Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.

Slides:



Advertisements
Similar presentations
CSE 211 Discrete Mathematics
Advertisements

1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Designing An g Ad-hoc Network for Multimedia Communication Chung-Wei Lee & Jonathan C.L. Liu Presented By: Mahendra Kumar.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Information Networks Small World Networks Lecture 5.
CONNECTIVITY “The connectivity of a network may be defined as the degree of completeness of the links between nodes” (Robinson and Bamford, 1978).
Small-World Graphs for High Performance Networking Reem Alshahrani Kent State University.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
A Unified Energy Efficient Topology for Unicast and Broadcast Xiang-Yang Li*, Wen-Zhang Song † and WeiZhao Wang* *Illinois Institute of Technology † Washington.
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information 梁紀翔 王謙志 NETLab.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Small World Networks Somsubhra Sharangi Computing Science, Simon Fraser University.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Maximal Cliques in UDG: Polynomial Approximation Rajarshi Gupta, Jean Walrand Dept of EECS, UC Berkeley Olivier Goldschmidt, OPNET Technologies International.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Topology Control Algorithms Davide Bilò
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA IDRWS 2004.
1 Finding Sparser Directed Spanners Piotr Berman, Sofya Raskhodnikova, Ge Ruan Pennsylvania State University.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Complex network geometry and navigation Dmitri Krioukov CAIDA/UCSD F. Papadopoulos, M. Kitsak, kc claffy, A. Vahdat M. Á. Serrano, M. Boguñá UCSD, December.
Network Aware Resource Allocation in Distributed Clouds.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Wireless Ad-Hoc Networks
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
David S. L. Wei Dept of Computer and Information Sciences Fordham University Bronx, New York Szu-Chi Wang and Sy-Yen Kuo Dept of Electrical Engineering.
GRAPH SPANNERS by S.Nithya. Spanner Definition- Informal A geometric spanner network for a set of points is a graph G in which each pair of vertices is.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Approximate Distance Oracles Mikkel Thorup and Uri Zwick Presented By Shiri Chechik.
Complex Networks Measures and deterministic models Philippe Giabbanelli.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
Clusters Recognition from Large Small World Graph Igor Kanovsky, Lilach Prego Emek Yezreel College, Israel University of Haifa, Israel.
Wireless Communication using Directional Antennas.
HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Algorithms for Radio Networks Exercise 7 Stefan Rührup
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Does Topology Control Reduce Interference?
Surviving Holes and Barriers in Geographic Data Reporting for
Greedy Routing with Bounded Stretch
Topology Control and Its Effects in Wireless Networks
Introduction Wireless Ad-Hoc Network
How to use spanning trees to navigate in Graphs
Presentation transcript:

Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008

1 Spanners: why, what? How to build a good backbone This presentation deals with the half of the material that was left over. We will present the theoretical concepts that we need, the algorithm and the overall simulation results. Potential research problems Some hints will be explained for possible follow-up works. Simulations results

Spanners Backbone Algorithm Simulations Research problems 2 Last time we saw that quasi-UDGs are a generalization of the UDG model, but properties are not as well understood yet. We showed the existence of small separators and its application to routing as a first property. The second property concerns spanners. What is a k-spanner? probability distance r guaranteed maybetoo far R

Spanners Backbone Algorithm Simulations Research problems 3 What is a k-spanner? Let’s consider a graph G. A k-spanner is a tree such that the distance between any two vertices is at most k times their distance in G. All pairs are connected by a path of length 1. Now all pairs are connected by paths of length 2 = 2*1, hence it is a 2-spanner. k tells you how much longer are the shortest paths in the spanner. k is called the stretch factor. T is a k-spanner of G if d G (u, v) < k.d T (u, v) and T is a tree. d G (u,v) d T (u,v)

Spanners Backbone Algorithm Simulations Research problems 4 Desirable properties of spanners You do not want the length of the longest path to increase by a factor of 10 for some paths and by 2 for some others… you’d like it to be constant ►We want the stretching factor to be constant. A spanner is used as backbone: a sub-network for communications. By reducing the number of edges we make the routing tables smaller and have less interferences. ►We want the stretching factor to be small. As the paths get longer, it costs more energy to do the transmission.

Spanners Backbone Algorithm Simulations Research problems 5 Construction presented in this paper ►We want the stretching factor to be constant. ►We want the stretching factor to be small. Done! Bounded by 3 + ε where ε can be made arbitrarily small For suitable routing operations, we also make it nearly planar.

Spanners Backbone Algorithm Simulations Research problems 6 Algorithm to build the backbone Let G be the graph with parameters R and r. Step 1 – Planarize For every edge (uv) between u and v ∙ If there is no common neighbour in the disk of diameter (uv), we take it. ∙ Otherwise, there is a neighbour w. ∙ Repeat the process with (uw). This construction is called Gabriel Graph. ∙ Drop (uv).

Spanners Backbone Algorithm Simulations Research problems 6 Algorithm to build the backbone Let G be the graph with parameters R and r. Step 1 – Planarize For every edge (uv) between u and v ∙ If there is no common neighbour in the disk of diameter (uv), we take it. ∙ Otherwise, there is a neighbour w. ∙ Repeat the process with (uw). This construction is called Gabriel Graph. ∙ Drop (uv).

Spanners Backbone Algorithm Simulations Research problems 7 Algorithm to build the backbone Let G be the graph with parameters R and r. Step 2 – Reduce the number of short edges Direct the edges so that the graph is acyclic and of maximum in-degree 5. Perform a modified Yao Step. ∙ Divide the region around each point in k cones. ∙ For each region, select the shortest edge. ∙ For every maximal sequence of l empty regions, select the first l/2 unselected clockwise and the first l/2 unselected anti-clockwise. 4/2 = 2 The number of short edges is reduced to k + 5 where k is the number of cones. As short edges are being deleted, the minimum communication costs increases by at most 1 + (2 sin(π/k))^β.

Spanners Backbone Algorithm Simulations Research problems 8 Algorithm to build the backbone Let G be the graph with parameters R and r. Step 3 – Reduce the number of long edges Put a grid on the plane. An edge is considered long if it connects vertices from different cells. For each pair of cells ∙ Keep the smallest edge between them. (i.e. smallest of the longest)

Gabriel Subgraph of G Spanners Backbone Algorithm Simulations Research problems Graph G under the Quasi-UDG model Reduce the number of short edges Reduce the number of long edges Make it planar azraz Backbone of small constant stretching factor Algorithm to build the backbone Modified Yao Step Grid 9

Spanners Backbone Algorithm Simulations Research problems Networks topologies used in the experiments 10 Let’s have a plane of size 1500 x We randomly set N vertices. Position randomly a big hole of radius chosen in [R, 2R] and five small holes of radius chosen in [0, R]. If the distance between two vertices is in [r, R] we set a link randomly.

Spanners Backbone Algorithm Simulations Research problems Networks topologies used in the experiments 11 Let’s have a plane of size 1500 x We randomly set N vertices. Position randomly a big hole of radius chosen in [R, 2R] and five small holes of radius chosen in [0, R]. If the distance between two vertices is in [r, R] we set a link randomly. By varying N from 1000 to 2000, we measure the impact of the density. A random network is too uniform, thus holes are a simple attempt to simulate non-trivial topologies. The values for the ratio R/r go from 1 to 10 to measure the impacts of different connectivity models.

Spanners Backbone Algorithm Simulations Research problems Properties of the Backbone nodes 1500 nodes 2000 nodes Max. degree in G Max. degree Average degree in G Average degree Avg. #crossings in G Average #crossings Overall, a good reduction of the degree and number of crossings.

Spanners Backbone Algorithm Simulations Research problems Properties of the Backbone nodes 1500 nodes 2000 nodes Overall, a good reduction of the degree and number of crossings. Very small stretch factor (i.e. not a big increase of the length of the shortest paths).

Spanners Backbone Algorithm Simulations Research problems Labels and stretch factor 13 Thanks to the smallest separators, the distance labelling is better on a backbone. The backbones are sparser than the original graph thus we have smaller separators. However, the hop stretch factor is larger on the backbone.

Spanners Backbone Algorithm Simulations Research problems Summary 14 Compared to a classic greedy-forwarding plus local flooding algorithm, our protocol performs much better. We have small routing tables, reduced interferences and still an efficient local routing. In this serie of presentations, we have learnt new tools and concepts: ∙ Separators (with applications to compact structures) and spanners ∙ Quasi-UDG model (and its link-crossing properties) ∙ Use of grid graphs and virtual vertices to get simpler structures ∙ Distance labelling, gabriel graphs and yao step.

T H A N K Y O U Main article used in this presentation Separability and Topology Control of Quasi Unit Disk Graphs (Chen, Jiang, Kanj, Xia and Zhang, IEEE 2007) Improved Stretch Factor for Bounded-Degree Planar Power Spanners of Wireless Ad-Hoc Networks (Iyad Kanj & Ljubomir Perkovic, ALGOSENSORS 2006) On geometric spanners of euclidian graphs and their applications in wireless networks (Iyad Kanj & Ljubomir Perkovic, Technical Report DePaul University 2007) Other articles used to provide a better understanding Spanners Backbone Algorithm Simulations Research problems 15

Spanners Backbone Algorithm Simulations Research problems Can we do a complementary analysis? 16 Between r and R we have a « maybe » for the connection… probability distance r guaranteed maybetoo far R The analysis presented in this paper are only the worst case analysis. A straightforward complement would be to do an average case analysis. Several possible distribution of probabilities could be use to represent different situations.

Spanners Backbone Algorithm Simulations Research problems Can we have more specific situations? 17 The network topology used in this experiment is a random network. That might be good enough for sensor networks deployed uniformly on a battlefield or in a forest. However, for MANET such as laptop devices, the network is probably not that random. ∙ There are places with more users than others (cafe…) which create clusters ∙ Some systems have more bandwidth or power than others thus there should be an incentive to use them more often. Models for non-random real-world networks have been developped during the last 8 years (scale-free, small-world, hierarchical, …).

Spanners Backbone Algorithm Simulations Research problems Can we have more specific situations? 18 Models for non-random real-world networks have been developped during the last 8 years (scale-free, small-world, hierarchical, …). What is the influence of the properties of the topology on the results? Can we use the properties from the topology to create better algorithms? ∙ Routing algorithms under scale-free and small-world topologies have been published 5 years ago. ∙ They were still pretty basic without the use of labels or explicit separators. A network is not of one kind only, thus trade-off should be developped. ∙ Who wants to design a wonderful adaptive routing algorithm taking advantages of properties in some part of the network?

Spanners Backbone Algorithm Simulations Research problems Can we have more specific situations? 19 For an excellent review of properties of real-world networks: Structure and function of complex networks, M. E. J. Newman, 2003 Greedy routing with tree-decomposition for small-world graphs: A new perspective on the Small-World Phenomenon: Greedy Routing in Tree-Decomposed Graphs, Pierre Fraigniaud, Report 2005 Properties of transport in scale-free graphs: Anomalous Transport in Scale-Free Networks, Eugene Stanley, Physical Review Letters 2005 Search in power-law networks, Adamic & Lukose, Phys. Rev. E 2001 Distributed routing in small-world networks, Oskar Sandberg 2005