Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Great Theoretical Ideas in Computer Science for Some.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
1 K-clustering in Wireless Ad Hoc Networks using local search Rachel Ben-Eliyahu-Zohary JCE and BGU Joint work with Ran Giladi (BGU) and Stuart Sheiber.
Lecture 7: Synchronous Network Algorithms
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Lectures on Network Flows
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
1 Complexity of Network Synchronization Raeda Naamnieh.
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 18th Lecture Christian Schindelhauer.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 668Set 2: Basic Graph Algorithms1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Topology Control Algorithms Davide Bilò
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Minimal Spanning Trees What is a minimal spanning tree (MST) and how to find one.
Complexity of Bellman-Ford Theorem. The message complexity of Bellman-Ford algorithm is exponential. Proof outline. Consider a topology with an even number.
Theory of Computing Lecture 10 MAS 714 Hartmut Klauck.
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Mobile Ad hoc Networks Sleep-based Topology Control
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Complexity of Bellman-Ford
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
A correction The definition of knot in page 147 is not correct. The correct definition is: A knot in a directed graph is a subgraph with the property that.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
DISTRIBUTED ALGORITHMS Spring 2014 Prof. Jennifer Welch Set 2: Basic Graph Algorithms 1.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Self-stabilizing energy-efficient multicast for MANETs.
Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Greedy Algorithms.
Does Topology Control Reduce Interference?
Topology Control –power control
Lectures on Network Flows
Chapter 5. Optimal Matchings
Introduction Wireless Ad-Hoc Network
Presentation transcript:

Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl

SS 05Ad hoc & sensor networs - Ch 10: Topology control2 Goals of this chapter  Networks can be too dense – too many nodes in close (radio) vicinity  This chapter looks at methods to deal with such networks by  Reducing/controlling transmission power  Deciding which links to use  Turning some nodes off  Focus is on basic ideas, some algorithms  Complexity results are only very superficially covered

SS 05Ad hoc & sensor networs - Ch 10: Topology control3 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

SS 05Ad hoc & sensor networs - Ch 10: Topology control4 Motivation: Dense networks  In a very dense networks, too many nodes might be in range for an efficient operation  Too many collisions/too complex operation for a MAC protocol, too many paths to chose from for a routing protocol, …  Idea: Make topology less complex  Topology: Which node is able/allowed to communicate with which other nodes  Topology control needs to maintain invariants, e.g., connectivity

SS 05Ad hoc & sensor networs - Ch 10: Topology control5 Topology Control  Drop long-range neighbors: Reduces interference and energy!  But still stay connected (or even spanner)

SS 05Ad hoc & sensor networs - Ch 10: Topology control6 Topology Control as a Trade-Off Network Connectivity Spanner Property Topology Control Conserve Energy Reduce Interference Sparse Graph, Low Degree Planarity Symmetric Links Less Dynamics Sometimes also clustering, dominating set construction (see later) d(u,v) ¢ t ¸ d TC (u,v)

SS 05Ad hoc & sensor networs - Ch 10: Topology control7 Options for topology control Topology control Control node activity – deliberately turn on/off nodes Control link activity – deliberately use/not use certain links Topology control Flat network – all nodes have essentially same role Hierarchical network – assign different roles to nodes; exploit that to control node/link activity Power controlBackbonesClustering

SS 05Ad hoc & sensor networs - Ch 10: Topology control8 Flat networks  Main option: Control transmission power  Do not always use maximum power  Selectively for some links or for a node as a whole  Topology looks “thinner”  Less interference, …  Alternative: Selectively discard some links  Usually done by introducing hierarchies

SS 05Ad hoc & sensor networs - Ch 10: Topology control9 Hierarchical networks – backbone  Construct a backbone network  Some nodes “control” their neighbors – they form a (minimal) dominating set  Each node should have a controlling neighbor  Controlling nodes have to be connected (backbone)  Only links within backbone and from backbone to controlled neighbors are used  Formally: Given graph G=(V,E), construct D ½ V such that

SS 05Ad hoc & sensor networs - Ch 10: Topology control10 Hierarchical network – clustering  Construct clusters  Partition nodes into groups (“clusters”)  Each node in exactly one group  Except for nodes “bridging” between two or more groups  Groups can have clusterheads  Typically: all nodes in a cluster are direct neighbors of their clusterhead  Clusterheads are also a dominating set, but should be separated from each other – they form an independent set  Formally: Given graph G=(V,E), construct C ½ V such that

SS 05Ad hoc & sensor networs - Ch 10: Topology control11 Aspects of topology-control algorithms  Connectivity – If two nodes connected in G, they have to be connected in G 0 resulting from topology control  Stretch factor – should be small  Hop stretch factor: how much longer are paths in G 0 than in G?  Energy stretch factor: how much more energy does the most energy-efficient path need?  Throughput – removing nodes/links can reduce throughput, by how much?  Robustness to mobility  Algorithm overhead

SS 05Ad hoc & sensor networs - Ch 10: Topology control12 Example: Price for maintaining connectivity  Maintaining connectivity can be very “costly” for a power control approach  Compare power required for connectivity compared to power required to reach a very big maximum component

SS 05Ad hoc & sensor networs - Ch 10: Topology control13 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

SS 05Ad hoc & sensor networs - Ch 10: Topology control14 Power control – magic numbers?  Question: What is a good power level for a node to ensure “nice” properties of the resulting graph?  Idea: Controlling transmission power corresponds to controlling the number of neighbors for a given node  Is there an “optimal” number of neighbors a node should have?  Is there a “magic number” that is good irrespective of the actual graph/network under consideration?  Historically, k=6 or k=8 had been suggested as such “magic numbers”  However, they optimize progress per hop – they do not guarantee connectivity of the graph!! ! Needs deeper analysis

SS 05Ad hoc & sensor networs - Ch 10: Topology control15 Controlling transmission range  Assume all nodes have identical transmission range r=r(|V|), network covers area A, V nodes, uniformly distr.  Fact: Probability of connectivity goes to zero if:  Fact: Probability of connectivity goes to 1 for if and only if  |V| ->inf. with |V|  Fact (uniform node distribution, density  ):

SS 05Ad hoc & sensor networs - Ch 10: Topology control16 Controlling number of neighbors  Knowledge about range also tells about number of neighbors  Assuming node distribution (and density) is known, e.g., uniform  Alternative: directly analyze number of neighbors  Assumption: Nodes randomly, uniformly placed, only transmission range is controlled, identical for all nodes, only symmetric links are considered  Result: For connected network, required number of neighbors per node is  (log |V|)  It is not a constant, but depends on the number of nodes!  For a larger network, nodes need to have more neighbors & larger transmission range! – Rather inconvenient  Constants can be bounded

SS 05Ad hoc & sensor networs - Ch 10: Topology control17 Some example constructions for power control  Basic idea for most of the following methods: Take a graph G=(V,E), produce a graph G 0 =(V,E 0 ) that maintains connectivity with fewer edges  Assume, e.g., knowledge about node positions  Construction should be local (for distributed implementation)

SS 05Ad hoc & sensor networs - Ch 10: Topology control18 Example 1: Relative Neighborhood Graph (RNG)  Edge between nodes u and v if and only if there is no other node w that is closer to either u or v  Formally:  RNG maintains connectivity of the original graph  Easy to compute locally  But: Worst-case spanning ratio is  (|V|)  Average degree is 2.6 This region has to be empty for the two nodes to be connected

SS 05Ad hoc & sensor networs - Ch 10: Topology control19 Example 2: Gabriel graph  Gabriel graph (GG) similar to RNG  Difference: Smallest circle with nodes u and v on its circumference must only contain node u and v for u and v to be connected  Formally:  Properties: Maintains connectivity, Worst-case spanning ratio  (|V| 1/2 ), energy stretch O(1) (depending on consumption model!), worst-case degree  (|V|) This region has to be empty for the two nodes to be connected

SS 05Ad hoc & sensor networs - Ch 10: Topology control20 Example 3: Delaunay triangulation  Assign, to each node, all points in the plane for which it is the closest node ! Voronoi diagram  Constructed in O(|V| log |V|) time  Connect any two nodes for which the Voronoi regions touch ! Delaunay triangulation  Problem: Might produce very long links; not well suited for power control Voronoi region for upper left node Edges of Delaunay triangulation

SS 05Ad hoc & sensor networs - Ch 10: Topology control21 Spanning Tree Based Construction  Build local spanning trees  Each node collects info about its neighbors at max. Power  Construct an MST using asy Prim’s Algorithm  Use only tree topology for communication

SS 05Ad hoc & sensor networs - Ch 10: Topology control22 Finding a Spanning Tree Given a Root  a distinguished processor is known, to serve as the root  root sends M to all its neighbors  when non-root first gets M  set the sender as its parent  send "parent" msg to sender  send M to all other neighbors  when get M otherwise  send "reject" msg to sender  use "parent" and "reject" msgs to set children variables and know when to terminate

SS 05Ad hoc & sensor networs - Ch 10: Topology control23 Execution of Spanning Tree Alg. gh a bc def Synchronous: always gives breadth-first search (BFS) tree gh a bc def Asynchronous: not necessarily BFS tree Both models: O(m) messages O(diam) time

SS 05Ad hoc & sensor networs - Ch 10: Topology control24 Distributed Spanning tree construction  Chang-Robert’s algorithm  {The root is known}  Uses signals and acks, similar to the termination detection algorithm. Uses the same rule for sending acknowledgment. For a graph G=(V,E), a spanning tree is a maximally connected subgraph T=(V,E’), E’  E,such that if one more edge is added, then the subgraph is no more a tree. Used for broadcasting in a network. Question: What if the root is not designated?

SS 05Ad hoc & sensor networs - Ch 10: Topology control25 Chang Roberts Spanning Tree Alg  program probe-echo  define N : integer (no. of neighbors)  C, D : integer;  initially parent :=i; C=0; D=0; {for the initiator}  send probes to each neighbor;  D:=no. of neighbors;  do D!=0  echo -> D:=D-1 od{D=0 signals end}  { for a non-initator process i>0}  do probe  parent=i  C=0 -> C:=1;  parent := sender;  if i is not a leaf -> send probes to non – parent neighbors;  D:= no. of non-parent neighbors  fi;   echo-> D:=D-1;   probe  sender != parent -> send echo to sender;   C=1  D=0 -> send echo to parent; C:=0; ÿod

SS 05Ad hoc & sensor networs - Ch 10: Topology control26 Example: Cone-based topology control  Assumption: Distance and angle information between nodes is available  Two-phase algorithm  Phase 1  Every node starts with a small transmission power  Increase it until a node has sufficiently many neighbors  What is “sufficient”? – When there is at least one neighbor in each cone of angle    = 5/6  is necessary and sufficient condition for connectivity!  Phase 2  Remove redundant edges: Drop a neighbor w of u if there is a node v of w and u such that sending from u to w directly is less efficient than sending from u via v to w  Essentially, a local Gabriel graph construction

SS 05Ad hoc & sensor networs - Ch 10: Topology control27 Example: Cone-based topology control (2)  Properties: simple, local construction  Extensions for k-connectivity (Yao graph)  Little exercise: What happens when  5/6  ? 22 22 22 22 22 22 22 22

SS 05Ad hoc & sensor networs - Ch 10: Topology control28 Centralized power control algorithm  Goal: Find topology control algorithm minimizing the maximum power used by any node  Ensuring simple or bi-connectivity  Assumptions: Locations of all nodes and path loss between all node pairs are known; each node uses an individually set power level to communicate with all its neighbors  Idea: Use a centralized, greedy algorithm  Initially, all nodes have transmission power 0  Connect those two components with the shortest distance between them (raise transmission power accordingly)  Second phase: Remove links (=reduce transmission power) not needed for connectivity  Exercise: Relation to Kruskal’s MST algorithm?

SS 05Ad hoc & sensor networs - Ch 10: Topology control29 Centralized power control algorithm A B C D E F D Topology 1 1 A B C D E F 1) Connect A-C and B-D A B C D E F 2) Connect A-B A B C D E F 3) Connect C-D A B C E F 4) Connect C-E and D-F A B C D E F 5) Remove edge A-B

SS 05Ad hoc & sensor networs - Ch 10: Topology control30 Gabriel Graph  Let disk(u,v) be a disk with diameter (u,v) that is determined by the two points u,v.  The Gabriel Graph GG(V) is defined as an undirected graph (with E being a set of undirected edges). There is an edge between two nodes u,v iff the disk(u,v) including boundary contains no other points.  As we will see the Gabriel Graph has interesting properties. disk(u,v) v u

SS 05Ad hoc & sensor networs - Ch 10: Topology control31 Delaunay Triangulation  Let disk(u,v,w) be a disk defined by the three points u,v,w.  The Delaunay Triangulation (Graph) DT(V) is defined as an undirected graph (with E being a set of undirected edges). There is a triangle of edges between three nodes u,v,w iff the disk(u,v,w) contains no other points.  The Delaunay Triangulation is the dual of the Voronoi diagram, and widely used in various CS areas; the DT is planar; the distance of a path (s,…,t) on the DT is within a constant factor of the s-t distance. disk(u,v,w) v u w

SS 05Ad hoc & sensor networs - Ch 10: Topology control32 Other planar graphs  Relative Neighborhood Graph RNG(V)  An edge e = (u,v) is in the RNG(V) iff there is no node w with (u,w) < (u,v) and (v,w) < (u,v).  Minimum Spanning Tree MST(V)  A subset of E of G of minimum weight which forms a tree on V. v u

SS 05Ad hoc & sensor networs - Ch 10: Topology control33 Properties of planar graphs  Theorem 1:  Corollary: Since the MST(V) is connected and the DT(V) is planar, all the planar graphs in Theorem 1 are connected and planar.  Theorem 2: The Gabriel Graph contains the Minimum Energy Path (for any path loss exponent  ¸ 2)  Corollary: GG(V) Å UDG(V) contains the Minimum Energy Path in UDG(V)

SS 05Ad hoc & sensor networs - Ch 10: Topology control34 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

SS 05Ad hoc & sensor networs - Ch 10: Topology control35 Hierarchical networks – backbones  Idea: Select some nodes from the network/graph to form a backbone  A connected, minimal, dominating set (MDS or MCDS)  Dominating nodes control their neighbors  Protocols like routing are confronted with a simple topology – from a simple node, route to the backbone, routing in backbone is simple (few nodes)  Problem: MDS is an NP-hard problem  Hard to approximate, and even approximations need quite a few messages

SS 05Ad hoc & sensor networs - Ch 10: Topology control36 Backbone by growing a tree  Construct the backbone as a tree, grown iteratively

SS 05Ad hoc & sensor networs - Ch 10: Topology control37 Backbone by growing a tree – Example 1:2: 3:4:

SS 05Ad hoc & sensor networs - Ch 10: Topology control38 Problem: Which gray node to pick?  When blindly picking any gray node to turn black, resulting tree can be very bad Solution: Look ahead! One step suffices

SS 05Ad hoc & sensor networs - Ch 10: Topology control39 Performance of tree growing with look ahead  Dominating set obtained by growing a tree with the look ahead heuristic is at most a factor 2(1+ H(  )) larger than MDS  H(¢) harmonic function, H(k) =  i=1 k 1/i <= ln k + 1   is maximum degree of the graph  It is automatically connected  Can be implemented in a distributed fashion as well

SS 05Ad hoc & sensor networs - Ch 10: Topology control40 Start big, make lean  Idea: start with some, possibly large, connected dominating set, reduce it by removing unnecessary nodes  Initial construction for dominating set  All nodes are initially white  Mark any node black that has two neighbors that are not neighbors of each other (they might need to be dominated) ! Black nodes form a connected dominating set (proof by contradiction); shortest path between ANY two nodes only contains black nodes  Needed: Pruning heuristics

SS 05Ad hoc & sensor networs - Ch 10: Topology control41 Pruning heuristics  Heuristic 1: Unmark node v if  Node v and its neighborhood are included in the neighborhood of some node marked node u (then u will do the domination for v as well)  Node v has a smaller unique identifier than u (to break ties)  Heuristic 2: Unmark node v if  Node v’s neighborhood is included in the neighborhood of two marked neighbors u and w  Node v has the smallest identifier of the tree nodes  Nice and easy, but only linear approximation factor uv w abcd

SS 05Ad hoc & sensor networs - Ch 10: Topology control42 One more distributed backbone heuristic: Span  Construct backbone, but take into account need to carry traffic – preserve capacity  Means: If two paths could operate without interference in the original graph, they should be present in the reduced graph as well  Idea: If the stretch factor (induced by the backbone) becomes too large, more nodes are needed in the backbone  Rule: Each node observes traffic around itself  If node detects two neighbors that need three hops to communicate with each other, node joins the backbone, shortening the path  Contention among potential new backbone nodes handled using random backoff A B C

SS 05Ad hoc & sensor networs - Ch 10: Topology control43 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

SS 05Ad hoc & sensor networs - Ch 10: Topology control44 Clustering  Partition nodes into groups of nodes – clusters  Many options for details  Are there clusterheads? – One controller/representative node per cluster  May clusterheads be neighbors? If no: clusterheads form an independent set C: Typically: clusterheads form a maximum independent set  May clusters overlap? Do they have nodes in common?

SS 05Ad hoc & sensor networs - Ch 10: Topology control45 Clustering  Further options  How do clusters communicate? Some nodes need to act as gateways between clusters If clusters may not overlap, two nodes need to jointly act as a distributed gateway  How many gateways exist between clusters? Are all active, or some standby?  What is the maximal diameter of a cluster? If more than 2, then clusterheads are not necessarily a maximum independent set  Is there a hierarchy of clusters?

SS 05Ad hoc & sensor networs - Ch 10: Topology control46 Maximum independent set  Computing a maximum independent set is NP-complete  Can be approximate within (  +3)/5 for small , within O(  log log  / log  ) else;  bounded degree  Show: A maximum independent set is also a dominating set  Maximum independent set not necessarily intuitively desired solution  Example: Radial graph, with only (v 0,v i ) 2 E

SS 05Ad hoc & sensor networs - Ch 10: Topology control47 A basic construction idea for independent sets  Use some attribute of nodes to break local symmetries  Node identifiers, energy reserve, mobility, weighted combinations… - matters not for the idea as such (all types of variations have been looked at)  Make each node a clusterhead that locally has the largest attribute value  Once a node is dominated by a clusterhead, it abstains from local competition, giving other nodes a chance Init: Step 1: Step 2: Step 3: Step 4:

SS 05Ad hoc & sensor networs - Ch 10: Topology control48 Determining gateways to connect clusters  Suppose: Clusterheads have been found  How to connect the clusters, how to select gateways?  It suffices for each clusterhead to connect to all other clusterheads that are at most three hops  Resulting backbone (!) is connected  Formally: Steiner tree problem  Given: Graph G=(V,E), a subset C ½ V  Required: Find another subset T ½ V such that S [ T is connected and S [ T is a cheapest such set  Cost metric: number of nodes in T, link cost  Here: special case since C are an independent set

SS 05Ad hoc & sensor networs - Ch 10: Topology control49 Steiner Tree (from Yao Wen Chang)

SS 05Ad hoc & sensor networs - Ch 10: Topology control50 Rotating clusterheads  Serving as a clusterhead can put additional burdens on a node  For MAC coordination, routing, …  Let this duty rotate among various members  Periodically reelect – useful when energy reserves are used as discriminating attribute  LEACH – determine an optimal percentage P of nodes to become clusterheads in a network  Use 1/P rounds to form a period  In each round, nP nodes are elected as clusterheads  At beginning of round r, node that has not served as clusterhead in this period becomes clusterhead with probability P/(1-p(r mod 1/P))

SS 05Ad hoc & sensor networs - Ch 10: Topology control51 Multi-hop clusters  Clusters with diameters larger than 2 can be useful, e.g., when used for routing protocol support  Formally: Extend “domination” definition to also dominate nodes that are at most d hops away  Goal: Find a smallest set D of dominating nodes with this extended definition of dominance  Only somewhat complicated heuristics exist  Different tilt: Fix the size (not the diameter) of clusters  Idea: Use growth budgets – amount of nodes that can still be adopted into a cluster, pass this number along with broadcast adoption messages, reduce budget as new nodes are found

SS 05Ad hoc & sensor networs - Ch 10: Topology control52 Passive clustering  Constructing a clustering structure brings overheads  Not clear whether they can be amortized via improved efficiency  Question: Eat cake and have it?  Have a clustering structure without any overhead?  Maybe not the best structure, and maybe not immediately, but benefits at zero cost are no bad deal… ! Passive clustering  Whenever a broadcast message travels the network, use it to construct clusters on the fly  Node to start a broadcast: Initial node  Nodes to forward this first packet: Clusterhead  Nodes forwarding packets from clusterheads: ordinary/gateway nodes  And so on… ! Clusters will emerge at low overhead

SS 05Ad hoc & sensor networs - Ch 10: Topology control53 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

SS 05Ad hoc & sensor networs - Ch 10: Topology control54 Adaptive node activity  Remaining option: Turn some nodes off deliberately  Only possible if other nodes remain on that can take over their duties  Example duty: Packet forwarding  Approach: Geographic Adaptive Fidelity (GAF) r r R  Observation: Any two nodes within a square of length r < R/5 1/2 can replace each other with respect to forwarding  R radio range  Keep only one such node active, let the other sleep

SS 05Ad hoc & sensor networs - Ch 10: Topology control55 Conclusion  Various approaches exist to trim the topology of a network to a desired shape  Most of them bear some non-negligible overhead  At least: Some distributed coordination among neighbors, or they require additional information  Constructed structures can turn out to be somewhat brittle – overhead might be wasted or even counter-productive  Benefits have to be carefully weighted against risks for the particular scenario at hand