Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.

Slides:



Advertisements
Similar presentations
Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks L. Li, J. Y. Halpern Cornell University P. Bahl, Y. M.
Advertisements

Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Great Theoretical Ideas in Computer Science
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
Great Theoretical Ideas in Computer Science for Some.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Trade-Offs and Topology Control 6th Week.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
CS728 Lecture 17 Web Indexes III. Last Time Showed how build indexes for graph connectivity Based on 2-hop covers Today Look at more general problem of.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Lost in Space or Positioning in Sensor Networks Michael O’Dell Regina O’Dell Mirjam Wattenhofer Roger Wattenhofer.
Ad Hoc and Sensor Networks – Roger Wattenhofer –2/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Geo-Routing Chapter 2 TexPoint fonts used in EMF. Read.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 20th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Topology Control Algorithms Davide Bilò
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
1 University of Denver Department of Mathematics Department of Computer Science.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Introduction Outline The Problem Domain Network Design Spanning Trees Steiner Trees Triangulation Technique Spanners Spanners Application Simple Greedy.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Minimizing interference for the highway model in Wireless Ad-hoc and Sensor Networks Haisheng Tan, Tiancheng, Lou, Francis C.M. Lau, YuexuanWang, Shiteng.
Theory of Computing Lecture 10 MAS 714 Hartmut Klauck.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Geo-Routing Chapter 3 TexPoint fonts used in EMF. Read.
Coverage and Connectivity Issues in Sensor Networks
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Algorithms on large graphs László Lovász Eötvös Loránd University, Budapest May
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
© Yamacraw, Fall 2002 Power Efficient Range Assignment in Ad-hoc Wireless Networks E. Althous (MPI) G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) S. Prasad.
Massively Distributed Database Systems In-Network Query Processing (Ad-Hoc Sensor Network) Fall 2015 Ki-Joune Li Pusan.
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California,
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
Spanning Tree Definition:A tree T is a spanning tree of a graph G if T is a subgraph of G that contains all of the vertices of G. A graph may have more.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
L. Li, J. Y. Halpern Cornell University
Does Topology Control Reduce Interference?
Topology Control –power control
Application of Computational Geometry in Wireless Networks
CS 3343: Analysis of Algorithms
Clustering TexPoint fonts used in EMF.
Introduction Wireless Ad-Hoc Network
Presentation transcript:

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/2 Inventory Tracking (Cargo Tracking) Current tracking systems require line- of-sight to satellite. Count and locate containers Search containers for specific item Monitor accelerometer for sudden motion Monitor light sensor for unauthorized entry into container

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/3Ad Hoc and Sensor Networks – Roger Wattenhofer – Rating Area maturity Practical importance Theoretical importance First steps Text book No apps Mission critical Not really Must have

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/4Ad Hoc and Sensor Networks – Roger Wattenhofer – Gabriel Graph et al. Practical Topology Control: XTC Interference Overview – Topology Control

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/5Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Drop long-range neighbors: Reduces interference and energy! But still stay connected (or even spanner)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/6Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control as a Trade-Off Network Connectivity Spanner Property Topology Control Conserve Energy Reduce Interference Sparse Graph, Low Degree Planarity Symmetric Links Less Dynamics d(u,v) ¢ t ¸ d TC (u,v)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/7Ad Hoc and Sensor Networks – Roger Wattenhofer – Gabriel Graph Let disk(u,v) be a disk with diameter (u,v) that is determined by the two points u,v. The Gabriel Graph GG(V) is defined as an undirected graph (with E being a set of undirected edges). There is an edge between two nodes u,v iff the disk(u,v) including boundary contains no other points. As we will see the Gabriel Graph has interesting properties. disk(u,v) v u

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/8Ad Hoc and Sensor Networks – Roger Wattenhofer – Delaunay Triangulation Let disk(u,v,w) be a disk defined by the three points u,v,w. The Delaunay Triangulation (Graph) DT(V) is defined as an undirected graph (with E being a set of undirected edges). There is a triangle of edges between three nodes u,v,w iff the disk(u,v,w) contains no other points. The Delaunay Triangulation is the dual of the Voronoi diagram, and widely used in various CS areas; the DT is planar; the distance of a path (s,…,t) on the DT is within a constant factor of the s-t distance. disk(u,v,w) v u w

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/9Ad Hoc and Sensor Networks – Roger Wattenhofer – Other planar graphs Do you know other Topologies?

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/10Ad Hoc and Sensor Networks – Roger Wattenhofer – Other planar graphs Relative Neighborhood Graph RNG(V) –An edge e = (u,v) is in the RNG(V) iff there is no node w with (u,w) < (u,v) and (v,w) < (u,v). Minimum Spanning Tree MST(V) –A subset of E of G of minimum weight which forms a tree on V. v u

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/11Ad Hoc and Sensor Networks – Roger Wattenhofer – Properties of planar graphs Theorem 1: MST(V) µ RNG(V) µ GG(V) µ DT(V) Corollary: Since the MST(V) is connected and the DT(V) is planar, all the graphs in Theorem 1 are connected and planar. Theorem 2: The Gabriel Graph contains the so called “minimum energy path” (for any path loss exponent  ¸ 2) Corollary: GG(V) Å UDG(V) contains the Minimum Energy Path in UDG(V)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/12Ad Hoc and Sensor Networks – Roger Wattenhofer – More examples  -Skeleton –Generalizing Gabriel (  = 1) and Relative Neighborhood (  = 2) Graph Yao-Graph –Each node partitions directions in k cones and then connects to the closest node in each cone Cone-Based Graph –Dynamic version of the Yao Graph. Neighbors are visited in order of their distance, and used only if they cover not yet covered angle

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/13Ad Hoc and Sensor Networks – Roger Wattenhofer – Lightweight Topology Control Topology Control commonly assumes that the node positions are known. What if we do not have access to position information?

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/14 XTC: Lightweight Topology Control without Geometry Each node produces “ranking” of neighbors. Examples –Distance (closest) –Energy (lowest) –Link quality (best) –Must be symmetric! Not necessarily depending on explicit positions Nodes exchange rankings with neighbors C D E F A 1. C 2. E 3. B 4. F 5. D 6. G B G

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/15 XTC Algorithm (Part 2) Each node locally goes through all neighbors in order of their ranking If the candidate (current neighbor) ranks any of your already processed neighbors higher than yourself, then you do not need to connect to the candidate. A B C D E F G 1. C 2. E 3. B 4. F 5. D 6. G 1. F 3. A 6. D 7. A 8. C 9. E 3. E 7. A 2. C 4. G 5. A 3. B 4. A 6. G 8. D 4. B 6. A 7. C

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/16Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Analysis (Part 1) Symmetry: A node u wants a node v as a neighbor if and only if v wants u. Proof: –Assumption 1) u  v and 2) u  v –Assumption 2)  9 w: (i) w Á v u and (ii) w Á u v Contradicts Assumption 1)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/17Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Analysis (Part 1) Symmetry: A node u wants a node v as a neighbor if and only if v wants u. Connectivity: If two nodes are connected originally, they will stay so (provided that rankings are based on symmetric link-weights). If the ranking is energy or link quality based, then XTC will choose a topology that routes around walls and obstacles.

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/18Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Analysis (Part 2) If the given graph is a Unit Disk Graph (no obstacles, nodes homogeneous, but not necessarily uniformly distributed), then … The degree of each node is at most 6. The topology is planar. The graph is a subgraph of the RNG. Relative Neighborhood Graph RNG(V): –An edge e = (u,v) is in the RNG(V) iff there is no node w with (u,w) < (u,v) and (v,w) < (u,v). v u

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/19Ad Hoc and Sensor Networks – Roger Wattenhofer – Unit Disk Graph XTC XTC Average-Case

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/20Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Average-Case (Degrees) XTC avg GG avg UDG avg XTC max GG max UDG max v u

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/21Ad Hoc and Sensor Networks – Roger Wattenhofer – XTC Average-Case (Stretch Factor) GG vs. UDG – Energy XTC vs. UDG – Energy GG vs. UDG – Euclidean XTC vs. UDG – Euclidean

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/22Ad Hoc and Sensor Networks – Roger Wattenhofer – Implementing XTC, e.g. BTnodes v3

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/23Ad Hoc and Sensor Networks – Roger Wattenhofer – Implementing XTC, e.g. on mica2 motes Idea: –XTC chooses the reliable links –The quality measure is a moving average of the received packet ratio –Source routing: route discovery (flooding) over these reliable links only –(black: using all links, grey: with XTC)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/24Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control as a Trade-Off Network Connectivity Spanner Property Topology Control Conserve Energy Reduce Interference Sparse Graph, Low Degree Planarity Symmetric Links Less Dynamics Really?!?

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/25Ad Hoc and Sensor Networks – Roger Wattenhofer – What is Interference? Link-based Interference Model Node-based Interference Model „How many nodes are affected by communication over a given link?“ Exact size of interference range does not change the results „By how many other nodes can a given network node be disturbed?“ Interference 2 Problem statement –We want to minimize maximum interference –At the same time topology must be connected or spanner Interference 8

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/26Ad Hoc and Sensor Networks – Roger Wattenhofer – Low Node Degree Topology Control? Low node degree does not necessarily imply low interference: Very low node degree but huge interference

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/27Ad Hoc and Sensor Networks – Roger Wattenhofer – Let’s Study the Following Topology! …from a worst-case perspective

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/28Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Algorithms Produce… All known topology control algorithms (with symmetric edges) include the nearest neighbor forest as a subgraph and produce something like this: The interference of this graph is  (n)!

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/29Ad Hoc and Sensor Networks – Roger Wattenhofer – But Interference… Interference does not need to be high… This topology has interference O(1)!!

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/30Ad Hoc and Sensor Networks – Roger Wattenhofer – u v Link-based Interference Model There is no local algorithm that can find a good interference topology The optimal topology will not be planar

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/31Ad Hoc and Sensor Networks – Roger Wattenhofer – Link-based Interference Model LIFE (Low Interference Forest Establisher) –Preserves Graph Connectivity –Attribute interference values as weights to edges –Compute minimum spanning tree/forest (Kruskal’s algorithm) LIFE Interference 4 LIFE constructs a minimum- interference forest

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/32Ad Hoc and Sensor Networks – Roger Wattenhofer – Average-Case Interference: Preserve Connectivity UDG GG RNG LIFE

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/33Ad Hoc and Sensor Networks – Roger Wattenhofer – Connecting linearly results in interference O(n) Node-based Interference Model Already 1-dimensional node distributions seem to yield inherently high interference but the exponential node chain can be connected in a better way

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/34Ad Hoc and Sensor Networks – Roger Wattenhofer – Connecting linearly results in interference O(n) Node-based Interference Model Already 1-dimensional node distributions seem to yield inherently high interference......but the exponential node chain can be connected in a better way Matches an existing lower bound Interference

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/35Ad Hoc and Sensor Networks – Roger Wattenhofer – Node-based Interference Model Arbitrary distributed nodes in one dimension –Approximation algorithm with approximation ratio in O( ) Two-dimensional node distributions –Simple randomized algorithm resulting in interference O( ) –Can be improved to O(√n)

Ad Hoc and Sensor Networks – Roger Wattenhofer –3/36Ad Hoc and Sensor Networks – Roger Wattenhofer – Open problem On the theory side there are quite a few open problems. Even the simplest questions of the node-based interference model are open: We are given n nodes (points) in the plane, in arbitrary (worst-case) position. You must connect the nodes by a spanning tree. The neighbors of a node are the direct neighbors in the spanning tree. Now draw a circle around each node, centered at the node, with the radius being the minimal radius such that all the nodes’ neighbors are included in the circle. The interference of a node u is defined as the number of circles that include the node u. The interference of the graph is the maximum node interference. We are interested to construct the spanning tree in a way that minimizes the interference. Many questions are open: Is this problem in P, or is it NP-complete? Is there a good approximation algorithm? Etc.