Presented by : Joseph Gunawan.  To get the optimal transmission radius for broadcasting using the energy as minimal as possible while it still guarantees.

Slides:



Advertisements
Similar presentations
Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Advertisements

Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Chapter 5: Tree Constructions
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
Self Stabilizing Algorithms for Topology Management Presentation: Deniz Çokuslu.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Wireless Broadcasting with Optimized Transmission Efficiency Jehn-Ruey Jiang and Yung-Liang Lai National Central University, Taiwan.
1 Complexity of Network Synchronization Raeda Naamnieh.
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
Differentiated Surveillance for Sensor Networks Ting Yan, Tian He, John A. Stankovic CS294-1 Jonathan Hui November 20, 2003.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Results Showing the potential of the method for arbitrary networks The following diagram show the increase of networks’ lifetime in which SR I =CR I versus.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Efficient and Reliable Broadcast in ZigBee Networks Purdue University, Mitsubishi Electric Lab. To appear in SECON 2005.
The Zone Routing Protocol (ZRP)
Minimal Spanning Trees What is a minimal spanning tree (MST) and how to find one.
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
David S. L. Wei Dept of Computer and Information Sciences Fordham University Bronx, New York Szu-Chi Wang and Sy-Yen Kuo Dept of Electrical Engineering.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Efficient Backbone Construction Methods in MANETs Using Directional Antennas 1 Shuhui Yang, 1 Jie Wu, 2 Fei Dai 1 Department of Computer Science and Engineering.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
1 G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science and.
BROADCASTING TECHNIQUES IN AD-HOC NETWORKS A survey on Shubham Bhat Surendra Shenoy References: 1.“
TDMA scheduling algorithms for WSN Speaker: Chan-Yu Tsai Advisor: Dr. Ho-Ting Wu Date: 2015/5/6.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Topology Control –power control
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
Net 435: Wireless sensor network (WSN)
Topology Control and Its Effects in Wireless Networks
The Network Layer Network Layer Design Issues:
Introduction Wireless Ad-Hoc Network
Presentation transcript:

Presented by : Joseph Gunawan

 To get the optimal transmission radius for broadcasting using the energy as minimal as possible while it still guarantees a total coverage of the network.

 Ad hoc networks are autonomous and decentralized networks.  Communication within ad hoc networks normally occurs over a radio channel.  Communication ranges are restricted and only close nodes can communicate to each other.

 Therefore, many nodes must retransmit the packet to obtain a total coverage of the network.  Broadcasting is the simple way to do the communication, which each host relays once the message.  “Blind Flooding” is the easiest one to be implemented.  Unfortunately, “Blind Flooding” leads to a huge and useless energy consumption.  A lot of redundant packets are generated.  Wasting the power.

 Energy consumption becomes such of problem on broadcasting.  Minimizing the energy consumption used to transmit and receive the packets is known to be NP-complete.  Centralized network is most likely needed.  But, as mobility or changes in activity status cause frequent changes in network topology, centralized network does not work well.  Therefore, localized protocols are considered in which nodes make decisions based solely on the knowledge of their 1-hop (direct neighbors).

 Energy consumption depends on transmission ranges.  Therefore, to minimize energy consumption is to use radii as small as possible at each node.  However, there is an additional constant C to the consumption, regardless of the chosen radius, such as minimal power needed for correct signal processing.

 Considering this, minimizing the energy consumption at each node my not be an optimal behavior.  Because small radii require more nodes to participate in the broadcasting process to cover a given area. This may lead to an increased global energy consumption, although each node has tried to minimize its own consumption.

 Therefore, the paper presents the concept of an optimal transmission radius using two localized broadcasting protocols:  TR-LBOP (Target Radius LMST Broadcast Oriented Protocol), which the subset of the neighbor network can be reduced using a neighbor elimination scheme (needed radii are modified to fit the desired value whenever it is possible),  TRDS (Target Radius and Dominating Sets – based protocol), which adapts the network topology and computes a connected dominating set so that the distance between direct dominant neighbors is as near as possible to the optimal radius.  Radius can be theoretically computed using a hexagonal tiling of the network area.

 Ad hoc network is represented by a graph G = (V, E).  V is the set of nodes (the mobiles)  E C V 2 is the set of edges that gives the available communications.  (u, v) belongs to E means that v is a physical neighbor of u, i.e., u can directly send a message to v.  If the maximum range of communication (R) is the same for all vertices and d(u, v) is the Euclidean distance between u and v, E will be defined as the followings:

 Each node u € V is assigned a unique value to be used as an identifier (id), so that the identifier of u is denoted by id(u).  The neighborhood set N(u) of a vertex u is defined as:  The size of this set, |N(u)|, is also known as the degree of u.  The density of the graph is the average degree for each node.  The position information about their neighbors are needed to minimize energy when broadcasting.  To announce the node’s position, special short messages named HELLO messages could be used.  To find their position, nodes may use a location system like the GPS.

 Packets are assumed to be in the same size (number of bits).  The measurement of the energy consumption of network interfaces when transmitting a fixed size message depends on the range of the emitter u:  r(u) being the transmitting range of u.  Ce a constant that represents an overhead due signal processing.  Not only transmitting, when nodes receive a packets, they also consume some energy.  This consumption Cr is constant, regardless of the distance between the emitter and the receiver.  It is generally defined as:  Cr = 1/3 * (100 α + c e )

 Two distinguished families have been proposed to replace the “Blind Flooding” method.  Reducing the number of needed emissions on obtaining a total coverage  Adjusting the radius with suitable hardware to further reduce energy consumption.  Omni-directional antennas, which is a single transmission is received by all the neighboring nodes located within selected transmission range are considered.

 MPR (Multipoint Relay Protocol) is the most popular protocol for the family.  It is a greedy heuristics which makes nodes select their own relays before retransmitting.  This selection, which is forwarded with the broadcasting packet, is composed of an optimal subset of direct neighbors that entirely covers the 2-hop neighborhood.  Nodes that receive this packet, but have not been selected, do not relay it.

 The NES (Neighbor Elimination Scheme) was also independently proposed, where nodes do not relay the message immediately, but monitor their physical neighborhood for a given time.  Each neighbor that receives a copy of the same message is eliminated from an internal uncover neighbors list.  If this list becomes empty before the timeout occurs, the retransmission is cancelled.  Therefore, broadcasting protocols are based on the computation of a subset of V, denoted by V dom, which satisfied two properties:  All nodes in V either belong to V dom or are directly connected to a node in V dom (i.e.,V dom U N (V dom ) = V ). Such a subset is a dominating one.  It is connected (i.e., there exists a path between any two nodes in V dom ).

 Even if a global knowledge of the network is provided, finding the smallest possible CDS is a NP- complete.  Therefore, localized algorithm such as Generalized Self Pruning Rule is introduced.  This algorithm computes an efficient connected dominating set by using solely the knowledge of the physical neighborhood, which requires the exchanging on several messages to inform their status at various stages of the protocol.  But, the protocol was modified so that each node can decide whether or not it is in dominating set without exchanging any messages with neighbors.

 The computation of a connected subgraph of the original network graph G is normally being used to adjust transmission radii.  Edges of the considered subgraph are used to determine communication radii.  The following three subgraphs are used:  MST (Minimum Spanning Tree), which is a tree connecting all nodes whose total edge weight is minimized.  The RNG (Relative Neighborhood Graph), which removes the longest edge of any triangle in the graph and has an average degree of 2.6.  The LMST (Local Minimum Spanning Tree), in which nodes compute the MST of their physical neighbors and keep only edges that are selected by both endpoints in their respective MSTs. It has an average degree of 2.04.

 It can be noticed that only the MST requires centralized protocol: The knowledge of the whole topology of the network is required for its computation.  The RNG can be locally computed without requiring any message exchange.  The computation of LMST requires one message from each node in order to remove asymmetric links.

 Each node, in MST, chooses a radius that covers only neighbors within the set.  Since, by its construction, this graph is connected, the new graph derived from this range assignment is also always connected.  This method offers good performance (except for very dense networks), but is costly for implementation in ad hoc networks because of centralized computation of MST.  Other protocols that use locally defined graphs instead of the MST have since been proposed:  The protocol RBOP (RNG Broadcast Oriented Protocol) uses the RNG  LBOP (LMST Broadcast Oriented Protocol) uses the LMST.

 A centralized protocol named BIP (Broadcast Incremental Power) is also defined.  BIP constructs from a source node a broadcasting tree that spans the network.  Nodes are added one by one to the tree by choosing the less expensive action: Either a node that is already emitting increases its radius or a node that is not emitting starts a new transmission.  The “price” of an action is the additional power needed to cover one more node.  A node cancels its transmission if it notices that the circle covered by its transmission is completely inside another circle covered already by a transmitting neighbor.

 The algorithm proposed to minimize transmission energy needed to cover the network is inversely proportional to the (square of the) range used (r α + C).  Therefore, for large C, many transmissions over short edges are energy consuming due to multiplies of C.  Large radius also causes large power consumption.

 Now, consider a rectangular area S on which some emitting nodes are to be placed.  These nodes will have to perform a flooding, so that the whole area will be covered.  A hexagonal tiling, the area is divided into several hexagons, is chosen as the placement of the emitting nodes.  Obviously, the distance between emitters should be exactly r to avoid having holes and “useless” nodes.  The quantity of vertices n (i.e., nodes) now depends on the value of r.  The edge length (and also transmission radius) r is a variable.  The goal is to find its value that minimizes overall energy consumption, and consider that value as the network parameter.  Two behaviors can be distinguished here:  Using a high value for r would make nodes cover a large part of the area, thus decreasing the value of n.  On the contrary, using a low value for r would increase the value of n.

 So, the value of r that leads to the minimal energy consumption for the considered flooding.  Knowing the r, we can easily compute the needed quantity of nodes to cover the whole area by computing how many hexagons, denoted by h, fit on our area of surface S:  To tile the area, two nodes have to be placed per hexagon (since each hexagon has six nodes, and each node is common to three hexagons), the number of nodes n is then:

 The consumption of a blind flooding with a transmission radius r can be defined to be:

 Given that α ≥ 2, ce ≥ 0 and r > 0, there are only a few cases to enumerate:

 It clearly shows that the optimal radius r is 100, which is indeed a solution of PC’(r). Below this value, there are too many emitting nodes, making the constant Ce a problem while a greater radius makes the constant α a problem.

 Now, if we consider the energy being consumed when the node receive the message or packet.  Thus, each transmission will be received by a number of neighbors that depend on the area covered by this emission, which itself depends on the chosen radius r.  If d is the original density when using the maximal range R, then the density d(r) when using a radius r is:

 The goal is to decide which nodes should relay the broadcasting message and with which radius.  Two protocols are presented here that make use of a target radius parameter in the designation of relays and radii:  The first one is named TR-LBOP (Target Radius LMST Broadcast Oriented Protocol). Its concept is to compute the minimal needed radius for each node to preserve the connectivity, and to increase it up to the target one whenever it is possible.  The second of is named TRDS (Target Radius and Dominating Set-based protocol). This protocol uses a topology control step to designate dominant nodes as relays with a distance between them as close as possible to the target radius.  Both of them use a parameter “target radius” which goals is to influence the distance between emitting nodes, thus controlling the topology.

 We selected to modify the LBOP protocol for three different reasons:  It is localized.  The Neighbor Elimination Scheme considers only nearest neighbors.  It performs well when compared to centralized protocols like BIP, for graphs that are not very dense.  The principle of LBOP is as follows:  A list of LMST-neighbors that have not received this message is generated by each node that already received the broadcasting message for the first time  It starts to monitor the communications that occur in its neighborhood.  The corresponding node is removed from the list whenever it receives the message.  After a given timeout, two cases can happen: If the list is empty, the retransmission is canceled; otherwise, the message is relayed with the radius needed to cover the furthest neighbor in the list.

 The chosen radii is defined as the following:

 The main idea of this protocol is to reduce radii of nodes down to the target one.  However, restraining radii in a localized manned it not that easy, as connectivity must be preserved.  If nodes uniformly choose 100m as their radius, the resulting network is connected, while it is no longer the case with T=65m. This clearly illustrates the need of some nodes to use a longer radius to preserve the conncetivity.

 In the case for the protocol, to preserve the connectivity, target radius and a locally defined connected graph is used, like RNG and LMST.  Given these elements, the algorithm is divided into three steps:  Adapt the topology of the network so that each node chooses a radius as close as possible to T, while still maintaining the connectivity. This is achieved by constructing the subgraph where each node considers only neighbors in RNG (or LMST) and neighbors whose distance is no greater than the target radius.  Select dominant nodes to relay the message. A CDS is determined using constructed sub-graph. Nodes not selected for CDS may be sent to sleep mode and periodically woken up for sending and receiving messages from associated dominating set nodes, if activity scheduling is also considered.  Perform the broadcasting over this new topology. Nodes in selected CDS remain active and apply TR-LBOP. If all nodes remain active then nodes not selected in dominating set do not retransmit, but impact the decisions of nodes from selected CDS.

 For a node u, the sets of dominant neighbors Nd(u) and nondominant neighbors associated with it Nd’(u) are defined by:  Each node should send a message to its neighbors about its dominating set status in order to determine neighbors in the graph and properly select the target radius.  The broadcasting algorithm proceeds as follows:  A dominant node u that wishes to launch a broadcasting emits its message with the minimal range that covers Nd(u) and Nd’(u).  A nondominant node that wishes to launch a broadcasting emits its message to its nearest (associated) dominant neighbor.  A dominant node u that receives the message rebroadcast it with the range which allows to cover noncovered nodes in Nd(u) and Nd’(u). It does not take into account neighbors that have been covered (according to the knowledge of the node, extracted from messages previously received) when it received the message.  A nondominant node that receives the message never relays it.

 Using C++  Choose: LBOP, as TR-LBOP is based on it and BIP, which is one of the best centralized solutions.  Mobility is not considered  The network is static and is always composed of 300 nodes randomly placed in a square area whose size is computed to obtain a given density.  MAC layer is assumed to be ideal, which is no collision occurs when two nodes emit at the same time.  The initial maximum communication radius R is fixed to 250 meters.  The timeout for the neighbor elimination scheme in TR-LBOP is randomly generated.

 For each measure, 250 broadcasts are launched and for each broadcast, a new connected network is generated.  The average selected density is 50.  Time complexities of algorithms like TRDS with LMST are quadratic in density: Simulation is done with density 100 are about four times slower than those with density 50  Efficiency of a protocol is defined in terms of energy savings, the power consumption can be computed and compared to each other.  A ratio of EER(Expanded Energy Ratio), which represents the energy consumption of the considered protocol compared to the energy that would have been spent by a simple blind flooding for the same network, is computed since the consumption cannot be directly compared as each network is randomly generated for each iteration and protocol.