Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.

Slides:



Advertisements
Similar presentations
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Advertisements

Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Topic: Routing and Aggregation An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks (Li,Peng,Chu-
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Coping with Communication Gray Zones in IEEE b based Ad hoc Networks, H. Lundgren, E. Nordström, and C. Tschudin Anne Saaranen.
1-1 Topology Control. 1-2 What’s topology control?
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Scalable and Distributed GPS free Positioning for Sensor Networks Rajagopal Iyengar and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute.
Power saving technique for multi-hop ad hoc wireless networks.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Ad Hoc Wireless Routing COS 461: Computer Networks
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Mobile Routing protocols MANET
Presented by Fei Huang Virginia Tech April 4, 2007.
Presented by Chaitanya Nemallapudi Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks Lap Kong.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
ODMRP (On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks ) Sung-Ju Lee William Su Mario Gerla Presented By: Meenakshi Bangad.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
FAR: Face-Aware Routing for Mobicast in Large-Scale Sensor Networks QINGFENG HUANG Palo Alto Research Center (PARC) Inc. and SANGEETA BHATTACHARYA, CHENYANG.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
Self-stabilizing energy-efficient multicast for MANETs.
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Structure-Free Data Aggregation in Sensor Networks.
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Analysis the performance of vehicles ad hoc network simulation based
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Multi-Hop Broadcast from Theory to Reality:
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Speaker : Lee Heon-Jong
Presentation transcript:

Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya

NICTA Copyright 2010From imagination to impact 2 Outline Introduction Related Work Our Main Ideas Tree-Based Double-Covered Broadcast (TreeDCB) Evaluation Conclusions and Future Work

NICTA Copyright 2010From imagination to impact 3 Introduction Smartphones with WiFi interfaces are becoming popular, enabling the formation of ad hoc networks in a crowd (e.g., in a stadium or concert event). Typical applications in such ad hoc networks are the broadcast of multimedia streams and contents among the smartphones.

NICTA Copyright 2010From imagination to impact 4 Introduction (cont’d) A key component for these broadcast applications is a broadcast routing protocol.

NICTA Copyright 2010From imagination to impact 5 Introduction (cont’d) Most of the existing protocols let their nodes maintain k-hop (k ≥ 2) neighborhood information. To realize this, a node needs to include the (k- 1)-hop information in its periodical Hello packets. In the crowd scenario where each node has many neighbors, Hello packets become considerably long. This paper proposes a broadcast routing protocol that uses fixed length Hello packets.

NICTA Copyright 2010From imagination to impact 6 Our Main Ideas TreeDCB uses the basic shortest path tree technique to build a spanning tree with source node as the root –The Hello packets in TreeDCB only carry a constant amount of information When a node selects its parent, the neighbor that has the greatest number of children is chosen –This reduces the number of parents in the tree. A non-parent node volunteers to be a forwarding node if it hears no forwarding nodes from its upstream and sibling nodes other than its parent –This ensures double coverage

NICTA Copyright 2010From imagination to impact 7 Our Main Ideas (cont’d) Fixed-length Hello packets are desired The number of broadcasting nodes should be kept small The broadcast redundancy can be highly utilized Though our ideas are simple, they suit the characteristics of dense wireless networks:

NICTA Copyright 2010From imagination to impact 8 Related Work Most of the existing protocols with k-hop (k ≥ 2) neighborhood information are based on the concept of connected dominating set (CDS). For a graph G(V, E), a CDS is a subset of V, such that –The nodes in this subset are connected –Each node in V is either in this subset or connected to at least one node in this subset The basic idea of these protocols is to find a CDS among all the nodes and only let the nodes in CDS broadcast. –The number of broadcasting nodes is reduced. –A packet can still reach every node in the network.

NICTA Copyright 2010From imagination to impact 9 Related Work (cont’d) Among those CDS-based protoocls, the Double Covered Broadcast (DCB) protocol inspires our work In DCB, when a node v forwards a packet, it selects a subset of its 1-hop neighbors as the forwarding nodes with the constraints that –The selected forwarding nodes cover all the 2-hop neighbors of node v –The 1-hop neighbors of node v are either selected as forwarding nodes or covered by at least two forwarding nodes (e.g., once by node v itself and once by one of the selected forwarding nodes) –The number of forwarding nodes is minimized

NICTA Copyright 2010From imagination to impact 10 Differences between DCB and TreeDCB DCBTreeDCB Each node includes its 1-hop neighbor list to its Hello packets, so the Hello packets can be very long Each node only includes constant amount information in the Hello packets A node attaches the IDs of its selected forwarding nodes to every data packet it forwards, which increases the control overhead A node decides whether is a forwarding node by its own, adding no control overhead to a data packet Any node can be the source node A single source node is assumed to lower the control overhead

NICTA Copyright 2010From imagination to impact 11 Tree-based Double-Covered Broadcast (TreeDCB) Roles of a node Hello packet format Protocol description Some discussions on TreeDCB

NICTA Copyright 2010From imagination to impact 12 Roles of a node Parent node: a node that has children in the current tree topology. A parent serves as a forwarding node. Volunteer node: a node that has no children in the current tree topology but volunteers to be a forwarding node. Leaf node: a node that has no children in the current tree topology and is not a volunteer node.

NICTA Copyright 2010From imagination to impact 13 Hello Packet Format Src-ID: the ID of the source node, which indicates the root of the tree. Self-ID: the ID of the sender. Cost: the shortest path length (in number of hops) from the source to the sender. Num-Children: if this field is larger than 0, it indicates the sender is a parent node and it gives the number of children that the sender has. If this field equals 0, it indicates the sender is a leaf node. If this field equals -1, it indicates the sender is a volunteer node. Parent-ID: The ID of the sender’s parent node in the current SPT. Src-ID Parent-ID Num-Children Self-ID Cost

NICTA Copyright 2010From imagination to impact 14 Protocol description Each node periodically broadcasts Hello packets to its 1-hop neighbors. During the exchange of Hello packets with its neighbors, a node updates the Cost, Num- Children, and Parent-ID fields in its own Hello packet.

NICTA Copyright 2010From imagination to impact 15 Protocol description (cont’d) The updating rules are as follows. Cost: The source node always sets its Cost value to 0. A non-source node sets its Cost to minCost + 1. –minCost is the smallest Cost value in the Hello packets it receives. Num-Children: A node v counts how many neighbors send Hello packets carrying the ID of node v in their Parent-ID fields. Parent-ID: A node selects its parent by checking which neighbor has the least Cost value. –If several neighbors have the same least Cost value, the tie is broken by first favoring a larger Num- Children value and then by a larger Self-ID.

NICTA Copyright 2010From imagination to impact 16 Protocol description (cont’d) If node v is a parent node, it serves as a forwarding node. Else, v decides whether to be a volunteer node by examining its neighbors with Costs less than or equal to v’s. –If there are more than one parent nodes among these neighbors, v knows that it is covered at least twice and will not volunteer. –Otherwise, if there is another volunteer neighbor with its ID larger than v’s, v will not volunteer either. –Node v only volunteers when it hears no volunteer node with ID larger than v’s, thus avoiding duplicate volunteer nodes. Determine whether to be a forwarding node:

NICTA Copyright 2010From imagination to impact 17 Protocol description (cont’d)

NICTA Copyright 2010From imagination to impact 18 Some discussions on TreeDCB (1) Assuming a single source enables low communication and computation overhead, but causes that the established tree is only optimized for this single source in terms of path length. When additional sources exist, the tree built for the given source can still be used to forward packets for other sources, since this tree is a spanning tree. If minimizing the path length is a primary goal of applications, building multiple trees for multiple sources is an alternative.

NICTA Copyright 2010From imagination to impact 19 Some discussions on TreeDCB (2) In building the tree, the time when a node finds out its Cost (number of hops) is affected by the Cost itself and the period of sending Hello packets. In our implementation, we apply the optimization technique that when a node sees a smaller Cost, it sends its Hello immediately instead of waiting until the next Hello period, thus the tree can be established much faster. So the convergence will not be a problem for TreeDCB.

NICTA Copyright 2010From imagination to impact 20 Evaluation Experiment setup Ratio of forwarding nodes Amount of control traffic Packet delivery ratio Average path length of a packet We implemented TreeDCB in ns-2. For comparison, we also implemented DCB. We made our source codes available to the public at

NICTA Copyright 2010From imagination to impact 21 Experiment Setup MAC layer protocol: the IEEE Physical layer propagation: the Two Ray Ground model. Node mobility: the random waypoint (RWP) model. We place nodes in a square area with a uniform distribution. The transmission range of all nodes is set to be 250m. Since all nodes have identical transmission range, the resulting network topology is a unit disk graph (UDG).

NICTA Copyright 2010From imagination to impact 22 Experiment Setup (cont’d) To offer an idea about the node connectivity at different node densities, we measured the average node degrees of the UDGs obtained at the transmission rage of 250m. Node densityAverage node degree

NICTA Copyright 2010From imagination to impact 23 Experiment Setup (cont’d) We consider the impact of mobility level, node density, number of nodes, and source packet rate. To evaluate the impact of one parameter, we vary the value of this parameter and use the default values for the other parameters. Number of node in the network100 Maximal node speed in RWP model2.8m/s Node Density150 nodes/km 2 Bandwidth2Mbps CBR Source Packet Rate40 pkts/s Data Packet Length200 bytes Period of sending Hello packet0.5s Simulation Time150s Confidence Interval95% Number of Trials50

NICTA Copyright 2010From imagination to impact 24 Ratio of forwarding nodes The ratio of forwarding nodes is defined as the number of nodes doing the broadcast divided by the total number of nodes in the network. The ratio of forwarding nodes at different node densities.

NICTA Copyright 2010From imagination to impact 25 Ratio of forwarding nodes (cont’d) The ratio of forwarding nodes at different mobility levels.

NICTA Copyright 2010From imagination to impact 26 The amount of control traffic The Hello packet lengths at different node densities.

NICTA Copyright 2010From imagination to impact 27 Packet delivery ratio The packet delivery ratio is defined as the ratio of the total number of packets received by all nodes versus the total number of packets to be received by all nodes. Packet delivery ratio at different node densities.

NICTA Copyright 2010From imagination to impact 28 Packet delivery ratio (cont’d) Packet delivery ratio with different number of nodes.

NICTA Copyright 2010From imagination to impact 29 Average path length of a packet The average path length of a packet is defined as the average length of all the paths that this packet traverses to reach all the nodes in a network. Average path length of a packet at different node densities.

NICTA Copyright 2010From imagination to impact 30 Average path length of a packet (cont’d) Packet path lengths with different number of nodes.

NICTA Copyright 2010From imagination to impact 31 Conclusions TreeDCB uses fixed-length Hello packets and guarantees that each node v is either a forwarding node or covered by at least two forwarding nodes. Based on the basic technique of shortest path tree building, TreeDCB introduces two new techniques to improve the selection of forwarding nodes: –It selects parent nodes in the tree by examining which one has the greatest number of children, thus significantly reducing the number of parent nodes. –A leaf node will volunteer to be a forwarding node if it hears no forwarding nodes other than its parent, thus ensuring double coverage for non-forwarding nodes.

NICTA Copyright 2010From imagination to impact 32 Thank you! Questions and Comments?