminations because ordering based on node ID prevents this. As a consequence they incur significantly excessive retransmissions Others rely on a lot of “local” information, for instance knowledge of k-hop neighborhood (k > 2), e.g., [WD04,WL04] Other methods are computationally expensive, incurring a cost of O(f 2 ) or O(f 3 ), where f is the maximum degree of a node of the ad hoc network, e.g., the methods reported in [WL01, WD03, DW04] and [SSZ02] some methods (e.g., [QVLl00,SSZ02]) do not fully exploit the compiled information ; for instance, the use of the degree of a node as its priority when deciding its possible inclusion in the dominating set might not result in the best local decision

12 Terminology A MANET is abstracted as a graph G(V,E) An edge e=(u,v), exists if and only if u is in the transmission range of v and vice versa. All links in the graph are bidirectional The network is assumed to be in a connected state The set of neighbors of a node v is represented by N 1 (v), i.e., N 1 (v)={u: (v,u)  E} The set of two-hop nodes of node v, i.e., the nodes which are the neighbors of node v's neighbors except for the nodes that are the neighbors of node v, is represented by N 2 (v) The combined set of one-hop and two-hop neighbors of v is denoted as N 12 (v).

13 A new measure of node importance Let σ uw = σ wu denote the number of shortest paths from u  V to w  V (by definition, σ uu =0). Let σ uw (v) denote the number of shortest paths from u to w that some vertex v  V lies on. We define the node importance index NI(v) of a vertex v as: Large values for the NI index of a node v indicate that this node v can reach others on relatively short paths, or that the node v lies on considerable fractions of shortest paths connecting others. In the former case, it captures the fact of a possibly large degree of node v, and in the latter case, it captures the fact that v might have one (some) “isolated” neighbors

14 The NI index in sample graphs In parenthesis, the NI index of the respective node; i.e., 7(156): node with ID 7 has NI equal to 156. Nodes with large NI:  Articulation nodes (in bridges), e.g., 3, 4, 7, 16, 18  With large fanout, e.g., 14, 8, U Therefore: geodesic nodes

15 The NI index in a localized algorithm For any node v, the NI indexes of the nodes in N 12 (v) calculated only for the subgraph of the 2-hop (in general, k-hop) neighborhood reveal the relative importance of the nodes in covering N 12 For a node u (of the 2-hop neighbourhood of a node v), the NI index of u will be denoted as NI v (u)

16 How to compute the NI index? At a first glance, NI computation seems expensive, i.e., O(m*n 2 ) operations in total for a 2-hop neighbourhood, which consists of n nodes and m links: calculating the shortest path between a particular pair of vertices (assume for the moment that there exists only one) can be done using breadth-first search in O(m) time, and there exist O(n 2 ) vertex pairs Fortunately, we can do better than this by making some smart observations. The improved algorithm ( CalculateNodeImportanceIndex ) is quite complicated and beyond the scope of this presentation THEOREM. The complexity of the algorithm CalculateNodeImportanceIndex is O(n*m) for a graph with n vertices and m edges

17 Pseudocode for CalculateNodeImportanceIndex

18 Pseudocode for CalculateNodeImportanceIndex

19 Exploitation of NI in broadcasting Design of a traditional source-dependent neighbor-designating method for broadcasting Each node selects (designates) its neighbors, which will rebroadcast the message The NIBB or Geodesic broadcasting algorithm THEOREM. The NIBB algorithm is reliable, in the sense that the broadcasting packet can be disseminated to every node in the network (if it is connected)

20 Evaluation setting Evaluation against: WL, the basic scheme of [WL01] without the two rules (Rule 1 and Rule 2) WL 1+2, improved scheme incorporating these rules indicated MPR, the MultiPoint Relaying method denoted as [QVL00] SSZ, reported in [SSZ02], which was selected as a Fast Breaking Paper for October 2003 Evaluation w.r.t.: Number of nodes of the MANET Average node degree (i.e., density of the MANET) Number of clusters (implementation of a suitable network topology generator) Strength of the clusters, called graph assortativity, (i.e., are there many bridges and nodes with large fanout)

21 Performance: vs. #nodes

22 Performance: vs. avg node degree

23 Performance: vs. #clusters

24 Performance: vs. cluster “strength”

25 Conclusions on NIBB The proposed protocol is based on a novel localized metric for measuring the value of a node in “covering” the neighbourhood with its rebroadcast The calculation of this metric is very efficient, linear in the number of nodes and linear in the number of links The protocol is able to reap significant performance gains, reducing the number of rebroadcasting nodes

26 Conclusions on NIBB This metric itself is of independent importance, since it can be used: in performing wireless (ad hoc or sensor) network clustering for detection of critical nodes and links for connectivity in MANETs We described the protocol as a neighbour designating method, although a self-pruning version of it is also possible with the exploitation of a backoff procedure

27 References 1.J. Wu, and H. Li, H. A dominating-set-based routing scheme in ad hoc wireless networks, Telecommunication Systems, 18(1– 3), 13–36, I. Stojmenovic, M. Seddigh and J.D. Zunic. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks, IEEE Transactions on Parallel and Distributed Systems, 13(1), 14–25, A. Qayyum, L. Viennot and A. Laouiti. Multipoint Relaying: An efficient technique for flooding in mobile wireless networks, Technical Report, Institut National de Recherche en Informatique et Automatique (INRIA), No. 3898, March, J. Wu and F. Dai. Broadcasting in ad hoc networks based on self-pruning, International Journal of Foundations of Computer Science, 14(2), 201–221, J. Wu and F. Dai. A generic distributed broadcast scheme in ad hoc wireless networks, IEEE Transactions on Computers, 53(10), 1343–1354, 2004.

28 References 6.F. Dai and J. Wu. An extended localized algorithm for connected dominating set formation in ad hoc wireless networks, IEEE Transactions on Parallel and Distributed Systems, 15(10), 908–920, F. Dai and J. Wu. Performance analysis of broadcast protocols in ad hoc networks based on self-pruning, IEEE Transactions on Parallel and Distributed Systems, 15(11), 1027– 1040, J. Wu and W. Lou. Extended multipoint relays to determine connected dominating sets in MANETs, IEEE Transactions on Computers, 55(3), 334–347, W. Lou and J. Wu. On reducing broadcast redundancy in ad hoc wireless networks, IEEE Transactions on Mobile Computing, 1(2), 111–122, N. Li, J. C. Hou, L. Sha. Design and Analysis of an MST-Based Topology Control Algorithm, IEEE INFOCOM, 2003