BROADCASTING TECHNIQUES IN AD-HOC NETWORKS A survey on Shubham Bhat Surendra Shenoy References: 1.“

Slides:



Advertisements
Similar presentations
Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Advertisements

Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
May 21, 2003Wu and Dai, ICDCS A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu and Fei Dai Dept. of Comp. Sci. & Eng. Florida.
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
My first aperosentation 9/6/2008 Marios Karagiannis.
Topic: Routing and Aggregation An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks (Li,Peng,Chu-
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Enhanced Gateway Multipoint Relays for Constructing a Small Connected Dominating Set in Wireless Ad Hoc Networks Ou Liang, Ahmet Sekercioglu.
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Multicast Routing with Minimum Energy Cost in Ad hoc Wireless Networks Xiaohua Jia, Deying Li and Frankie Hung Dept of Computer Science, City Univ of.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
Speaker: Li-Sheng Chen 1 Jan 2, 2012 EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing Protocol for Wireless Ad Hoc Networks.
WiOpt’04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks March 24-26, 2004, University of Cambridge, UK Session 2 : Energy Management.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
A Topology Discovery Algorithm for Sensor Networks Go Suzuki CS691, SSNS Spring 2003.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Presented by : Joseph Gunawan.  To get the optimal transmission radius for broadcasting using the energy as minimal as possible while it still guarantees.
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Presented by Fei Huang Virginia Tech April 4, 2007.
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta NCA’03 speaker : Chi-Chih.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
Efficient Backbone Construction Methods in MANETs Using Directional Antennas 1 Shuhui Yang, 1 Jie Wu, 2 Fei Dai 1 Department of Computer Science and Engineering.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
1 G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science and.
On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks By J. Wu and H. Li Instructor: Dr. Yinghsu Li Presented by: Chinh.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
On Reducing Broadcast Transmission Cost and Redundancy in Ad Hoc Wireless Networks Using Directional Antennas Minglu Li ( Department of Computer Science.
Self-stabilizing energy-efficient multicast for MANETs.
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Fundamentals of Computer Networks ECE 478/578
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Net 435: Wireless sensor network (WSN)
Topology Control and Its Effects in Wireless Networks
Effective Replica Allocation
On Constructing k-Connected k-Dominating Set in Wireless Networks
Presentation transcript:

BROADCASTING TECHNIQUES IN AD-HOC NETWORKS A survey on Shubham Bhat Surendra Shenoy References: 1.“ Broadcasting in Ad-hoc networks based on Self-Pruning” Jie Wu and Fei Dai, INFOCOM 2003,Twenty-Second Annual Conference of the IEEE Computer and Communication society. 2. “ Localized Minimum-energy broadcasting in ad-hoc networks” Julien Cartigny, David Simplot, Ivan Stojmenovic, INFOCOM 2003,Twenty-Second Annual Conference of the IEEE Computer and Communication society. by

Non restricted mobility Broadcasting: Basic vehicle for on demand routing Available resources for node mobility Ad-hoc networks

Broadcasting in Ad hoc networksTypes of Broadcasting Flooding Probabilistic based Methods Area based methods Neighbor Knowledge Methods

Localized Globalized Require knowledge of the whole network. Mobility of nodes and changes in node’s activity status cause global changes in any MST structure. Extreme and unacceptable communication overhead Based only on the information from all nodes within a constant hop distance. Distances can be measured using signal strength, time delay or more sophisticated techniques like microwave distance. Globalized Vs Localized Protocols

Broadcasting in Ad hoc networks Neighbor Knowledge methods Connected Dominating Set( CDS) Neighbor Designating method (Dominant Pruning) Self Pruning

Self pruning The node decides for itself whether it is a forwarding or a non-forwarding node, based on neighborhood coverage condition. This paper provides a general framework based on which other specific algorithms can be developed.

Self pruning Assumptions Moderate mobility Near to accurate K-hop information (for small K)

Basics Forwarding or non-forwarding status Before a broadcast packet is received After the first copy is received After many copies of the packet are received. Static approach ( “up to date”) CDS based on network topology Dynamic approach ( “On the fly” ) Dependent on the location of the source and progress of the broadcast process

Neighbor Set Coverage On arrival at node v, the packet contains Information D(v) : this is the information about the “h” most recently visited nodes.

Coverage Condition 1 ( static) “Node v has a non-forward node status if for any two neighbors u and w, a replacement path exists that connects u and w via several intermediate nodes (if any) with higher priority values than the priority value of v.” In other words, assume that v is a non-forward node. Let N(v) be the neighbor set of node v, then for any u, w N(v), a replacement path (u, u1, u2,..., ul, w) exists such that id(u i ) > id(v) for 1 ≤i ≤ l.

Replacement paths Max-min node for (u, w, v) : A minimum node in a path is a node with the lowest priority. Assume {Pi} is the set of replacement paths for node v that connect u and w. A max-min node in {Pi} is a node with the highest priority among all the minimum nodes in {Pi}. Next we define a procedure called MAXMIN to construct a maximal replacement path for v that connects u and w. MAXMIN(u,w, v): 1: if u and w are directly connected then return. 2: Find the max-min node x for (u, w, v). 3: return path (MAXMIN (u, x, v), x, MAXMIN (x, w, v)).

Maximal replacement path Sample Maximal replacement path The priority can be based on a priori definition or it may be based on various metrics such as node degree Node 4 is the Max-Min node.

Coverage Condition I (dynamic) “Node v has a non-forward node status if for any two neighbors u and w, a replacement path exists that connects u and w via several intermediate nodes (if any) with either higher priority values than the priority value of v or with visited node status.” Because node 3 is a visited node, node 5 can conclude that it should be a non-forward node since any two neighbors can be connected using nodes 3 and 8.

Coverage Condition II ( dynamic) A set C (v) is called a coverage set of v if the neighbor set of v can be “covered” by nodes in C (v). In addition, nodes in C (v) are either visited nodes or nodes with higher priorities than v’ s priority. Clearly, all nodes in C (v) are within two hops of v. Note that C (v) may include some neighbors of v. Node v has a non-forward node status if it has a coverage set. In addition, the coverage set belongs to a connected component of the sub-graph induced from visited nodes and nodes with higher priority values than the priority value of v.

Neighborhood information Generalizing for k-hop approximation Coverage Condition I :Node v has a non-forward node status if for any two neighbors u and w, a replacement path exists that connects u and w via several intermediate nodes (if any) in Nk (v) with either higher priorities than the priority of v or with the visited node status. Coverage Condition II: Node v has a non-forward node status if it has a coverage set. In addition, the coverage set belongs to a connected component of the sub-graph induced from visited nodes and nodes with higher priorities than v’ s priority in Nk (v). where D is the density of the network; that is, maximum number of nodes per unit area.

Special cases Flooding A special case where no neighborhood information is available. Wu and Li’s algorithm: V is non forward because U. W are directly connected. V is non forward because X “covers” U and W This is a special case of the algorithm with 2 or 3 hop neighborhood information and no routing history.

Special cases continued… Stojmenovic’s Algorithm: Improvement on the Wu and Li algorithm Each node only maintains a list of its neighbors and their geographic positions. The number of forward nodes are further reduced by a neighbor elimination algorithm When a forward node v receives a broadcast packet, instead of forwarding the packet immediately, v will wait for a back off delay and monitor the forwarding activities of its neighbors. For each neighbor u that has forwarded the broadcast packet, node v removes N(u) from N(v). If N(v) is not empty after the delay period, node v forwards the broadcast packet; otherwise, node v becomes a non-forward node.

Simulation Results Comparisons for k-hop information Small neighborhoodLarge neighborhood

Simulation Results Comparison of different coverage conditions Small neighborhoodLarge neighborhood

Conclusion This general framework to reduce number of forward nodes, is more efficient than existing ones. It gives a perception on the mechanisms such as neighborhood information, routing history, coverage conditions and priority functions. Simulation shows that 1,2-hop routing history and coverage condition 2 are appropriate configuration parameters.

“ Localized Minimum-energy broadcasting in ad-hoc networks”

Topology Control Oriented Vs Broadcast Oriented Protocols Independently of broadcast utilization. All nodes can be a source of a broadcast. Minimizing the total transmission power. Broadcast Oriented Broadcast process from a given source node. Broadcasting incremental power. The sub graph introduced by the minimum energy broadcast does not need to be strongly connected. Topology Control Oriented

One –to-all Mobile nodes use omni directional antennas Various Communication Models One –to-one Nodes are equipped with directional antennas with small angles that can provide more energy savings Variable angular range The nodes can choose direction and width of the beam that allows to target several neighbor with one transmission. This paper discusses localized broadcast oriented protocols in one-to-all communication models in wireless ad-hoc networks.

Where is a real constant greater than 2 and r (u) is the range of the transmitting node. In reality, Energy Model The constant c is added in order to take into account the overhead due to signal processing, minimum energy needed for successful reception and MAC control messages.

Transmissions in all figures cost the same energy by using Pythagoras theorem and induction. (a) (b) (c) S D SD SD Total Power Consumption Each node has to reduce its transmission range while maintaining the connectivity of the graph. Energy Model (Contd.)

GLOBALIZEDLOCALIZED RNG BROADCAST ORIENTED PROTOCOL (RBOP) MINIMUM SPANNING TREE (MTCP) BROADCAST INCREMENTAL POWER (BIP) RNG TOPOLOGY CONTROL PROTOCOL (RTCP) TOPOLOGY ORIENTED BROADCAST ORIENTED Minimum Energy Broadcasting Protocols

Average degree is 8 Average degree is 2 Minimum Spanning Tree Algorithm Prim’s Algorithm

Broadcast Incremental Power (BIP) Wieselthier et al. Node 10 is the source

RNG Topology Control Protocol Substitute MST by the relative neighborhood graph (RNG) RNG can be deduced locally using the distance with its neighbors. With positioning system, nodes need only 1-hop information. Without positioning system,nodes can achieve RNG using 2-hop distance information.

RNG Broadcast Oriented Protocol ( RBOP) Node S emits its message with the range d (S,A), and A, B and C receive the message. The node C resends the message with range d (C,D). F applies neighbor elimination and eliminates E. At the same time, E decides not to send the message since all its RNG-neighbors are eliminated with the message from C. Finally when A forwards the message, F and G eliminate A from their respective neighborhood list and terminate the protocol for this broadcast since their lists are empty. B S C D E F A G S is the source

B S C D E F A G B S C D E F A G RNG Broadcast Oriented Protocol ( RBOP) The Broadcast is accomplished in 3 transmissions

RBOP Algorithm When receiving a new broadcast message: If the emitter is a RNG-neighbor; the node calculates the furthest of its RNG-neighbors that did not receive this message. The node resends the message according to this range or ignores the message if all of its RNG-neighbors have received the message. Otherwise, the node generates, for this broadcast, the list of RNG- neighbors that have not received this message. After a given timeout, if the neighbor list is not empty, the node retransmits the message with a range allowing to reach furthest neighbor in the associated list. When receiving an already received message: The node ignores the message if it has already forwarded it. The node removes the nodes that received this message from the associated neighborhood list. The message is ignored if the associated list is empty. Otherwise, if the message arrives on a RNG-edge send the message with range allowing to reach furthest neighbor in the list of non- eliminated RNG neighbors.

Comparison of Different Protocols = 2, c = 0, no. of nodes=n=100, maximum communication radius = R =250 m

Localized RBOP has quite close performance globalized MTCP protocol. BIP spends 50% less energy than RBOP in average case. This overhead compensates the network load which is needed for full knowledge of network in globalized solutions. EER of RBOP decreased with and c. Inference from the Graph

Conclusion A localized RNG based minimum energy broadcast RBOP that’s competes with globalized BIP protocol. MST structure does not necessarily capture the structural properties in case of broadcasting. Increased transmission radius beyond the value of the furthest uncovered neighbor in any MST does not necessarily increase the overall energy consumption. MPR (Multipoint relaying) broadcast and stochastic flooding and combination of both between RBOP may lead to improvement in the current results.

Summary Both the papers discuss broadcasting techniques in ad-hoc networks using neighborhood information. In the first case, algorithm prunes the number of nodes it needs to forward to. In the second paper, a decision is made whether a node should forward the packet or not. These two papers underscore two diverse ways to use metrics of k-hop neighborhood information for moderate values of k.