A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.

Slides:



Advertisements
Similar presentations
ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
Advertisements

An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
CS3771 Today: deadlock detection and election algorithms  Previous class Event ordering in distributed systems Various approaches for Mutual Exclusion.
Scalable Content-Addressable Network Lintao Liu
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
A Unified View to Greedy Routing Algorithms in Ad-Hoc Networks
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Paper By : Ram Ramanathan, Regina Resales-Hain Instructor : Dr Yingshu Li.
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
MOBILITY SUPPORT IN IPv6
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
P2P Course, Structured systems 1 Introduction (26/10/05)
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Ad Hoc Wireless Routing COS 461: Computer Networks
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Prophet Address Allocation for Large Scale MANETs Matt W. Mutka Dept. of Computer Science & Engineering Michigan State University East Lansing, USA IEEE.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
Locating Mobile Agents in Distributed Computing Environment.
1 A Distributed Architecture for Multimedia in Dynamic Wireless Networks By UCLA C.R. Lin and M. Gerla IEEE GLOBECOM'95.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
CSC 311 CHAPTER TEN CONNECTING NETWORKS. CSC 311 We have looked at several different network topologies Why do we have different types of networks? Why.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Connected Dominating Sets. Motivation for Constructing CDS.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
A correction The definition of knot in page 147 is not correct. The correct definition is: A knot in a directed graph is a subgraph with the property that.
Ad Hoc Positioning System (APS)
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Paper By : Ram Ramanathan, Regina Resales-Hain Slides adapted from R. Jayampathi.
Void Traversal for Guaranteed Delivery in Geometric Routing
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
SocialVoD: a Social Feature-based P2P System Wei Chang, and Jie Wu Presenter: En Wang Temple University, PA, USA IEEE ICPP, September, Beijing, China1.
Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Voronoi Overlay Networks Pavel Skvortsov.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Operating Systems Network Structures. Topics –Background –Motivation –Topology –Network Types –Communication –Design Strategies Topics –Background –Motivation.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Dewan Tanvir Ahmed and Shervin Shirmohammadi
Presentation transcript:

A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications Research Institute(ACRI), Sharif University of Technology, Tehran, Iran. Distributed Collaborative Virtual Environment Research Lab., University of Ottawa, Ottawa, Canada.

MMVEs and their requirements Virtual worlds where a large number of users distributed all over the Internet can interact with each other in real time. MMVEs must deal with the real-time update message exchange. The large number of users highly motivates the use of distributed architectures where there is no central switching point for the updates.

Geometric routing Aimed to send an update message to a specific coordinate in space, as opposed to sending it to a specific IP address. The use of IP routing would require a node to make a location query to know who is located in its area of effect. Efficiency of geometrical routing is closely related to the structure of the overlay network. The overlay must be a highly dynamic as users frequently join, leave or change their locations. Virtual Environment Geometric Routing Overlay Send to location

Greedy Routing - Motivation Due the highly dynamic characteristics MMVEs, it is almost impossible for the nodes to gather information of all possible locations and available links. Therefore, the use of an online routing method is highly motivated where topology data centralization is not required. Greedy routing Among the simplest and most common routing algorithms that can be used in geometrical routing context. Tries to select the closest available node as the next hop for the packets. Is only supported over a specific family of overlay graphs

Definitions - Voronoi Cell and Delaunay Triangulation Voronoi Cells Partition the plane. Voronoi Cell of each point v i, VC(v i ), is defined as the set of all points in the plane that are closer to v i than any other point. No Overlap Delaunay Triangulation Graph formed from Voronoi Cells Delaunay Triangulation is a graph G=(V, E) where e=(v i, v j ) is in E, iff VC(v i ) and VC(v j ) has a side in common. Points on a plane Voronoi CellsDelaunay Triangulation Graph

Definitions - Vertex Region Consider a graph G = (V, E). For each vertex v i, we define the Vertex Region of v i in graph G, VR G (v i ), as the set of all points in the plane that are closer to v i than to any of its neighbors in G. Arbitrary GraphSet of NodesVertex Region

Necessities of Overlay to support Greedy Routing Theorem 1: Graph G = (V, E) in the Euclidian plane supports greedy routing iff for every node v i in V, VR G (v i ) = VC(v i ). Theorem 2: Graph G = (V, E) in the Euclidian plane supports greedy routing iff for all v i, v j in V, VR G (v i ) ∩ VR G (v j ) = ф. Therefore, in order to support greedy routing, it suffices to connect each pair of nodes that their VR G ’s have a nonempty intersection.

Motivation of RED-BLACK ARCHITECTURE Nodes are usually in movement and they use location update messages for announcing their new locations to the other nodes. BUT: destination nodes may also be in motion. The challenge for the fully distributed topology update is the lack of any fixed points that can be used as landmarks to help the nodes in topology reconstruction after any movement.

The idea of RED-BLACK ARCHITECTURE To deal with this problem/, we divide the nodes into two sets called Red and Black. Nodes of each set send their update messages in one of the update phases. Therefore each set is able to use the other set as its landmark in order to update itself.

Outline of the RED-BLACK ARCHITECTURE This architecture has two graphs in the background, red and black. Red and black graphs have separate updated phases and always will support greedy routing. This architecture also has a main graph on all of the nodes which would be the main overlay of the network. The red and black graphs are used only as a substrate to retain the main graph. Phase Shifted Update Cycles Update Cycle = T seconds Red:0,T,2T,3T, 4T… Black:T/2,5T/2, 7T/2, 3T/2, 9T/2…

Updating Red Graph Using the Black Graph Since there is no single point where all of information required for checking overlaps is located, we need a distributed method. To update the red graph to support greedy routing, the idea is to find the overlaps between vertex regions and connect relevant nodes to eliminate this overlaps. The point is if we connect two nodes, the intersection of their vertex regions would be empty. RED UPDATE CYCLE: 1) Red positions are updated in Red graph Red connections remain Black graph does not change 2) Red nodes notify Black nodes 3) Black nodes check Red graph correctness 4) Main graph is updated

Updating Red Graph Using the Black Graph To maintain greedy routing support in the red graph, the black nodes would be used as the reliable substrate of this distributed method. The specifications of each VR R (v i ) (the vertex region of v i in the red graph) will be sent to all the black nodes whose their VR B (the vertex region in the black graph) has a nonempty intersection with this VR R.

How to disseminate specifications of VR R (v i ) Each red node reminds the nearest black node of itself (named its black owner). During the red update period, each red node sends the specifications of its red vertex region to its previous black owner and asks the black owner to return the message to itself using the black graph. Since the black graph supports greedy routing, this packet will get to the red node’s new black owner.

How to disseminate specifications of VR R (v i ) Upon the reception of every new VR R specification by a black node, the black node propagates the received VR R specification to every black neighbor in the black graph whose VR B ’s common side (or point) has a nonempty intersection with the VR R encapsulated in the message. Theorem 3: With the above method, the message encapsulating VR R (v i ) will be received by a black node iff the black vertex region of it has a nonempty intersection with VR R (v i ).

Vertex Region Overlap Detection If there is an overlap, the overlap will be in the black vertex region of one node, therefore this black node will receive the specifications of both of overlapping vertex regions and will find out the overlap.

Improvement of the Update Algorithm Before propagating the messages in black nodes, every black node checks for the red VR R -s overlap and updates the message contents. Then the message will be broadcasted to neighbors which their black vertex region have common point with this updated VR R.

Update of the main graph Upon the reception of a new VR R (v i ) in each black node, the black node checks the v i as a candidate of neighborhood in the main graph. If candidateship is granted, it sends a neighborhood request message to v i including its own location. The black node also re-computes its main graph in the presence of v i as a new neighbor.

Simulation Results It can be seen that delightfully, the number of nodes in the area has a slight effect on the termination time of the proposed method

Simulation Results Number of messages sent in the resumption algorithm has an approximately linear relation with the number of nodes and thus, average number of messages transmitted by every node is almost constant

Fin. Thank You.