Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.

Slides:



Advertisements
Similar presentations
Chapter 4 Partition I. Covering and Dominating.
Advertisements

Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
Evolving Graphs & Dynamic Networks : Old questions  New insights Afonso Ferreira S. Bhadra CNRS I3S & INRIA Sophia Antipolis
Tradeoffs between performance guarantee and complexity for distributed scheduling in wireless networks Saswati Sarkar University of Pennsylvania Communication.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Ad-Hoc Networks Beyond Unit Disk Graphs
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
Optimal Sleep-Wakeup Algorithms for Barriers of Wireless Sensors S. Kumar, T. Lai, M. Posner and P. Sinha, BROADNETS ’ 2007.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Symmetric Connectivity With Minimum Power Consumption in Radio Networks G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) A. Zelikovsky (GSU)
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
Dominating Connectivity and Reliability of Heterogeneous Sensor Networks Kenneth Berman Fred Annexstein Aravind Ranganathan.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
CS541 Advanced Networking 1 Static Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/9/2009.
Steiner trees Algorithms and Networks. Steiner Trees2 Today Steiner trees: what and why? NP-completeness Approximation algorithms Preprocessing.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Daniel Baldwin COSC 494 – Graph Theory 4/9/2014 Definitions History Examplse (graphs, sample problems, etc) Applications State of the art, open problems.
Modeling Data-Centric Routing in Wireless Sensor Networks Bhaskar Krishnamachari, Deborah Estrin, Stephan Wicker.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Approximating the Minimum Degree Spanning Tree to within One from the Optimal Degree R 陳建霖 R 宋彥朋 B 楊鈞羽 R 郭慶徵 R
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
Approximation Algorithms
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
Connected Dominating Sets. Motivation for Constructing CDS.
Chapter 6 Relaxation (1) CDS in unit disk graph
NTU IM Page 1 of 35 Modelling Data-Centric Routing in Wireless Sensor Networks IEEE INFOCOM Author: Bhaskar Krishnamachari Deborah Estrin Stephen.
4 Introduction Broadcasting Tree and Coloring System Model and Problem Definition Broadcast Scheduling Simulation 6 Conclusion and Future Work.
Connectivity and Paths 報告人:林清池. Connectivity A separating set of a graph G is a set such that G-S has more than one component. The connectivity of G,
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
© Yamacraw, Fall 2002 Power Efficient Range Assignment in Ad-hoc Wireless Networks E. Althous (MPI) G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) S. Prasad.
Chapter 4 Partition (1) Shifting Ding-Zhu Du. Disk Covering Given a set of n points in the Euclidean plane, find the minimum number of unit disks to cover.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Self-stabilizing energy-efficient multicast for MANETs.
Maximal Independent Set and Connected Dominating Set Xiaofeng Gao Research Group on Mobile Computing and Wireless Networking Univ. of Texas at Dallas.
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
Fundamentals of Computer Networks ECE 478/578
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
Delay-Tolerant Networks (DTNs)
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
Clustering TexPoint fonts used in EMF.
Robustness of wireless ad hoc network topologies
Connected Dominating Sets
Robustness of wireless ad hoc network topologies
Coverage Approximation Algorithms
Introduction Wireless Ad-Hoc Network
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Connected Sensor Cover Problem
On Constructing k-Connected k-Dominating Set in Wireless Networks
Survey on Coverage Problems in Wireless Sensor Networks
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
at University of Texas at Dallas
Presentation transcript:

Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006

2 Wireless Ad Hoc Networks  A collection of mobile nodes  Dynamically form a temporary network

3 Wireless Sensor Networks (WSN)  Consists of a large number of sensor nodes  Main Tasks: collaborate to sense, collect, and process the raw data of the phenomenon and transmit the processed data to sinks Sensing Area phenomenon User1 Sinks Internet / Satellite Wireless Sensor network User2

4 Applications  Military applications  Environmental applications  Health applications  Other commercial applications Heath Monitor Emergency Responses

5 Characteristics of Wireless Ad Hoc Networks  Dynamic topology – no predefined or fixed infrastructure  Multi-hop routing – each node is a router  Limited resources – battery power, CPU, storage, and bandwidth Routing decision is challenging!

6 Physical Layer Virtual Layer Virtual Backbone

7 Virtual Backbone Features  Minimize the virtual backbone nodes  All virtual backbone nodes are connected  Each node is either in or adjacent to the backbone  Approximated by Minimum Connected Dominating Set (MCDS)

8 Definitions  Given a graph G=(V,E) and a subset C V. C is:  Dominating Set (DS): for any v V, v C or adjacent to some u C  Connected Dominating Set (CDS): C is a DS and an induced graph of C is connected  Minimum Connected Dominating Set (MCDS): C is a CDS and has the smallest size

9 Approximation Algorithms  An algorithm that returns near-optimal solutions in polynomial time  Performance Ratio (PR):  Minimization problem: |C|/|C*| where:  C is a near-optimal MCDS  C* is the optimal MCDS  Smaller PR, better algorithm

10 Homogeneous Networks What if all nodes have the same transmission ranges? Can we design a constant approximation algorithm?

11 Unit Disk Graphs (UDG)  UDG: is an intersection graphs of circles of unit radius in the plane  Lemma 1: Each node in a UDG has at most 5 independent neighbors

12 Maximal Independent Set (MIS) Maximal Independent Set (MIS) is a maximal set of pairwise non-adjacent nodes. MIS DS

13 Algorithm 1 - Overview  Phase 1: Construct an MIS such that:  Lemma 2: Any pair of complementary subsets of the MIS separate by exactly two hops  Phase 2: Connect MIS CDS

14 Algorithm 1 – Phase 2  Goal: Connect an MIS by adding the minimum number of blue nodes where:  Blue Nodes: Nodes connecting black nodes  Black-blue component: a connected component of the sub-graph induced only by black and blue nodes Component 1 Component 2

15 Input: An MIS:  All nodes in MIS are black  Others are grey for i=5, 4, 3, 2 do while there exists a grey node adjacent to at least i black-blue components do change its color from grey to blue re-construct the black-blue components return all black and blue nodes Algorithm 1 – Phase 2 (cont)

16 Algorithm 1 – An Example

17 Algorithm 1 - Analysis  Theorem 1: Algorithm 1 has a performance ratio of ln 4 < 8  Lemma 3: |MIS| ≤ 3.8|C*|  Lemma 4: #Blue Nodes ≤ (2 + ln4)|C*|

18 Fault Tolerance What if a virtual backbone node is dead? What if a link in the virtual backbone is broken?

19 2-CDS  Problem Definition:  Given a UDG G=(V,E)  Find a CDS C satisfying:  |C| is minimum  For any pair of nodes in C, there exists 2-disjoint paths

20 Algorithm 2 - Overview  Phase 1: Construct a CDS C  Phase 2: Augment C to obtain a 2-CDS

21 Algorithm 2 – Phase 2  Cut-vertex: x is a cut- vertex if G-{x} is disconnected  Block: a maximal subgraph of G without cut-vertices  Leaf Block: a maximal subgraph of G with exactly 1 cut-vertex

22 Algorithm 2 – Phase 2 (cont) while C has more than 1 blocks do L = Leaf Block Find a shortest path P = ux i v where v L, v is not a cut- vertex, u C \ L, and x i V \ C color x i blue end while return all black and blue nodes x1x1 xixi

23 Theoretical Analysis  Theorem 2: Algorithm 2 has a constant performance ratio of 62

24 Simulation Experiments  Randomly deployed nodes into 1000 x 1000 m 2 region  Transmission range = 200 m  Each setting, ran 1000 times Algorithm 2 improves the fault tolerance of virtual backbone with only marginal extra overhead

25 More Challenging What if networks have unidirectional links and different transmission ranges? Can we design a constant approximation algorithm?

26 Heterogeneous Networks  Model networks as Disk Graphs:  Each node has a transmission range in [r min, r max ]  A directed edge from u to v iff d(u,v) ≤ r u  Bidirectional Links and Unidirectional Links

27 Unidirectional Links  Directed graph G = (V, E)  Strongly Connected Dominating Set (SCDS):  Given a directed graph G = (V, E)  Find a subset C V such that:  v V, v C or there exists a node u C such that uv E  The subgraph induced by C is strongly connected, i.e, there exists a directed path for any pair of nodes in C

28 SCDS – An Example

29 Greedy Algorithm 3 - Overview  Phase 1: Construct a DS D  Phase 2: Connects all nodes in D to form a SCDS C

30 Algorithm 3 – Phase 1 while there exists a white node do select a white node u with the biggest transmission range color u black color all N + (u) grey end while return all black nodes u

31 Algorithm 3 – Phase 2  Goal: Connect a DS D by adding the minimum number of blue nodes  Let u D s.t. u has the largest transmission range  Build a Minimum nodes Directed Tree (MDT) T 1 rooted at u s.t. there is a directed path from u to all other nodes in D  Construct G’ from G by reversing the directed edges  Build a MDT T 2 rooted at u  All nodes in the union of T 1 and T 2 form a SCDS C

32 Minimum nodes Directed Tree (MDT)  Given a directed graph G = (V, E), a subset D of V, and a node u  Find a tree T rooted at u such that:  There exists a directed path from u to all nodes in D  The total number of nodes in T but not in D, called blue nodes, is minimum

33 An MDT Algorithm  Denote:  All nodes in D are black  All nodes in T \ D are blue  Other nodes are grey  v-spider: A directed tree having:  one grey node v as a root  other nodes are either black or blue  there is a directed path from v to all other nodes in the spider u v

34 An MDT Algorithm (cont)  Contracting Operation:  Add a directed edge from v to all grey nodes that are outgoing neighbors of blue and black nodes in v-spider  Delete all black and blue nodes and their edges  Color v blue u v u v Contracting

35 An MDT Algorithm - Description while no directed paths from u to D in T do Find a v-spider that has the most number of blue and black nodes Contract this v-spider Construct T from the set of black and blue nodes end while

36 Algorithm 3 - Analysis  Theorem 3: The size of any DS is upper bounded by:  Theorem 4: Algorithm 4 has a performance ratio of

37 More Work  k-connected m-dominating set  In the presentation: 2-connected 1-dominating set  k-connected m-dominating set in heterogeneous networks

38 Thank You! Any Questions?

39 Benefits of Virtual Backbone  Only a subset of nodes (virtual backbone nodes) relay messages:  Reduce communication cost  Reduce redundant traffic  Conserve energy Broadcast

40 Benefits of Virtual Backbone (cont) B A CD A  B ? A:  B: C: D:  A  B ? A: B:  C:  D:  A  B  Only a subset of nodes maintain routing tables  Routing information localized  Save storage space Unicast