September 12, 2006IEEE PIMRC 2006, Helsinki, Finland1 On the Packet Header Size and Network State Tradeoff for Trajectory-Based Routing in Wireless Networks.

Slides:



Advertisements
Similar presentations
Problem solving with graph search
Advertisements

CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, and Chonggang Wang University of Minnesota, AT&T Lab, Arizona State University, Syracuse University, NEC.
Fast Firewall Implementation for Software and Hardware-based Routers Lili Qiu, Microsoft Research George Varghese, UCSD Subhash Suri, UCSB 9 th International.
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
Types of Algorithms.
On Map-Matching Vehicle Tracking Data
Weak State Routing for Large Scale Dynamic Networks Utku Günay Acer, Shivkumar Kalyanaraman, Alhussein A. Abouzeid Rensselaer Polytechnic Institute Department.
Kai Li, Kien Hua Department of Computer Science University of Central Florida.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Minimizing Multi-Hop Wireless Routing State under Application- based Accuracy Constraints Mustafa Kilavuz & Murat Yuksel University of Nevada, Reno.
Data Clustering Methods
Power-Aware Routing in Mobile Ad Hoc Networks. Introduction 5 power aware metrics for shortest-cost routing will be presented Compared to the traditional.
Nonholonomic Multibody Mobile Robots: Controllability and Motion Planning in the Presence of Obstacles (1991) Jerome Barraquand Jean-Claude Latombe.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Offset of curves. Alina Shaikhet (CS, Technion)
FLIP : Flexible Interconnection Protocol Ignacio Solis Katia Obraczka.
An Implementation Framework for Trajectory-Based Routing in Ad Hoc Networks Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman Electrical, Computer,
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Decision Tree Algorithm
Energy-Efficient Target Coverage in Wireless Sensor Networks Mihaela Cardei, My T. Thai, YingshuLi, WeiliWu Annual Joint Conference of the IEEE Computer.
Context Compression: using Principal Component Analysis for Efficient Wireless Communications Christos Anagnostopoulos & Stathes Hadjiefthymiades Pervasive.
Efficient Multidimensional Packet Classification with Fast Updates Author: Yeim-Kuan Chang Publisher: IEEE TRANSACTIONS ON COMPUTERS, VOL. 58, NO. 4, APRIL.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Solving the Protein Threading Problem in Parallel Nocola Yanev, Rumen Andonov Indrajit Bhattacharya CMSC 838T Presentation.
Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks Maggie X. Cheng, Lu Ruan and Weili Wu Dept. of Comput. Sci, Missouri.
Dynamic routing – QoS routing Load sensitive routing QoS routing.
Trajectory-Based Forwarding Mechanisms for Ad-Hoc Sensor Networks Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman Electrical, Computer, and Systems.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Ashish Gupta (98130) Ashish Gupta (98131) Under guidance of Prof. B. N. Jain.
Universität Dortmund  P. Marwedel, Univ. Dortmund, Informatik 12, 2003 Hardware/software partitioning  Functionality to be implemented in software.
UCSC 1 Aman ShaikhICNP 2003 An Efficient Algorithm for OSPF Subnet Aggregation ICNP 2003 Aman Shaikh Dongmei Wang, Guangzhi Li, Jennifer Yates, Charles.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Domain decomposition in parallel computing Ashok Srinivasan Florida State University COT 5410 – Spring 2004.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Lecture 15. IGP and MPLS D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
Wireless Sensor Networks COE 499 Energy Aware Routing
Rensselaer Polytechnic Institute Rajagopal Iyengar Combinatorial Approaches to QoS Scheduling in Multichannel Wireless Systems Rajagopal Iyengar Rensselaer.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Representing and Using Graphs
On the Cost/Delay Tradeoff of Wireless Delay Tolerant Geographic Routing Argyrios Tasiopoulos MSc, student, AUEB Master Thesis presentation.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
Palette: Distributing Tables in Software-Defined Networks Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay.
SIMPLE: Stable Increased Throughput Multi-hop Link Efficient Protocol For WBANs Qaisar Nadeem Department of Electrical Engineering Comsats Institute of.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Types of Algorithms. 2 Algorithm classification Algorithms that use a similar problem-solving approach can be grouped together We’ll talk about a classification.
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
Author: Haoyu Song, Murali Kodialam, Fang Hao and T.V. Lakshman Publisher/Conf. : IEEE International Conference on Network Protocols (ICNP), 2009 Speaker:
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
An Implementation Framework for Trajectory-Based Routing in Ad-Hoc Networks Murat Yuksel, Ritesh Pradhan and Shivkumar Kalyanaraman Rensselaer Polytechnic.
Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaraman
Auburn University COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs (cont.) Dr. Xiao.
ISP and Egress Path Selection for Multihomed Networks
Types of Algorithms.
Statistical Optimal Hash-based Longest Prefix Match
Types of Algorithms.
TCP in Mobile Ad-hoc Networks
Design of Hierarchical Classifiers for Efficient and Accurate Pattern Classification M N S S K Pavan Kumar Advisor : Dr. C. V. Jawahar.
XML indexing – A(k) indices
Types of Algorithms.
Presentation transcript:

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland1 On the Packet Header Size and Network State Tradeoff for Trajectory-Based Routing in Wireless Networks Rajagopal Iyengar Rensselaer Polytechnic Institute, ECSE Dept., Networks Lab Murat Yuksel University of Nevada-Reno, CSE Department

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland2 Talk Outline Trajectory-Based Routing (TBR) revisited Overview Long/complex trajectories – SINs Problem Definition Motivation Contributions Optimization Formulation Hardness Heuristics Future Work

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland3 Overview of TBR So, how does it work? What happens when a packet travels in the network? S D DATA Use parametric curves (e.g. Bezier, B-spline) for encoding.

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland4 Long/Complex Trajectories How to encode long/complex curves? longer curve  larger packet header IP 1 IP 2 Split the curve into simpler pieces: Each piece could be represented by a cubic Bezier curve The complete trajectory is concatenation of the pieces. Source performs signaling and sends a control packet that include: end locations of the cubic Bezier curves, i.e. Intermediate Point (IP) all the control points The nodes closest to the IPs will be the Special Intermediate Nodes (SINs). D S I1I1 I2I2

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland5 Long/Complex Trajectories How to encode long/complex curves? longer curve  larger packet header IP 1 IP 2 D S I1I1 I2I2 SINs (i.e. I 1, I 2 ) do special forwarding. Store the next Bezier curve’s control points Update the packet headers with that of the next Bezier curve’s control points C1 C2 C3 C4 C5 C6 S D C5 C6 C3 C4 IP 2 S D

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland6 Problem Definition Application-specific goals may require different levels of accuracy in trajectory Accuracy is affected by the selection of: # of SINs – network state size # of bits to encode each trajectory piece – packet header size Representation accuracy of each piece – error in the encoded trajectory Tradeoff: Packet header size vs. network state vs. representation accuracy A similar tradeoff was studied between MPLS stack depth and label sizes [Gupta et. Al., INFOCOM’03]

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland7 Problem Definition Overall problem: What can we say about the relationship between: Packet header size Network state size Accuracy of curve representation Goal: accurate representation of a trajectory with the objective of minimizing the cost incurred due to header size and network state

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland8 Illustrative Example The simplest representation of a trajectory: straight line Negative: High error in representation accuracy. Positive: Small network state. Small packet header. These become higher when “error” needs to be bounded.

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland9 Illustrative Example Each piece can be represented by different choice of basic representation units, each causing different amount of error to the representation of the complete trajectory.

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland10 Contributions Provide insight into the relationship between packet header size, network state and accuracy of representation Generic optimization formulation for trajectory optimization when provided with a set of encoding/decoding options. Show hardness of problem and provide initial heuristics which can work well for certain classes of problem instances.

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland11 System Model K choices for representing each piece of the trajectory (r 1,…,r k ) (‘colors’ from a ‘palette’) Network state is maintained at points along the trajectory which divide the curve into portions which are represented using the r i Trajectory is discretized using m equally spaced points Binary valued matrix Q(m,n) used to represent which color from the palette is used on a given portion of the curve If some r i selected, then a subroutine to compute error e(Q i,j,r i ) is utilized. Deviation area, Normalized length Header overhead cost C p and network state C N associated with approximation selected for each portion of the curve.

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland12 Equivalent Graph Representation of Discretized Trajectory

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland13 Optimization Formulation k – # of representation choices m – # of points where split can be done due to discretization Network state cost. Application- specific error bound. Max of 1 representation per splitting point. Maps to Constrained-Shortest Path Problem, i.e. NP-Complete. Packet header cost.

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland14 Why different than “curve compression”? One might ask: Why is this different than the curve compression algorithms in computational geometry? Packet header cost – a new dimension to the curve compression algorithms. Curve Compression: minimize the number of line segments matching a target error requirement.

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland15 Form of Objective Function Objective function captures packet header and network state costs, C p and C N. C p in reality could be a function of battery power at a node, since transmission of long packets causes greater power consumption. C N could be a function of available buffer space at a node, for example, sensor networks where simple, resource constrained nodes are used.

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland16 Trajectory Partitioning Heuristic Split the trajectory in half Start with an error bound E. Try representing each piece within the leftover error tolerance E/2 If so, deduct the error of this piece from E If not, keep halving each piece until it is possible to represent within the leftover error tolerance Positive: Uses the error budget as much as possible Negative: The later (or earlier depending on design) pieces will have higher error in representation

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland17 Equal Error Heuristic Select the number of SINs: m’ Allow each piece to use have a maximum error of: E/m’ Positive: Better balanced approximation is likely Negative: m’ can be significantly suboptimal

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland18 Future Work Comparison of heuristics with the optimal solution based on exhaustive search. Better heuristics Distributed solutions to the problem are needed

September 12, 2006IEEE PIMRC 2006, Helsinki, Finland19 Thank you! THE END