Algorithms for Ad Hoc and Sensor Networks Roger Wattenhofer Herfstdagen, 2004.

Slides:



Advertisements
Similar presentations
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Advertisements

1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
Distributed Computing Group Roger Wattenhofer Ad-Hoc and Sensor Networks Worst-Case vs. Average-Case IZS 2004.
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger.
Algorithms for Ad Hoc Networks Roger Wattenhofer MedHocNet 2005 alg hoc net 2005.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 18th Lecture Christian Schindelhauer.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Roger Wattenhofer Distributed Algorithms Sensor Networks Reloaded or Revolutions?
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Distributed Computing Group Roger Wattenhofer Wireless Networking Graph Theory Unplugged WG 2004.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Geometric Routing without Geometry
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Ad Hoc and Sensor Networks – Roger Wattenhofer –2/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Geo-Routing Chapter 2 TexPoint fonts used in EMF. Read.
Wireless Networking Graph Theory Unplugged WG 2004
Distributed Computing Group Locality and the Hardness of Distributed Approximation Thomas Moscibroda Joint work with: Fabian Kuhn, Roger Wattenhofer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Topology Control Algorithms Davide Bilò
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
An Algorithmic Approach to Geographic Routing in Ad Hoc and Sensor Networks - IEEE/ACM Trans. on Networking, Vol 16, Number 1, February 2008 D
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Geo-Routing Chapter 3 TexPoint fonts used in EMF. Read.
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Ad Hoc and Sensor Networks – Roger Wattenhofer –7/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Clustering Chapter 7 TexPoint fonts used in EMF. Read.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
1 Routing in Internet vs. Sensor Network. 2 Sensor Network Routing –I Location/Geographic Based Routing Tian He Some materials are adapted from I. Stojmenovic.
Does Topology Control Reduce Interference?
Topology Control –power control
Clustering TexPoint fonts used in EMF.
Algorithms for Ad Hoc Networks
Introduction Wireless Ad-Hoc Network
Presentation transcript:

Algorithms for Ad Hoc and Sensor Networks Roger Wattenhofer Herfstdagen, 2004

Roger Wattenhofer, ETH Herfstdagen Overview Introduction –Ad-Hoc and Sensor Networks –Routing / Broadcasting Clustering Topology Control Geo-Routing Conclusions

3 Power Processor Radio Sensors Memory

Roger Wattenhofer, ETH Herfstdagen What are Ad-Hoc/Sensor Networks?

Roger Wattenhofer, ETH Herfstdagen Ad-Hoc Networks vs. Sensor Networks Laptops, PDA’s, cars, soldiers All-to-all routing Often with mobility (MANET’s) Trust/Security an issue –No central coordinator Maybe high bandwidth Tiny nodes: 4 MHz, 32 kB, … Broadcast/Echo from/to sink Usually no mobility –but link failures One administrative control Long lifetime  Energy

Roger Wattenhofer, ETH Herfstdagen Open Problem #1: Positioning and Virtual Coordinates Unit Disk Graph: Link if and only if Euclidean distance at most 1. Positioning: Some nodes know their position (“anchor nodes”). Virtual Coordinates: Unit Disk Graph Embedding –Graph Drawing? (Edge crossings  no problem) –Known to be NP-hard [Breu & Kirkpatrick 1998] –There is no PTAS [Kuhn et al., 2004] –Approximation algorithms? Minimize ratio of longest edge over shortest non-edge. Polylogarithmic approximation ratio [Moscibroda et al., 2004] –Mobile/dynamic nodes  Local updates, stability

Roger Wattenhofer, ETH Herfstdagen Routing in Ad-Hoc Networks Multi-Hop Routing –Moving information through a network from a source to a destination if source and destination are not within mutual transmission range Reliability –Nodes in an ad-hoc network are not 100% reliable –Algorithms need to find alternate routes when nodes are failing Mobile Ad-Hoc Network (MANET) –It is often assumed that the nodes are mobile (“Moteran”)

Roger Wattenhofer, ETH Herfstdagen Simple Classification of Ad-hoc Routing Algorithms Proactive Routing Small topology changes trigger a lot of updates, even when there is no communication  does not scale Flooding: when node received message the first time, forward it to all neighbors Distance Vector Routing: as in a fixnet nodes maintain routing tables using update messages Reactive Routing Flooding the whole network does not scale no mobilitymobility very highcritical mobility Source Routing (DSR, AODV): flooding, but re-use old routes

Roger Wattenhofer, ETH Herfstdagen Discussion Lecture “Mobile Computing”: 10 Tricks  2 10 routing algorithms In reality there are almost that many! Q: How good are these routing algorithms?!? Any hard results? A: Almost none! Method-of-choice is simulation… Perkins: “if you simulate three times, you get three different results” Flooding is key component of (many) proposed algorithms At least flooding should be efficient

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering –Flooding vs. Dominating Sets –Algorithm Overview –Phase A –Phase B –Lower Bounds Topology Control Geo-Routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Finding a Destination by Flooding

Roger Wattenhofer, ETH Herfstdagen Finding a Destination Efficiently

Roger Wattenhofer, ETH Herfstdagen (Connected) Dominating Set A Dominating Set DS is a subset of nodes such that each node is either in DS or has a neighbor in DS. A Connected Dominating Set CDS is a connected DS, that is, there is a path between any two nodes in CDS that does not use nodes that are not in CDS. It might be favorable to have few nodes in the (C)DS. This is known as the Minimum (C)DS problem.

Roger Wattenhofer, ETH Herfstdagen Formal Problem Definition: M(C)DS Input: We are given an (arbitrary) undirected graph. Output: Find a Minimum (Connected) Dominating Set, that is, a (C)DS with a minimum number of nodes. Problems –M(C)DS is NP-hard –Find a (C)DS that is “close” to minimum (approximation) –The solution must be local (global solutions are impractical for mobile ad-hoc network) – topology of graph “far away” should not influence decision who belongs to (C)DS

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering –Flooding vs. Dominating Sets –Algorithm Overview –Phase A –Phase B –Lower Bounds Topology Control Geo-Routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Algorithm Overview Input: Local Graph Fractional Dominating Set Dominating Set Connected Dominating Set 0.5 Phase C: Connect DS by “tree” of “bridges” Phase B: Probabilistic algorithm Phase A: Distributed linear program rel. high degree gives high value

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering –Flooding vs. Dominating Sets –Algorithm Overview –Phase A –Phase B –Lower Bounds Topology Control Geo-Routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Phase A is a Distributed Linear Program Nodes 1, …, n: Each node u has variable x u with x u ¸ 0 Sum of x-values in each neighborhood at least 1 (local) Minimize sum of all x-values (global) = 1.5 ¸ 1 Linear Programs can be solved optimally in polynomial time But not in a distributed fashion! That’s what we do here… Linear Program Adjacency matrix with 1’s in diagonal

Roger Wattenhofer, ETH Herfstdagen Phase A Algorithm

Roger Wattenhofer, ETH Herfstdagen Result after Phase A Distributed Approximation for Linear Program Instead of the optimal values x i * at nodes, nodes have x i (  ), with The value of  depends on the number of rounds k (the locality)

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering –Flooding vs. Dominating Sets –Algorithm Overview –Phase A –Phase B –Lower Bounds Topology Control Geo-Routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Dominating Set as Integer Program What we have after phase A What we want after phase B

Roger Wattenhofer, ETH Herfstdagen Phase B Algorithm Each node applies the following algorithm: 1.Calculate (= maximum degree of neighbors in distance 2) 2.Become a dominator (i.e. go to the dominating set) with probability 3.Send status (dominator or not) to all neighbors 4.If no neighbor is a dominator, become a dominator yourself From phase A Highest degree in distance 2

Roger Wattenhofer, ETH Herfstdagen Result after Phase B Randomized rounding technique Expected number of nodes joining the dominating set in step 2 is bounded by  log(  +1) ¢ |DS OPT |. Expected number of nodes joining the dominating set in step 4 is bounded by |DS OPT |. Theorem: E[|DS|] · O(  ln  ¢ |DS OPT |)

Roger Wattenhofer, ETH Herfstdagen Related Work on (Connected) Dominating Sets Global algorithms –Johnson (1974), Lovasz (1975), Slavik (1996): Greedy is optimal –Guha, Kuller (1996): An optimal algorithm for CDS –Feige (1998): ln  lower bound unless NP 2 n O(log log n) Local (distributed) algorithms –“Handbook of Wireless Networks and Mobile Computing”: All algorithms presented have no guarantees –Gao, Guibas, Hershberger, Zhang, Zhu (2001): “Discrete Mobile Centers” O(loglog n) time, but nodes know coordinates –MIS-based algorithms (e.g. Alzoubi, Wan, Frieder, 2002) that only work on unit disk graphs. –Kuhn, Wattenhofer (2003): Tradeoff time vs. approximation

Roger Wattenhofer, ETH Herfstdagen Recent Improvements Improved algorithms (Kuhn, Wattenhofer, 2004): –O(log 2  /  4 ) time for a (1+  )-approximation of phase A with logarithmic sized messages. –If messages can be of unbounded size there is a constant approximation of phase A in O(log n) time, using the graph decomposition by Linial and Saks. –An improved and generalized distributed randomized rounding technique for phase B. –Works for quite general linear programs. Is it any good…?

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering –Flooding vs. Dominating Sets –Algorithm Overview –Phase A –Phase B –Lower Bounds Topology Control Geo-Routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Lower Bound for Dominating Sets: Intuition… m n-1 complete n m m … n n n Two graphs (m << n). Optimal dominating sets are marked red. |DS OPT | = 2. |DS OPT | = m+1.

Roger Wattenhofer, ETH Herfstdagen Lower Bound for Dominating Sets: Intuition… In local algorithms, nodes must decide only using local knowledge. In the example green nodes see exactly the same neighborhood. So these green nodes must decide the same way! m n-1 n m …

Roger Wattenhofer, ETH Herfstdagen Lower Bound for Dominating Sets: Intuition… m n-1 complete n m m … n n n But however they decide, one way will be devastating (with n = m 2 )! |DS OPT | = 2. |DS OPT without green | ¸ m. |DS OPT | = m+1. |DS OPT with green | > n

Roger Wattenhofer, ETH Herfstdagen The Lower Bound Lower bounds (Kuhn, Moscibroda, Wattenhofer, 2004): –Model: In a network/graph G (nodes = processors), each node can exchange a message with all its neighbors for k rounds. After k rounds, node needs to decide. –We construct the graph such that there are nodes that see the same neighborhood up to distance k. We show that node ID’s do not help, and using Yao’s principle also randomization does not. –Results: Many problems (vertex cover, dominating set, matching, etc.) can only be approximated  (n c/k 2 / k) and/or  (  1/k / k). –It follows that a polylogarithmic dominating set approximation (or maximal independent set, etc.) needs at least  (log  / loglog  ) and/or  ((log n / loglog n) 1/2 ) time.

Roger Wattenhofer, ETH Herfstdagen Graph Used in Dominating Set Lower Bound The example is for k = 3. All edges are in fact special bipartite graphs with large enough girth.

Roger Wattenhofer, ETH Herfstdagen Clustering for Unstructured Radio Networks “Big Bang” (deployment) of a sensor and/or ad-hoc network: –Nodes wake up asynchronously (very late, maybe) –Neighbors unknown –Hidden terminal problem –No global clock –No established MAC protocol –No reliable collision detection –Limited knowledge of the number of nodes or degree of network. We have randomized algorithms that compute DS (or MIS) in polylog(n) time even under these harsh circumstances, where n is an upper bound on the number of nodes in the system. [Kuhn, Moscibroda, Wattenhofer, 2004]

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control –What is it? What is it good for? –Does Topology Control Reduce Interference? –Cellular Networks, Sensor Networks, etc. Geo-Routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Topology Control Drop long-range neighbors: Reduces interference and energy! But still stay connected (or even spanner)

Roger Wattenhofer, ETH Herfstdagen Topology Control as a Trade-Off Network Connectivity Spanner Property Topology Control Conserve Energy Reduce Interference Sometimes also clustering (first part of the talk) is called topology control d(u,v) ¢ t ¸ d TC (u,v)

Roger Wattenhofer, ETH Herfstdagen Classic Solution: Gabriel Graph Let disk(u,v) be a disk with diameter (u,v) that is determined by the two points u,v. The Gabriel Graph GG(V) is defined as an undirected graph (with E being a set of undirected edges). There is an edge between two nodes u,v iff the disk(u,v) including boundary contains no other points. Gabriel Graph is planar Gabriel Graph is energy optimal [energy of link is at least distance squared] disk(u,v) v u

Roger Wattenhofer, ETH Herfstdagen Topology Control Drop long-range neighbors: Reduces interference and energy! But still stay connected (or even spanner) Really?!?

Roger Wattenhofer, ETH Herfstdagen Related Work Mid-Eighties: randomly distributed nodes [Takagi & Kleinrock 1984, Hou & Li 1986] Second Wave: constructions from computational geometry, Delaunay Triangulation [Hu 1993], Minimum Spanning Tree [Ramanathan & Rosales-Hain INFOCOM 2000], Gabriel Graph [Rodoplu & Meng J.Sel.Ar.Com 1999] Cone-Based Topology Control [Wattenhofer et al. INFOCOM 2000] ; explicitly prove several properties (energy spanner, sparse graph), locality. Collecting more and more properties [Li et al. PODC 2001, Jia et al. SPAA 2003, Li et al. INFOCOM 2004] (e.g. local, planar, distance and energy spanner, constant node degree) Explicit interference [Meyer auf der Heide et al. SPAA 2002]. Interference between edges, time-step routing model, congestion; trade-offs; however, interference model based on network traffic

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control –What is it? What is it good for? –Does Topology Control Reduce Interference? –Cellular Networks, Sensor Networks, etc. Geo-Routing Conclusions

Roger Wattenhofer, ETH Herfstdagen What Is Interference? Model –Transmitting edge e = (u,v) disturbs all nodes in vicinity –Interference of edge e = # Nodes covered by union of the two circles with center u and v, respectively, and radius |e| Problem statement –We want to minimize maximum interference! –At the same time topology must be connected or a spanner etc. 8 Exact size of interference range does not change the results

Roger Wattenhofer, ETH Herfstdagen Low Node Degree Topology Control? Low node degree does not necessarily imply low interference: Very low node degree but huge interference

Roger Wattenhofer, ETH Herfstdagen Let’s Study the Following Topology! …from a worst-case perspective

Roger Wattenhofer, ETH Herfstdagen Topology Control Algorithms Produce… All known topology control algorithms (with symmetric edges) include the nearest neighbor forest as a subgraph and produce something like this: The interference of this graph is  (n)!

Roger Wattenhofer, ETH Herfstdagen But Interference… Interference does not need to be high… This topology has interference O(1)!!

Roger Wattenhofer, ETH Herfstdagen Algorithms and Lower Bounds [Burkhart, von Rickenbach, Wattenhofer, Zollinger, 2004] Interference-optimal connectivity-preserving topology Local interference-optimal spanner topology Algorithms also work if interference radius >> transmission radius No local algorithm can find a good topology Optimal topology is not planar UDG, I = 50RNG, I = 25 LLISE 10, I = 12

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control –What is it? What is it good for? –Does Topology Control Reduce Interference? –Cellular Networks, Sensor Networks, etc. Geo-Routing Conclusions

Roger Wattenhofer, ETH Herfstdagen New Results… Interference-driven topology control is exciting new paradigm… We have a few other upcoming results: For cellular networks: minimize number of base stations a mobile station overhears by reducing the transmission power of the base stations  “minimum membership set cover” problem For sensor networks: data gathering without listening to lots of unwanted traffic…

Roger Wattenhofer, ETH Herfstdagen Open Problem #2: In-Interference Given ad-hoc network represented by nodes in a plane. Connect nodes by spanning tree. Circle of each node centered at node with the radius being the length of longest adjacent edge in spanning tree. Coverage of node is the number of circles node falls into. Minimize the maximum (or average) coverage

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control Geo-Routing –What is geometric routing? –Correct geometric routing –Worst-case efficient geometric routing –Average-case efficient geometric routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Geometric Routing t s s ??????

Roger Wattenhofer, ETH Herfstdagen Greedy Routing Each node forwards message to “best” neighbor t s

Roger Wattenhofer, ETH Herfstdagen Greedy Routing Each node forwards message to “best” neighbor But greedy routing may fail: message may get stuck in a “dead end” Needed: Correct geometric routing algorithm t ? s

Roger Wattenhofer, ETH Herfstdagen What is Geometric Routing? A.k.a. location-based, position-based, geographic, etc. Chapter 18 (“Routing […] in Geometric and Wireless Networks”) in “Handbook of Wireless Networking and Mobile Computing” Each node knows its own position and position of neighbors Source knows the position of the destination No routing tables stored in nodes! Geometric routing makes sense –Own position: GPS/Galileo, local positioning algorithm –Destination: overlay P2P net, geocasting, source routing++ –Learn about ad-hoc routing in general

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control Geo-Routing –What is geometric routing? –Correct geometric routing –Worst-case efficient geometric routing –Average-case efficient geometric routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Face Routing Based on ideas by [Kranakis, Singh, Urrutia CCCG 1999] Here simplified (and actually improved)

Roger Wattenhofer, ETH Herfstdagen Face Routing Remark: Planar graph can easily (and locally!) be computed with the Gabriel Graph, for example.

Roger Wattenhofer, ETH Herfstdagen Face Routing st

Roger Wattenhofer, ETH Herfstdagen Face Routing st

Roger Wattenhofer, ETH Herfstdagen Face Routing st

Roger Wattenhofer, ETH Herfstdagen Face Routing st

Roger Wattenhofer, ETH Herfstdagen Face Routing st

Roger Wattenhofer, ETH Herfstdagen Face Routing st

Roger Wattenhofer, ETH Herfstdagen Face Routing st

Roger Wattenhofer, ETH Herfstdagen All necessary information is stored in the message –Source and destination positions –Point of transition to next face Completely local: –Knowledge about direct neighbors‘ positions sufficient –Faces are implicit Planarity of graph is computed locally (not an assumption) Face Routing Properties “Right Hand Rule”

Roger Wattenhofer, ETH Herfstdagen Face Routing Works on Any Graph s t

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control Geo-Routing –What is geometric routing? –Correct geometric routing –Worst-case efficient geometric routing –Average-case efficient geometric routing Conclusions

Roger Wattenhofer, ETH Herfstdagen Face Routing Theorem: Face Routing reaches destination in O(n) steps But: Can be very bad compared to the optimal route

Roger Wattenhofer, ETH Herfstdagen Bounding Searchable Area ts

Roger Wattenhofer, ETH Herfstdagen Adaptively Bound Searchable Area What is the correct size of the bounding area? –Start with a small searchable area –Grow area each time you cannot reach the destination –In other words, adapt area size whenever it is too small Theorem: Algorithm finds destination after O(c 2 ) steps, where c is the cost of the optimal path from source to destination. Proof: Not in this presentation.

Roger Wattenhofer, ETH Herfstdagen Algorithm is worst-case optimal Can we do any better? No, with “wheel” example –Destination is central node –Source is any node on ring –Any spoke can go to middle –Geometric routing: no routing tables  test many spines –Best path of size O(c)+O(c) –Test  (c) spokes of length  (c) –Cost  (c 2 ) instead of O(c) Theorem: Algorithm is asymptotically worst-case optimal.

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control Geo-Routing –What is geometric routing? –Correct geometric routing –Worst-case efficient geometric routing –Average-case efficient geometric routing Conclusions

Roger Wattenhofer, ETH Herfstdagen GOAFR – Greedy Other Adaptive Face Routing Algorithm is not very efficient (especially in dense graphs) Combine Greedy and (Other Adaptive) Face Routing –Route greedily as long as possible –Circumvent “dead ends” by use of face routing –Then route greedily again Theorem: GOAFR is still asymptotically worst-case optimal… …and it is efficient in practice, in the average-case. What does “practice” mean? –Usually nodes placed uniformly at random

Roger Wattenhofer, ETH Herfstdagen Average Case Not interesting when graph not dense enough Not interesting when graph is too dense Critical density range (“percolation”) –Shortest path is significantly longer than Euclidean distance too sparsetoo densecritical density

Roger Wattenhofer, ETH Herfstdagen Shortest path is significantly longer than Euclidean distance Critical density range mandatory for the simulation of any routing algorithm (not only geometric) Critical Density: Shortest Path vs. Euclidean Distance

Roger Wattenhofer, ETH Herfstdagen Simulation on Randomly Generated Graphs GFG/GPSR GOAFR+ Greedy success Connectivity better worse Network Density [nodes per unit disk] Performance Frequency critical

Roger Wattenhofer, ETH Herfstdagen Discussion Previously known –Non-competitive algorithms (Face Routing, GFG/GPSR, …) Three papers [DIALM 2002, MOBIHOC 2003, PODC 2003]: –The first worst-case optimal algorithm –The first worst-case optimal and average-case efficient algorithm –Percolation theory to evaluate routing algorithms –Various results for different cost metrics (“super-linear” not competitive) –Various related results (“bounded degree graphs”) Algorithm is simple: Can be implemented in network processor Quite a few implementations available Algorithm can be married with other approaches Geometric routing as a more stable form of source routing First tight result in ad-hoc routing (to our knowledge)

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control Geo-Routing Conclusions –Clustering vs. Topology Control –More realism, more realism, more realism, … –… Practice!

Roger Wattenhofer, ETH Herfstdagen Clustering vs. Topology Control Clustering (Connected) Dominating Set (Connected) Domatic Partition Both approaches sparsen the graph in order to reduce energy… … by turning off fraction of the nodes, and thus interference. Two sides of the same medal? Topology Control Interference-Driven T.C. … by turning off long-range links, and thus interference.

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control Geo-Routing Conclusions –Clustering vs. Topology Control –More realism, more realism, more realism, … –… Practice!

81 ? What does a typical ad-hoc network look like?

Roger Wattenhofer, ETH Herfstdagen Like this?

Roger Wattenhofer, ETH Herfstdagen Like this?

Roger Wattenhofer, ETH Herfstdagen Or rather like this?

Roger Wattenhofer, ETH Herfstdagen Or even like this?

Roger Wattenhofer, ETH Herfstdagen What about typical mobility? Brownian Motion? Random Way-Point? Statistical Data Model? Maximum Speed Model? …?

Roger Wattenhofer, ETH Herfstdagen Overview Introduction Clustering Topology Control Geo-Routing Conclusions –Clustering vs. Topology Control –More realism, more realism, more realism, … –… Practice!

Roger Wattenhofer, ETH Herfstdagen Combine Theory with Practice Practical experiments… Shockfish btnodes of NCCR/MICS Scatterweb

Roger Wattenhofer, ETH Herfstdagen Some credit… Problem (Algorithm)Reference Dominating SetKuhn, PODC 2003 Kuhn, Moscibroda, PODC 2004 Topology Control and Interference (LISE, XTC, MMSC, Sensor Networks) Burkhart et MobiHoc 2004 W., WMAN 2004 von Rickenbach et submitted Zollinger et submitted Geo-Routing (GOAFR)Kuhn, W., MobiHoc 2003 Kuhn, W., Zhang, PODC 2003 Positioning (GHoST)Bischoff, PerCom 2004 Kuhn, Moscibroda, DIALM 2004 Moscibroda et DIALM Data gatheringCristescu et submitted von Rickenbach, DIALM 2004 Models: Quasi-UDGKuhn, W., DIALM 2003 “Deployment” problemMoscibroda, ESA & MobiCom & MASS 2004

90 Thank you! Distributed Computing Group Roger Wattenhofer