ACSS 2006, T. Radzik1 Communication Algorithms for Ad-hoc Radio Networks Tomasz Radzik Kings Collage London.

Slides:



Advertisements
Similar presentations
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Advertisements

Topic 7 Local Area Networks (LAN)
WSPD Applications.
Joining LANs - Bridges. Connecting LANs 4 Repeater –Operates at the Physical layer no decision making, processing signal boosting only 4 Bridges –operates.
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Broadcasting in UDG Radio Networks with Unknown Topology Yuval Emek, Leszek Gąsieniec, Erez Kantor, Andrzej Pelc, David Peleg, Chang Su, Weizmann Liverpool.
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
LOCALITY IN DISTRIBUTED GRAPH ALGORITHMS Nathan Linial Presented by: Ron Ryvchin.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 668Set 10: Consensus with Byzantine Failures1 CPSC 668 Distributed Algorithms and Systems Fall 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU)
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Ad Hoc and Sensor Networks – Roger Wattenhofer –7/1Ad Hoc and Sensor Networks – Roger Wattenhofer – MAC Theory Chapter 7 TexPoint fonts used in EMF. Read.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 668Set 10: Consensus with Byzantine Failures1 CPSC 668 Distributed Algorithms and Systems Fall 2006 Prof. Jennifer Welch.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
1 Fault-Tolerant Consensus. 2 Failures in Distributed Systems Link failure: A link fails and remains inactive; the network may get partitioned Crash:
Testing of Clustering Noga Alon, Seannie Dar Michal Parnas, Dana Ron.
Breaking the O(n 2 ) Bit Barrier: Scalable Byzantine Agreement with an Adaptive Adversary Valerie King Jared Saia Univ. of VictoriaUniv. of New Mexico.
On the Crossing Spanning Tree Vineet Goyal Joint work with Vittorio Bilo, R. Ravi and Mohit Singh.
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
Dariusz Kowalski University of Connecticut & Warsaw University Andrzej Pelc University of Quebec en Outaouais Broadcasting in Undirected Ad hoc Radio Networks.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 Brief Announcement: Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg: Open University of Israel Moshe Schwartz:
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Adaptiveness vs. obliviousness and randomization vs. determinism Dariusz Kowalski University of Connecticut & Warsaw University Andrzej Pelc University.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
Introduction to Wireless Networks Davide Bilò
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
Approximating the MST Weight in Sublinear Time Bernard Chazelle (Princeton) Ronitt Rubinfeld (NEC) Luca Trevisan (U.C. Berkeley)
Broadcast & Convergecast Downcast & Upcast
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Foundations of Communication on Multiple-Access Channel Dariusz Kowalski.
1 Permutation routing in n-cube. 2 n-cube 1-cube2-cube3-cube 4-cube.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Communication and Computation on Arrays with Reconfigurable Optical Buses Yi Pan, Ph.D. IEEE Computer Society Distinguished Visitors Program Speaker Department.
Artur Czumaj DIMAP DIMAP (Centre for Discrete Maths and it Applications) Computer Science & Department of Computer Science University of Warwick Testing.
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
Andrea CLEMENTI Radio Networks The Model Broadcast.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Distributed Algorithms for Network Diameter David Peleg, Liam Roditty and Elad Tal.
Randomized Algorithms for Distributed Agreement Problems Peter Robinson.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Approximating the MST Weight in Sublinear Time
Lecture 18: Uniformity Testing Monotonicity Testing
MST in Log-Star Rounds of Congested Clique
TexPoint fonts used in EMF.
Introduction Wireless Ad-Hoc Network
Permutation routing in n-cube
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
MAC Theory Chapter 7 TexPoint fonts used in EMF.
Locality In Distributed Graph Algorithms
Presentation transcript:

ACSS 2006, T. Radzik1 Communication Algorithms for Ad-hoc Radio Networks Tomasz Radzik Kings Collage London

ACSS 2006, T. Radzik2 Radio Networks If a node v transmits, then the signal from v goes to all nodes within the range of v. If u listens, then it receives transmission from v if and only if v is the only transmitting node which has u in its range. If u is in the range of more than one transmitting node: collision, no data received (no collision detection). Unknown topology. v x u z y

ACSS 2006, T. Radzik3 Radio Networks If a node v transmits, then the signal from v goes to all nodes within the range of v. If u listens, then it receives transmission from v if and only if v is the only transmitting node which has u in its range. If u is in the range of more than one transmitting node: collision, no data received (no collision detection). Unknown topology. v u b a

ACSS 2006, T. Radzik4 Radio Networks If a node v transmits, then the signal from v goes to all nodes within the range of v. If u listens, then it receives transmission from v if and only if v is the only transmitting node which has u in its range. If u is in the range of more than one transmitting node: collision, no data received. Unknown topology. v u b a

ACSS 2006, T. Radzik5 Broadcasting Initially, a source node has a message M. M source

ACSS 2006, T. Radzik6 Broadcasting Initially, a source node has a message M. We want to distribute message M to all nodes in the network. M M M M M M M M M M M M M M source

ACSS 2006, T. Radzik7 Gossiping Initially, each node i has its own message Mi. M2 M1 M4 M3 Mj Mi M5 Mn

ACSS 2006, T. Radzik8 Gossiping Initially, each node i has its own message Mi. We want to distribute all these messages to all nodes in the network. M1,…, Mn

ACSS 2006, T. Radzik9 Radio Networks – different variants Directed or undirected network Known network, unknown network, or partially known network (for example, each node knows its neighbours) No node labels (anonymous nodes), small node labels – from { 1, 2, …, O(n) }, or large node labels – from { 1, 2, …, O(N) } where N is an independent parameter. Randomized or deterministic protocol Bounded or unbounded messages Collision detection or no collision detection

ACSS 2006, T. Radzik10 Topics 1.Randomized broadcasting in unknown networks and deterministic broadcasting in known networks 2.Deterministic communication in unknown networks a.Selectors or selective families of sets b.Deterministic broadcasting in unknown networks c.Deterministic gossiping in unknown networks.

ACSS 2006, T. Radzik11 Broadcasting Radius-2 networks – Randomized O(log 2 n) protocol – unknown net. – Deterministic O(log 2 n) protocol – known net. – Ω(log 2 n) lower bound General networks – Randomized O(D log(n/D) + log 2 n) protocol (optimal) unknown network – O(D + log 3 n) deterministic and O(D + log 2 n) randomized protocols – known networks

ACSS 2006, T. Radzik12 Broadcasting in radius-2 networks source L1: L2: First round : the source sends the message to all nodes in L1 Subsequent rounds: nodes from L1 try to send the message to the nodes in L2.

ACSS 2006, T. Radzik13 Randomized O(log 2 n) protocol Repeat c log n times following phase for i = 1 to log n do each w in L1 transmits with prob. 2 -i For a v in L2 with degree 2 i-1 ≤ d(v ) < 2 i : P(v gets M in phase r) ≥ P(v gets M in iter. i of phase r ) = d(v) 2 -i (1 – 2 -i ) d(v)-1 ≥ 1/8 P(v doesn’t get M in c log n phases) ≤ 1/n 2 P(all v in L2 get M in c log n phases) ≥ 1-1/n

ACSS 2006, T. Radzik14 Deterministic O(log 2 n) protocol [Chlamtac, Weinstein, 1987] Known network De-randomize by conditional expectations Consider the first phase, iteration i X – { v in L2: 2 i-1 ≤ d(v ) < 2 i } Y – nodes in X which get M in this iteration In randomized algorithm: E|Y| = ∑ { P(v gets M): v in X } ≥ 1/8 |X| In deterministic algorithm: select nodes from L1 for transmission such that |Y| ≥ E|Y| ≥ 1/8 |X|

ACSS 2006, T. Radzik15 Deterministic O(log 2 n) protocol (cont.) At the end of phase 1, the number of nodes in L2 without M is at most (7/8) |L2|. Generally, each phase reduces the number of nodes in L2 without M at least by factor 7/8, so after O(log n) phases all nodes in L2 have M. Deciding nodes for transmission in iter. i : Π = { } // decisions made so far calculate E(|Y|) = E(|Y| | Π) for each w in L1 do if E(|Y| | Π and w transmits) ≥ E(|Y| | Π) then Π ← Π U { “w transmits” } else Π ← Π U { “w doesn’t transmit” } // E(|Y| | Π) ≥ E(|Y|)

16 Deterministic O(log 2 n) protocol (cont.) Calculate E(|Y| | decisions made so far) E(|Y|) = ∑ { d(v) 2 -i (1 – 2 -i ) d(v)-1 : v in X } E(|Y| | w1, w2, w3 decided) = ∑ { P(v gets M) : blue v in X } + ∑ { P(v gets M) : green v in X } X: w1w2w3 X: v

17 Ω(log 2 n) lower bound [Alon, Bar-Noy, Linial, Peleg, 1991] L1 = { 1,2, …, n } Network: H = {S1, S2,.., Sm}, Si - subset of L1 Protocol: F = {R1, R2,.., Rt}, Ri - subset of L1 Fix a protocol F of length t = ε log 2 n and consider a random network H Show: Prob( F is good for H ) < exp{ - n log 2 n } There are ≤ exp{ n log 2 n } different protocols, so some fixed network H has no length t protocol. L1: L2:

ACSS 2006, T. Radzik18 Ω(log 2 n) lower bound (cont.) H = U Hq, where for q = 1, 2, …, log n, Hq = { S1, S2, …, Sm} – random network such that for each 1 ≤ i ≤ n and 1 ≤ k ≤ m = n 7, Prob( i in Sk ) = 2 -q, independently Sk – random subset of {1, …, n} of size ≈ n/2 -q For a set R in protocol F, – if |R| ≈ 2 q, |R ∩ Sk| = 1 with constant prob. – if |R| << 2 q, |R ∩ Sk| = 0 with high prob. – if |R| >> 2 q, |R ∩ Sk| ≥ 2 with high prob. F needs Ω(log n) sets of size ≈ 2 q, for each q. Or otherwise for some q, F is bad for Hq w.h.p.

ACSS 2006, T. Radzik19 Ω(log 2 n) lower bound (cont.) Combinatoria lemma: For each family F of ε log 2 n subsets of {1,…,n}, there is an index q*, (1/4) log n ≤ q* ≤ (1/2) log n, such that F = { A1, A2, …, Ax, B1, B2, …, By }, where (i) |U Ai| ≤ 2 q* log n (ii) |Bj \ (U Ai)| ≥ 2 q* (iii) ∑ 2 q* / |Bj \ (U Ai)| ≤ log n F is not good for Hq*: for each set S in Hq*, Prob( |S ∩ R| ≠ 1 for all R in F ) ≥ 1/n 5 Prob(F is good for Hq*) ≤ (1-1/n 5 ) ↑ n 7 ≤ exp{-n 2 }

ACSS 2006, T. Radzik20 Ω(log 2 n) lower bound (cont.) F – an arbitrary protocol of length ε log 2 n. q* and F = { A1, A2, …, Ax, B1, B2, …, By }, as in the lemma, and A = UAi. S – a randon set in Hq*. Prob( |S ∩ Ai| = 0, for all Ai ) ≥ (1 – 1/2 q* ) |A| ≥ 1/n 2 (use (i)) Prob( |S ∩ (Bi \ A)| ≥ 2 ), putting b = |Bi \ A| ≥ 1 – (1 – 1/2 q* ) b – (b/2 q* )(1 – 1/2 q* ) b ≥ 1 – 0.9 ∙ 2 q* / b (use (ii)) Prob( |S ∩ (Bi \ A)| ≥ 2, for all Bi ) ≥ Π(1 – 0.9 ∙ 2 q* / |Bi \ A|) ≥ 1/n 3 (use (iii))

ACSS 2006, T. Radzik21 Ω(log 2 n) lower bound (cont.) Prob( |S ∩ R| ≠ 1, for each set R in F ) ≥ Prob( |S ∩ Ai| = 0, for all Ai and |S ∩ (Bi \ A)| ≥ 2, for all Bi ) = Prob( |S ∩ Ai| = 0, for all Ai ) ∙ Prob( |S ∩ (Bi \ A)| ≥ 2, for all Bi ) ≥ (1/n 2 ) ∙ (1/n 3 ) = 1/n 5. Prob( for each S in H, exists R in F: |S ∩ R| = 1) ≤ (1 – 1/n 5 ) ↑ n 7 ≤ exp{ – n 2 } There are ≤ exp{ n log 2 n } different protocols of length ε log 2 n. Hence there is a radius-2 network H with n 8 nodes without a protocol of length ε log 2 n.

22 Broadcasting in general network Network with diameter D O(D log 2 n) protocol O(D log n + log 2 n) protocol [Bar-Yehuda, Goldreich, Itai, 1992]: Processors with M repeat (synchronized) phases: for i = 1 to log n do transmits with prob. 2 -i source v With constant probability, in one phase, message M is send to the next node. Large D: expected D phases → O(D) phases w.h.p.

ACSS 2006, T. Radzik23 Unknown undirected network, randomized alg. Ω(D log (n/D) + log 2 n) lower bound [Kushilevitz, Mansour, 1998] O(D log (n/D) + log 2 n) algorithm [Czumaj, Rytter, 2003] source v Shortest path: Average node degree: O(n/D). If each node degree is O(n/D), then the transmission probabilities < D/n not needed, so only log(n/D) iterations in one phase. General case: keep steps with transmission probabilities < D/n, but make them less frequent.

24 Known undirected network, deterministic alg. [Gasieniec, Peleg, Xin, 2005] BFS tree: source Rank the nodes from the leaves: increase the rank of the parent, if two children have same max rank ( ≤ log n )

25 Deterministic algorithm (cont.) source Can find a BFS tree so that no two egdes (r,r) between layers i and i+1 have a cross edge r r no cross edge simultaneous transmissions possible rr 1

26 Deterministic algorithm (cont.) source Can find a BFS tree so that no two egdes (r,r) between layers i and i+1 have a cross edge r r no cross edge simultaneous transmissions possible rr 1

27 Deterministic algorithm (cont.) source Can find a BFS tree so that no two egdes (r,r) between layers i and i+1 have a cross edge r r no cross edge simultaneous transmissions possible rr 1

28 Pipelining r max … … … 2 A node at layer i with rank q transmits at step i + q + k r max, for k = 0, 1, 2, …

29 Pipelining r max … … … 2 A node at layer i with rank q transmits at step i + q + k r max, for k = 0, 1, 2, …

30 Pipelining r max … … … 2 A node at layer i with rank q transmits at step i + q + k r max, for k = 0, 1, 2, …

31 Pipelining r max … … … 2 A node at layer i with rank q transmits at step i + q + k r max, for k = 0, 1, 2, …

ACSS 2006, T. Radzik32 Deterministic algorithm (cont.) Separate transmissions from consecutive layers, so that only one in every three consecutive layers transmits. If M is at the first node of the same-rank length d path at step t, then M is send to the end of this path in O(log n) + d steps. How can we pass messages between node of different ranks? For each pair of consecutive layers, repeatedly run the protocol for radius-2 networks. Interleave this with the pipeline. source v r r r r’ r”

ACSS 2006, T. Radzik33 Deterministic algorithm (cont.) Number of steps required: fast (green) transmissions: D + O(log n) ∙ O(log n) slow (red) transmissions: O(log n) ∙ O(log 2 n), if deterministic alg. O(log 2 n) w.h.p, if randomized alg. Total running time: D + O(log 3 n), deterministic alg. D + O(log 2 n), randomized alg. source v r r r r’ r”