Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks.

Slides:



Advertisements
Similar presentations
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Advertisements

Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
Good afternoon everyone.
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks Zhen Jiang Computer Science Department West Chester University.
Small-world Overlay P2P Network
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy,
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Yashar Ganjali, and Abtin Keshavarzian Presented by: Isaac Keslassy Computer Systems Laboratory Department of Electrical Engineering Stanford University.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
Yashar Ganjali Joint work with: Abtin Keshavarzian June 4, 2003 Single-Path vs. Multi-Path Routing in Ad Hoc Networks.
Axis-Based Virtual Coordinate Assignment Protocol and Delivery- Guaranteed Routing Protocol in Wireless Sensor Networks M.J.Tsai, H.Y.Yang, and W.Q.Huang.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
An Efficient Location Service for Mobile Ad Hoc Networks Roland Flury Roger Wattenhofer Distributed Computing Group MLS.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Scalable and Distributed GPS free Positioning for Sensor Networks Rajagopal Iyengar and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
Information Brokerage and Delivery to Mobile Sinks HyungJune Lee, Branislav Kusy, Martin Wicke.
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
Improved Sparse Covers for Graphs Excluding a Fixed Minor Ryan LaFortune (RPI), Costas Busch (LSU), and Srikanta Tirthapura (ISU)
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Landmark-Based Information Storage and Retrieval in Sensor Networks Qing Fang Department of Electrical Engineering, Stanford University Jie Gao Department.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta NCA’03 speaker : Chi-Chih.
Efficient HopID Based Routing for Sparse Ad Hoc Networks Yan Chen Lab for Internet & Security Technology (LIST) Northwestern University
RoamHBA : Maintaining Group Connectivity In Sensor Networks Qing Fang Jie Liu Leonidas Guibas Feng Zhao Department of Electrical Engineering, Stanford.
EBAS: An Energy-Efficient Event Boundary Approximated Suppression Algorithm in Wireless Sensor Networks Longjiang Guo Heilongjiang University
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
Bounded relay hop mobile data gathering in wireless sensor networks
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang, Jie Gao, Leonidas J. Guibas, Vin de Silva, Li Zhang Department of Electrical.
Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Networks IEEE Transactions on Computers, Vol. 58, No. 9, September 2009 Xu.
Wireless Access and Networking Technology Lab WANT Energy-efficient and Topology-aware Routing for Underwater Sensor Networks Xiaobing Wu, Guihai Chen and.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Mobile-Assisted Localization by Stitching in Wireless Sensor Networks IEEE ICC 2011 Han Wang, Wangdong Qi, Kun Wang, Peng Liu, Li Wei and Yasong Zhu PLA.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
“LPCH and UDLPCH: Location-aware Routing Techniques in WSNs”. Y. Khan, N. Javaid, M. J. Khan, Y. Ahmad, M. H. Zubair, S. A. Shah.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
1 Hierarchical Data Dissemination Scheme for Large Scale Sensor Networks Anand Visvanathan and Jitender Deogun Department of Computer Science and Engg,
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Scalable and Distributed GPS free positioning for Sensor Networks Rajagopal Iyengear and Biplab Sikdar IEEE International Conference on Communications.
Power-Aware Topology Control for Wireless Ad-Hoc Networks Wonseok Baek and C.-C. Jay Kuo Department of Electrical Engineering University of Southern California.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov, Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Greedy Routing with Bounded Stretch
Chi Zhang, Yang Song and Yuguang Fang
Replica Placement Heuristics of Application-level Multicast
Presentation transcript:

Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks

Outline  Introduction  Motivation, related works, and goals  Issue discussed in this dissertation  Information brokerage scheme with distance sensitivity  Information brokerage scheme in 3D wireless ad hoc networks  Simulations  Conclusion 2

Information Brokerage Scheme A B 3

 Three types of nodes:  Broker  Producer  Consumer  Distance Sensitivity Information Brokerage Scheme A C B 4

Related Works  XYLS  FMMS iMesh  Double Rulings DRACA A B A B 5

Distance Sensitivity in 3D 6

Information Brokerage SchemeDistance sensitivity Dimension FMMS (IEEE ICCCN 2002) Yes2D Double Rulings (IEEE/ACM ToN 2009) Yes2D XYLS (IJCNDS 2008) Yes2D iMesh (IEEE ToC 2009) Yes2D DRACA (IEEE ICC 2009) Yes2D LAIBYes3D  A retrieval-guaranteed distance sensitive information brokerage scheme in 3D wireless ad hoc networks. 7

Issue Discussed in This Dissertation  Information brokerage scheme with distance sensitivity  Existing schemes don’t work well in 3D.  Achieving distance sensitivity costs lots of message overhead.  Information brokerage scheme in 3D wireless ad hoc networks  The network is not a continuous domain.  Each node must finds a same agent node. 8

Information Brokerage Scheme with Distance Sensitivity 9

Information Brokerage Scheme with Distance Sensitivity (LAIB) X-axis Replication-Retrieval Tree 10

Construction of Replication-Retrieval Tree ( 4, [0,8] ) ( 2, [0,4] )( 6, [4,8] ) ( 1, [0,2] )( 3, [2,4] )( 5, [4,6] ) ( 7, [6,8] ) ( 1, [0,1] )( 2, [1,2] )( 3, [2,3] )( 4, [3,4] )( 5, [4,5] ) ( 6, [5,6] ) ( 7, [6,7] ) ( 8, [7,8] ) r r α α β β 11

Example of LAIB Producer(5,3,3) Consumer(1,1,1) NodeX-SETY-SETZ-SET 12

Example of LAIB Producer(5,3,3) Consumer(1,1,1) NodeX-SETY-SETZ-SET 3, 4, 5, 6 13

Example of LAIB Producer(5,3,3) Consumer(1,1,1) (3,2,2) 、 (3,2,3) 、 (3,2,4) 、 (3,3,2) 、 (3,3,3) 、 (3,3,4) 、 (3,4,2) 、 (3,4,3) 、 (3,4,4) … (6,4,2) 、 (6,4,3) 、 (6,4,4) 、 (6,5,2) 、 (6,5,3) 、 (6,5,4) NodeX-SETY-SETZ-SET 3, 4, 5, 6 2, 3, 4, 5 2, 3, 4 14

Example of LAIB Producer(5,3,3) Consumer(1,1,1) NodeX-SETY-SETZ-SET 3, 4, 5, 62, 3, 4, 52, 3, 4 1, 2, 3, 6 15

Example of LAIB Producer(5,3,3) Consumer(1,1,1) (1,1,1) 、 (1,1,2) 、 (1,2,1) 、 (1,2,2) 、 (1,3,1) 、 (1,3,2) … (6,1,1) 、 (6,1,2) 、 (6,2,1) 、 (6,2,2) 、 (6,3,1) 、 (6,3,2) NodeX-SETY-SETZ-SET 3, 4, 5, 62, 3, 4, 52, 3, 4 1, 2, 3, 6 1, 2, 3 1, 2 16

Example of LAIB Producer(5,3,3) Consumer(1,1,1) NodeX-SETY-SETZ-SET 3, 4, 5, 62, 3, 4, 52, 3, 4 1, 2, 3, 61, 2, 31, 2 17

Example of LAIB Producer(5,3,3) Consumer(1,1,1) NodeX-SETY-SETZ-SET 3, 4, 5, 62, 3, 4, 52, 3, 4 1, 2, 3, 61, 2, 31, 2 (3,2,2) 、 (3,3,2) 、 (6,2,2) 、 (6,3,2) 18

Properties of LAIB  Retrieval guarantee  Bounded replication message overhead  Distance sensitivity

Properties of LAIB  Retrieval guarantee  Bounded replication message overhead  Distance sensitivity  The expected values of retrieval latency, replication message overhead, and replication memory overhead. 20

Properties of LAIB  Retrieval guarantee  Distance sensitivity  Bounded replication message overhead  The expected values of retrieval latency, replication message overhead, and replication memory overhead

Properties of LAIB

Properties of LAIB

Properties of LAIB  Retrieval guarantee  Distance sensitivity  Bounded replication message overhead  The expected values of retrieval latency, replication message overhead, and replication memory overhead. 24

Information Brokerage Scheme in 3D Wireless Ad hoc Networks 25

Information Brokerage Scheme in 3D Wireless Ad hoc Networks 26

Information Brokerage Scheme in 3D Wireless Ad hoc Networks 27

Information Brokerage Scheme in 3D Wireless Ad hoc Networks 28

Information Brokerage Scheme in 3D Wireless Ad hoc Networks 29

Dual Graph R. Flury and R. Wattenhofer, “Randomized 3D geographic routing,” in IEEE INFOCOM,

Dual Graph 31

Dual Graph 32

Implementation with Dual Graph 33

Implementation with Dual Graph 34

Locating the Holes  Find the corner of the hole.  Collect the information of the hole.  Notify the hole information to all nodes on the boundary of hole.

Simulation Assumption  Each node has a unique ID  Nodes are static  Network behaviors are not taken into consideration Metrics  Replication memory overhead  Replication and retrieval message overhead  Retrieval latency stretch Environment Setup  Size of deployed region is fixed  Density of networks: 6, 8, 10, 12, 14 36

Replication Memory Overhead 37

Replication and Retrieval Message Overhead 38

Retrieval Latency Stretch 39

Replication Memory Overhead (Voids) 40

Replication Message Overhead (Voids) 41

Retrieval Latency Stretch (Voids) 42

Conclusion  We proposed the FIRST location-aware information brokerage scheme with a bounded data retrieval path length and bounded replication and retrieval message overhead costs available for use in 3D wireless ad hoc networks. 43

Q&A 44

Appendix

Dual Graph l 46

Example of Locating Holes a h1 h2 47

Example of Locating Holes a b h1 h2 c 48

Example of Locating Holes a b h1 h2 49

Example of Locating Holes a h1 h2 50

Example of Locating Holes b a h1 h2 51

a is the owner of hole d a h1 h2 b c e f g h i 52