1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture 24.01.2007 Christian Schindelhauer.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 23rd Lecture Christian Schindelhauer.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 25th Lecture Christian Schindelhauer.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 18th Lecture Christian Schindelhauer.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 2nd Lecture Christian Schindelhauer.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 16th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 17th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 20th Lecture Christian Schindelhauer.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
V. V. Vazirani. Approximation Algorithms Chapters 3 & 22
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Dijkstra’s Algorithm. Announcements Assignment #2 Due Tonight Exams Graded Assignment #3 Posted.
Approximation Algorithms
Efficient Backbone Construction Methods in MANETs Using Directional Antennas 1 Shuhui Yang, 1 Jie Wu, 2 Fei Dai 1 Department of Computer Science and Engineering.
Connected Dominating Sets. Motivation for Constructing CDS.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
1 Use graphs and not pure logic Variables represented by nodes and dependencies by edges. Common in our language: “threads of thoughts”, “lines of reasoning”,
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Self-stabilizing energy-efficient multicast for MANETs.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Networks.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
Greedy Algorithms.
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
CS 3343: Analysis of Algorithms
Clustering TexPoint fonts used in EMF.
Research: algorithmic solutions for networking
Connected Dominating Sets
Introduction Wireless Ad-Hoc Network
Presentation transcript:

1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Options for topology control Topology control Control node activity – deliberately turn on/off nodes Control link activity – deliberately use/not use certain links Topology control Flat network – all nodes have essentially same role Hierarchical network – assign different roles to nodes; exploit that to control node/link activity Power controlBackbonesClustering

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Power control – magic numbers?  Question: What is a good power level for a node to ensure “nice” properties of the resulting graph?  Idea: Controlling transmission power corresponds to controlling the number of neighbors for a given node  Is there an “optimal” number of neighbors a node should have? –Is there a “magic number” that is good irrespective of the actual graph/network under consideration?  Historically, k=6 or k=8 had been suggested as such “magic numbers” –However, they optimize progress per hop – they do not guarantee connectivity of the graph!! ! Needs deeper analysis

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Controlling transmission range  Assume all nodes have identical transmission range r=r(|V|), network covers area A, V nodes, uniformly distr.  Fact: Probability of connectivity goes to zero if:  Fact: Probability of connectivity goes to 1 for if and only if  |V| ! 1 with |V|  Fact (uniform node distribution, density  ):

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Options for topology control Topology control Control node activity – deliberately turn on/off nodes Control link activity – deliberately use/not use certain links Topology control Flat network – all nodes have essentially same role Hierarchical network – assign different roles to nodes; exploit that to control node/link activity Power controlBackbonesClustering

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Hierarchical networks – backbones  Idea: Select some nodes from the network/graph to form a backbone –A connected, minimal, dominating set (MDS or MCDS) –Dominating nodes control their neighbors –Protocols like routing are confronted with a simple topology – from a simple node, route to the backbone, routing in backbone is simple (few nodes)  Dominating Set: –Given an undirected graph G=(V,E) –Find a minimal subset W  V such that for all u  W there exists v  V with {u,v}  V  Problem: MDS is an NP-hard problem –Hard to approximate, and even approximations need quite a few messages –Polynomial approximable within c log n for some c > 0 only if P=NP –Polynomial approximable within a factor of 1 + log n.

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Backbone by growing a tree  Construct the backbone as a tree, grown iteratively

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Backbone by growing a tree – Example 1:2: 3:4:

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Problem: Which gray node to pick?  When blindly picking any gray node to turn black –resulting tree can be very bad Solution: Look ahead! Here, one step suffices

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Performance of tree growing with look ahead  Dominating set obtained by growing a tree with the look ahead heuristic is at most a factor 2(1+ H(  )) larger than MDS –H(¢) harmonic function, H(k) =  i=1 k 1/i  ln k + 1 –  is maximum degree of the graph  It is automatically connected  Can be implemented in a distributed fashion as well

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Start big, make lean  Idea: start with some, possibly large, connected dominating set, reduce it by removing unnecessary nodes  Initial construction for dominating set –All nodes are initially white –Mark any node black that has two neighbors that are not neighbors of each other (they might need to be dominated) ! Black nodes form a connected dominating set (proof by contradiction); shortest path between ANY two nodes only contains black nodes  Needed: Pruning heuristics

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Pruning heuristics  Heuristic 1: Unmark node v if –Node v and its neighborhood are included in the neighborhood of some node marked node u (then u will do the domination for v as well) –Node v has a smaller unique identifier than u (to break ties)  Heuristic 2: Unmark node v if –Node v’s neighborhood is included in the neighborhood of two marked neighbors u and w –Node v has the smallest identifier of the tree nodes  Nice and easy, but only linear approximation factor uv w abcd

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No One more distributed backbone heuristic: Span  Construct backbone, but take into account need to carry traffic – preserve capacity –Means: If two paths could operate without interference in the original graph, they should be present in the reduced graph as well –Idea: If the stretch factor (induced by the backbone) becomes too large, more nodes are needed in the backbone  Rule: Each node observes traffic around itself –If node detects two neighbors that need three hops to communicate with each other, node joins the backbone, shortening the path –Contention among potential new backbone nodes handled using random backoff A B C

14 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Thank you and thanks to Holger Karl and Rajmohan Rajamaran for some slides Wireless Sensor Networks Christian Schindelhauer 22nd Lecture