1 Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School.

Slides:



Advertisements
Similar presentations
Alpha Shapes. Used for Shape Modelling Creates shapes out of point sets Gives a hierarchy of shapes. Has been used for detecting pockets in proteins.
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
The Capacity of Wireless Networks
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Comments We consider in this topic a large class of related problems that deal with proximity of points in the plane. We will: 1.Define some proximity.
Divide and Conquer. Subject Series-Parallel Digraphs Planarity testing.
Approximations of points and polygonal chains
A Unified View to Greedy Routing Algorithms in Ad-Hoc Networks
2/14/13CMPS 3120 Computational Geometry1 CMPS 3120: Computational Geometry Spring 2013 Planar Subdivisions and Point Location Carola Wenk Based on: Computational.
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
1 Finding Shortest Paths on Terrains by Killing Two Birds with One Stone Manohar Kaul (Aarhus University) Raymond Chi-Wing Wong (Hong Kong University of.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Online Scheduling with Known Arrival Times Nicholas G Hall (Ohio State University) Marc E Posner (Ohio State University) Chris N Potts (University of Southampton)
Computational Geometry II Brian Chen Rice University Computer Science.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
The Divide-and-Conquer Strategy
By Groysman Maxim. Let S be a set of sites in the plane. Each point in the plane is influenced by each point of S. We would like to decompose the plane.
A (1+  )-Approximation Algorithm for 2-Line-Center P.K. Agarwal, C.M. Procopiuc, K.R. Varadarajan Computational Geometry 2003.
Convex Hulls in 3-space Jason C. Yang.
1 Constructing Convex 3-Polytopes From Two Triangulations of a Polygon Benjamin Marlin Dept. of Mathematics & Statistics McGill University Godfried Toussaint.
Convex Hull Problem Presented By Erion Lin. Outline Convex Hull Problem Voronoi Diagram Fermat Point.
What does that mean? To get the taste we will just look only at some sample problems... [Adapted from S.Suri]
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Computational Geometry -- Voronoi Diagram
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
Delaunay Triangulation Computational Geometry, WS 2006/07 Lecture 11 Prof. Dr. Thomas Ottmann Algorithmen & Datenstrukturen, Institut für Informatik Fakultät.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
Computational Geometry Seminar Lecture 4 More on straight-line embeddings Gennadiy Korol.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Lecture 10 : Delaunay Triangulation Computational Geometry Prof. Dr. Th. Ottmann 1 Overview Motivation. Triangulation of Planar Point Sets. Definition.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
INTEGRALS 5. INTEGRALS We saw in Section 5.1 that a limit of the form arises when we compute an area.  We also saw that it arises when we try to find.
Center for Graphics and Geometric Computing, Technion 1 Computational Geometry Chapter 9 Delaunay Triangulation.
Definition Dual Graph G* of a Plane Graph:
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 Two-step Routing and Apex Angle Routing for Delaunay Triangulations PhD Candidate: Weisheng Si Supervisor: Prof. Albert Y. Zomaya School of Information.
Computing the Delaunay Triangulation By Nacha Chavez Math 870 Computational Geometry; Ch.9; de Berg, van Kreveld, Overmars, Schwarzkopf By Nacha Chavez.
Chapter 4: Straight Line Drawing Ronald Kieft. Contents Introduction Algorithm 1: Shift Method Algorithm 2: Realizer Method Other parts of chapter 4 Questions?
1 Separator Theorems for Planar Graphs Presented by Shira Zucker.
1 University of Denver Department of Mathematics Department of Computer Science.
Introduction Outline The Problem Domain Network Design Spanning Trees Steiner Trees Triangulation Technique Spanners Spanners Application Simple Greedy.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
The Art Gallery Problem
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
GRAPH SPANNERS by S.Nithya. Spanner Definition- Informal A geometric spanner network for a set of points is a graph G in which each pair of vertices is.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Chapter 10 Graph Theory Eulerian Cycle and the property of graph theory 10.3 The important property of graph theory and its representation 10.4.
Void Traversal for Guaranteed Delivery in Geometric Routing
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
1 / 41 Convex Hulls in 3-space Jason C. Yang. 2 / 41 Problem Statement Given P: set of n points in 3-space Return: –Convex hull of P: CH (P) –Smallest.
© The McGraw-Hill Companies, Inc., Chapter 12 On-Line Algorithms.
UNC Chapel Hill M. C. Lin Delaunay Triangulations Reading: Chapter 9 of the Textbook Driving Applications –Height Interpolation –Constrained Triangulation.
INTEGRALS We saw in Section 5.1 that a limit of the form arises when we compute an area. We also saw that it arises when we try to find the distance traveled.
5 INTEGRALS.
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Randomized Incremental Algorithm for Delaunay Triangulation (DT) CS Gates 219 October 19, 3:00 – 4:20 Richard Zhang (for Leo G.) Disclaimer: All.
Midpoint Routing algorithms for Delaunay Triangulations
A sketch proof of the Gilbert-Pollak Conjecture on the Steiner Ratio
Enumerating Distances Using Spanners of Bounded Degree
Introduction Wireless Ad-Hoc Network
Presentation transcript:

1 Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies

2 The real life meaning of this paper: Lazy man: If I only aim to reach the midpoint towards the destination in each move, can I reach the destination finally? God: Yes, if you move on the class of graphs called Delaunay triangulations. Prologue

3 Outline Background knowledge Related work Our work  The Midpoint Routing algorithm and its generalization  The Compass Midpoint algorithm and its generalization Evaluation Open problem and Conclusion

4 Background Knowledge Online routing Our evaluation metrics for online routing Delaunay triangulations

5 Online Routing In some networking scenarios, a packet only has local information to find out its routes. Routing algorithms designed for such scenarios are called online routing algorithms. We consider online routing in the same settings as those described in “Online routing in triangulations”:  The environment is modeled by a geometric graph G(V, E), where V is the set of nodes with known (x, y) coordinates and E is the set of links connecting the nodes.  When a packet travels from a source node s to a destination node t, it carries the coordinates of t, and at each node v being visited, can learn the coordinates of the nodes in N(v), where N(v) denotes the set of v’s one-hop neighbors.

6 Online Routing (cont’d) An example of geometric graphs

7 Online routing (cont’d) If an online routing algorithm A can move a packet from any source s to any destination t in G, A is said to work for G. If at each node v visited by a packet, A makes the routing decision for this packet only according to the coordinates of v, t, and the nodes in N(v), A is said to be memoryless or oblivious.  ‘memoryless’ means that a packet records no information learned during the traversal of a graph.  Because the memoryless online routing (MOR) algorithms have low complexity in both space and time for nodes and packets, they have received wide attention.

8 Our evaluation metrics for online routing For a source/destination pair (s, t) in G, we define the deviation ratio of (s, t) by a routing algorithm A as the length of the path found by A from s to t versus the length of the shortest path from s to t. For a graph G, we define the deviation ratio of G by A as the average deviation ratio of all (s, t) pairs in G. In practice, the path length generally has two metrics:  link distance  link deviation ratio  Euclidean distance  Euclidean deviation ratio

9 Our evaluation metrics (cont’d) The deviation ratio concept is different from the c- competitive concept  A routing algorithm is c-competitive for a graph G, if for all (s, t) pairs in G, their deviation ratios are not greater than a constant c.  The deviation ratio concept concerns the average performance of a routing algorithm on a graph, while the c- competitive concept concerns the worst-case performance of a routing algorithm on a graph. The deviation ratio concept is different from the dilation concept and the stretch factor concept  Both of them are defined to measure the path quality of a subgraph with respect to the complete graph.  Both of them are not used to evaluate routing algorithms.

10 Delaunay Triangulations A Delaunay triangulation (DT) is a triangulation graph in which no node lies in the interior of the circumcircle of any of its triangles. It is also the dual graph of a Voronoi Diagram.

11 Delaunay Triangulations (cont’d) DTs have the following desirable properties for routing:  Let n denotes the number of nodes. The total number of links in a DT is less than 3n, and the average node degree is less than 6, thus simplifying the operation of routing.  In a DT, the Euclidean length of the shortest path between any two nodes u and v is less than C times the Euclidean distance between u and v, where C is proved to be between and Determining C exactly is one of the most challenging problems in computational geometry.  DTs are planar graphs.

12 Delaunay Triangulations (cont’d) Therefore, DTs have been widely proposed as the network topologies. In light of the above, this paper particularly focuses on the MOR algorithms for DTs.

13 Related work The MOR algorithms are simple and elegant, so they are fascinating to discover. To date, three existing MOR algorithms are proved to work for DTs  The Compass Routing algorithm  The Greedy Routing algorithm  The Greedy Compass algorithm Hereafter, we will use t to denote the destination node of a packet P, v to denote the current processing node of P, d(a, b) to denote the Euclidean distance between node a and node b, and to denote the angle between the link va and the link vb.

14 The Compass Routing algorithm The node v always moves P to the node w in N(v) that minimizes the angle. v c t b a

15 The Greedy Routing algorithm The node v always moves P to the node w in N(v) that minimizes d(w, t). v c t b a

16 The Greedy Compass algorithm The node v first decides the two nodes cw(v) and ccw(v), where cw(v) denotes the node w that has the smallest clockwise angle from the line vt, and ccw(v) denotes the node w that has the smallest counterclockwise angle from the line vt. Then, P is moved to one of cw(v) and ccw(v), whichever has a smaller Euclidean distance to t. v c t b a ccw(v) cw(v)

17 Our work The Midpoint Routing algorithm The generalization to the Midpoint Routing algorithm The set of Deterministic Compass algorithms  This is the generalization to the Compass Midpoint algorithm The Compass Midpoint algorithm

18 The Midpoint Routing Algorithm The basic idea is to to minimize the Euclidean distance to m, where m is the midpoint between the current processing node v and the destination t.

19 The Midpoint Routing (cont’d) The algorithm is detailed below. 1 calculate the coordinates of midpoint m of vt; 2 for each w in N(v) { // check whether t is a neighbor of v 3 if ( w is the same node as t ) { 4 next(v) is set to w; 5 return; 6 } 7 update next(v) to w if w has a smaller d(w, m); 8 }

20 The Midpoint Routing (cont’d) Theorem 1: The Midpoint Routing algorithm works for DTs. Proof: We prove this theorem by showing that in each routing step, a packet gets strictly closer to t. This proof exploits that a DT is the dual graph of a Voronoi diagram.  o v w t i D a

21 Generalization to Midpoint Routing Corollary 1: Replace the midpoint m with any point p in the line segment mt in the Midpoint Routing algorithm, the newly obtained algorithm works for DTs. It is worth noting that both the Midpoint Routing algorithm and the Greedy Routing algorithm are special cases of this set of MOR algorithms.

22 Generalization -- Proof Proof: We prove this corollary also by showing that in each routing step, a packet gets strictly closer to t. In the right-hand figure, D m is the disk with m as the center and vm as the radius, and D p is the disk with p as the center and vp as the radius. 

23 The Set of Deterministic Compass Algorithms This set of algorithms have a similar structure with the Greedy Compass algorithm: the node v first decides the two nodes cw(v) and ccw(v), and then selects one of them as next(v) using a deterministic rule. 1 if (v has a neighbor w lying on the segment vt ) 2 next(v) is set to w; 3 else { 4 decides the two nodes cw(v) and ccw(v); 5 next(v) is set to one of them using a deterministic rule; 6 }

24 Proof Roadmap for “the set of Deterministic Compass algorithms work for DTs” Lemma 1 Lemma 2 Theorem 2 Corollary 2

25 Lemma 1 Lemma 1: For a (s, t) pair in a triangulation graph T, if a Deterministic Compass algorithm cannot route a packet P from s to t, P must be trapped in a cycle, and the link distance of this cycle is larger than two. Proof: Since a DC algorithm makes the same routing decision at the same node each time, and there is limited number of nodes in T, P must be trapped in a cycle if it never gets to t. Next, we show that there does not exist a link uv in T, such that next(u) = v and next(v)=u for a DC algorithm. u t v I II III w

26 Lemma 2 – Preparation Knowledge A visibility concept called ‘obscure’: Let A and B be two triangles in T. A is said to obscure B with respect to a viewpoint z on the same plane, if there exists a ray from z reaching any point in A first and then any point in B.

27 Lemma 2 -- Statement Let u and v be any two nodes in T such that next(u) = v by a Deterministic Compass algorithm for a destination t. Define Δuv as the triangle in T that lies in the half-plane bounded by the line through uv and containing t. Then we have the following lemma on the visibility of Δuv’s in a trapping cycle. Lemma 2: If a Deterministic Compass algorithm is trapped in a cycle v 0 v 1 v 2 … v k-1 v 0 for a source/destination pair (s, t) in a triangulation T, Δ v i v i+1 is either identical to Δ v i-1 v i or obscures Δ v i-1 v i with respect to the viewpoint t. (0<=i<k, and all subscripts are the results of mod k).

28 Lemma 2 -- Proof Proof: In the figure below, let w be the third node of Δ v i v i+1, then w can only lie in the regions I, II, or III. If w is in region I, there will be crossing links in T, contradicting to the planarity of T. Note that we assume v i-1 is located in the upper half plane here; otherwise, there are only regions II and III, and this proof step can be omitted. If w is in region III, next(v i ) cannot be v i+1. So w can only lie in region II. In this case, the ray from t to v i reaches the link v i+1 w first and then reaches v i, a point in Δ v i-1 v i. Therefore, Δ v i v i+1 obscures Δ v i-1 v i. v i+1 I III w t v i-1 II vivi

29 Theorem 2 A triangulation is regular, if it can be obtained by vertically projecting the faces of the lower convex hull of a 3-dimension polytope onto the plane. Theorem 2: Any Deterministic Compass algorithm works for regular triangulations. Proof: Edelsbrunner proved that if a triangulation T is a regular triangulation, T has no set of triangles that can form an obscuring cycle with respect to any viewpoint in T. Given Lemma 1 and Lemma 2, if a Deterministic Compass algorithm does not work for T, there must exist a set of triangles forming an obscuring cycle, thus causing contradictions. Therefore, this theorem holds.

30 Corollary 2 Since a DT is the projection onto the plane of the lower convex hull of a set of points that all lie on a paraboloid, a DT is a special case of the regular triangulations. Thus, the following corollary holds. Corollary 2: Any Deterministic Compass algorithm works for DTs. It is worth noting that the Compass Routing algorithm and the Greedy Compass algorithm are the special cases of this set of MOR algorithms.

31 The Compass Midpoint algorithm This algorithm is obtained by setting the deterministic rule to the following: select the cw(v) and ccw(v) whichever has a smaller Euclidean distance to m, where m is the midpoint of the line segment vt. Since the Compass Midpoint algorithm belongs to the Deterministic Compass algorithms, we have the following corollary. Corollary 3: The Compass Midpoint algorithm works for the regular triangulations, especially DTs.

32 Evaluations Euclidean and link deviation ratios of the five MOR algorithms:  Compass Routing  Greedy Routing  Greedy Compass  Midpoint Routing  Compass Midpoint

33 Experiment Setup We develop a computer program that implements the above five MOR algorithms and calculates their Euclidean deviation ratios and link deviation ratios. We totally conduct experiments on 1000 DTs of 100 nodes. For each DT, the positions of its 100 nodes are randomly uniformly distributed in a square area.

34 Euclidean deviation ratios

35 Euclidean deviation ratios (cont’d) Both average and 99th percentile Euclidean deviation ratios of these five algorithms are very small (all below 1.1).  So all of them perform well in average and general cases, and hence are practical for applications. ComRtg performs the best, and the next four ones are in turn ComMid, MidRtg, ComGdy, and GdyRtg.  This reflects that minimizing the angle to the destination at each routing step is very effective in reducing the Euclidean distances of the paths, while minimizing the Euclidean distance to the destination is less effective. The two new algorithms MidRtg and ComMid perform in the middle among these five algorithms.

36 Link deviation ratios

37 Link deviation ratios (cont’d) Both average and 99th percentile link deviation ratios of these five algorithms are very small (all below 1.32).  So all of them perform well in average and general cases, and hence are practical for applications. GdyRtg performs the best, and the next four ones are in turn ComGdy, MidRtg, ComMid, and ComRtg.  This reflects that minimizing the Euclidean distance to the destination at each routing step is very effective in reducing the link distances of the paths, while minimizing the angle to the destination is less effective. The two new algorithms MidRtg and ComMid perform in the middle among these five algorithms.

38 An Open Problem It was proved that the Greedy Compass algorithm works for arbitrary triangulations.  Suggesting that combining the references to angles and to Euclidean distances can generate more capable MOR algorithms. This leads to the conjecture that the Compass Midpoint algorithm presented in this paper works for arbitrary triangulations. Right now, we cannot prove or disprove this conjecture. If this conjecture is proved true, the Compass Midpoint algorithm becomes more meaningful.

39 Conclusions We found and proved two new MOR algorithms and two new sets of MOR algorithms working for DTs. Our evaluations showed that  All the evaluated five algorithms can find paths with low link and Euclidean deviation ratios on DTs in average and general cases, so they are practical for applications.  The two algorithms perform in the middle among these five algorithms in terms of both link and Euclidean deviation ratios, so they are suitable for the applications requiring satisfactory performance in both link and Euclidean metrics. Though our algorithms and proofs are simple, they possess an elementary nature, so they help in gaining insight into the MOR algorithms and the DTs.

40 Thank you! Questions and suggestions?