1/29/2016 Mobile Ad hoc Network COE 549 Deployment of Ad hoc Sensor Networks Tarek Sheltami KFUPM CCSE COE

Slides:



Advertisements
Similar presentations
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Advertisements

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Improvement on LEACH Protocol of Wireless Sensor Network
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
Robust Communications for Sensor Networks in Hostile Environments Ossama Younis and Sonia Fahmy Department of Computer Sciences, Purdue University Paolo.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006.
The Impact of Spatial Correlation on Routing with Compression in WSN Sundeep Pattem, Bhaskar Krishnamachri, Ramesh Govindan University of Southern California.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Delay Analysis of Large-scale Wireless Sensor Networks Jun Yin, Dominican University, River Forest, IL, USA, Yun Wang, Southern Illinois University Edwardsville,
Capacity of Wireless Mesh Networks: Comparing Single- Radio, Dual-Radio, and Multi- Radio Networks By: Alan Applegate.
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
City Univ of Hong Kong1 Minimal cost deployment of mesh networks with QoS requirements for indoor environment Xiaohua Jia Dept of Computer Science.
Clustering in Mobile Ad hoc Networks. Why Clustering? –Cluster-based control structures provides more efficient use of resources for large dynamic networks.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Mobile Ad hoc Networks Sleep-based Topology Control
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Coverage and Connectivity Issues in Sensor Networks
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Wireless Sensor Networks COE 499 Energy Aware Routing
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
NTU IM Page 1 of 35 Modelling Data-Centric Routing in Wireless Sensor Networks IEEE INFOCOM Author: Bhaskar Krishnamachari Deborah Estrin Stephen.
A Power Assignment Method for Multi-Sink WSN with Outage Probability Constraints Marcelo E. Pellenz*, Edgard Jamhour*, Manoel C. Penna*, Richard D. Souza.
Barrier Coverage With Wireless Sensors
MAIN RESULT: Depending on path loss and the scaling of area relative to number of nodes, a novel hybrid scheme is required to achieve capacity, where multihop.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Barrier Coverage With Wireless Sensors Santosh Kumar, Ten H. Lai, Anish Arora The Ohio State University Presented at Mobicom 2005.
1/8/2016 Wireless Sensor Networks COE 499 Sleep-based Topology Control I Tarek Sheltami KFUPM CCSE COE
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
ICIIS Peradeniya, Sri Lanka1 An Enhanced Top-Down Cluster and Cluster Tree Formation Algorithm for Wireless Sensor Networks H. M. N. Dilum Bandara,
Distributed Topology Control In Wireless Sensor Networks with Assymetric Links Presenter: Himali Saxena.
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Prof. Yu-Chee Tseng Department of Computer Science
Net 435: Wireless sensor network (WSN)
Coverage and Connectivity in Sensor Networks
Introduction Wireless Ad-Hoc Network
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
Presentation transcript:

1/29/2016 Mobile Ad hoc Network COE 549 Deployment of Ad hoc Sensor Networks Tarek Sheltami KFUPM CCSE COE 1

2 Outline Structured vs Randomization deployment Over deployment vs incremental deployment Network topology Connectivity in geometric random graphs Connectivity using power control COMPOW CBTC Coverage metrics K-coverage 1/29/2016

3 Structured vs Randomized deployment The randomized deployment approach is appealing for futuristic applications of a large scale nodes are dropped from aircraft or mixed into concrete before being embedded in a smart structure Many small-medium-scale WSNs are likely to be deployed in a structured manner via careful hand placement of network nodes In both cases, the cost and availability of equipment will often be a significant constraint

1/29/20164 Structured vs Randomized deployment.. Methodology of Structured Deployment: 1.Place sink/gateway device at a location that provides the desired wired network and power connectivity 2.Place sensor nodes in a prioritized manner at locations of the operational area where sensor measurements are needed 3.If necessary, add additional nodes to provide requisite network connectivity Step 2 can be challenging if it is not clear exactly where sensor measurements are needed, in which case a uniform or grid-like placement could be a suitable choice

1/29/20165 Structured vs Randomized deployment.. Adding nodes to ensure wireless connectivity is a challenging issue, particularly when there are location constraints in a given environment that dictate where nodes can or cannot be placed If the number of available nodes is small with respect to the size of the operational area and required coverage, a balance between sensing and routing nodes has to be optimized

1/29/20166 Structured vs Randomized deployment.. Randomized sensor deployment can be even more challenging in some respects, since there is no way to configure a priori the exact location of each device Additional post-deployment self-configuration mechanisms are required to obtain the desired coverage and connectivity In case of a uniform random deployment, the only parameters that can be controlled a priori are the numbers of nodes and some related settings on these nodes, such as their transmission range.

1/29/20167 Network Topology Single-hop star: The simplest WSN topology is the single-hop star Every node in this topology communicates its measurements directly to the gateway The networking concerns are reduced to a minimum The limitation of this topology is its poor scalability and robustness properties In larger areas, nodes that are distant from the gateway will have poor-quality wireless links

1/29/20168 Network Topology.. Multi-hop mesh and grid: For larger areas and networks, multi-hop routing is necessary. Depending on how they are placed, the nodes could form an arbitrary mesh graph or they could form a more structured communication graph such as the 2D grid structure

1/29/20169 Network Topology.. Two-tier hierarchical cluster: Multiple nodes within each local region report to different clusterheads There are a number of ways in which such a hierarchical architecture can be deployed An attractive approach in heterogeneous settings when the cluster-head nodes are more powerful in terms of computation/communication Decomposes a large network into separate zones within which data processing and aggregation can be performed locally

1/29/ Network Topology.. Two-tier hierarchical cluster (cont’d) Within each cluster there could be either single-hop or multi- hop communication Once data reach a cluster-head they would then be routed through the second tier network formed by cluster-heads to another cluster-head or a gateway The second-tier network may utilize a higher bandwidth radio or it could even be a wired network if the second-tier nodes can all be connected to the wired infrastructure

1/29/ Network Topology.. Two-tier hierarchical cluster (cont’d) Having a wired network for the second tier is relatively easy in building-like environments, but not for random deployments in remote locations In random deployments there may be no designated cluster- heads A self-election scheme should be used

1/29/ Network Topology.. Different deployment topologies: (a) a star-connected single-hop topology, (b) flat multi-hop mesh, (c) structured grid, and (d) two-tier hierarchical cluster topology

1/29/ Connectivity in Geometric Random Graphs The Bernoulli random graphs G(n, p) are formed by taking n vertices and placing random edges between each pair of vertices independently with probability p A random graph model represents wireless multi-hop networks is the geometric random graph G(n, R) In a G(n, R) geometric random graph, n nodes are placed at random with uniform distribution in a square area of unit size There is an edge (u, v) between any pair of nodes u and v, if the Euclidean distance between them is less than R Geometric random graphs do not show independence between edges. For instance, the probability that edge (u, v) exists is not independent of the probability that edge (u, w) and edge (v, w) exist

1/29/ Connectivity in Geometric Random Graphs..

1/29/ Connectivity in Geometric Random Graphs..

1/29/ Connectivity in Geometric Random Graphs.. Connectivity in G(n, R) Figure 2.3 shows how the probability of network connectivity varies as the radius parameter R of a geometric random graph is varied Depending on the number of nodes n, there exist different critical radii beyond which the graph is connected with high probability These transitions become sharper (shifting to lower radii) as the number of nodes increases. Figure 2.4 shows the probability that the network is connected with respect to the total number of nodes for different values of fixed transmission range in a fixed area for all nodes

1/29/ Connectivity in Geometric Random Graphs..

1/29/ Connectivity in Geometric Random Graphs..

1/29/ Connectivity in Geometric Random Graphs.. Connectivity in G(n, R) Gupta and Kumar have shown the following result: It means, the critical transmission range for connectivity is A geometric random graph G(n, R) attains the property that all nodes have at least K neighbors is asymptotically equal to the critical radius at which the graph attains the property of K- connectivity

1/29/ Connectivity in Geometric Random Graphs.. Monotone properties in G(n, R) A monotonically increasing property is any graph property that continues to hold if additional edges are added to a graph that already has the property Nearly all graph properties of interest from a networking perspective are monotone A key theoretical result pertaining to G(n, R) geometric random graphs is that all monotone properties show critical phase transitions All monotone properties are satisfied with high probability within a critical transmission range that is

1/29/ Connectivity in Geometric Random Graphs.. Connectivity in G(n, K) In G(n, K) geometric random graph model, n nodes are placed at random in a unit area, and each node connects to its K nearest neighbors It allows different nodes in the network to use different powers It is known that K must be higher than 0.074*log n and lower than 2.72*log n, in order to ensure asymptotically almost sure connectivity

1/29/ Connectivity in Geometric Random Graphs.. Connectivity and coverage in G grid (n, p, R) In the unreliable sensor grid model, n nodes are placed on a square grid within a unit area, p is the probability that a node is active (not failed), and R is the transmission range of each node For this unreliable sensor grid model, the following properties have been determined: For the active nodes to form a connected topology, as well as to cover the unit square region, p*R 2 must be The maximum number of hops required to travel from any active node to another is There exists a range of p values sufficiently small such that the active nodes form a connected topology but do not cover the unit square.

1/29/ Connectivity using Power Control Once the nodes are in place, transmission power settings can be used to adjust the connectivity properties of the deployed network It can extend the communication range, increasing the number of communicating neighboring nodes and improving connectivity in the form of availability of end-to-end paths. For existing neighbors, it can improve link quality (in the absence of other interfering traffic It can induce additional interference that reduces capacity and introduces congestion Some of these distributed algorithms aim to develop topologies that minimize total power consumption over routing paths, while others aim to minimize transmission power settings of each node while ensuring connectivity

1/29/ Common Power Protocol The authors claim that the protocol ensures that the lowest common power level that ensures maximum network connectivity Protocol Description First multiple shortest path algorithms are performed, one at each possible power level Each node then examines the routing tables generated by the algorithm and picks the lowest power level such that the number of reachable nodes is the same as the number of nodes reachable with the maximum power level Drawbacks 1.It is not very scalable 2.By strictly enforcing common powers, it is possible that a single relatively isolated node can cause all nodes in the network to have unnecessarily large power levels

1/29/ Cone-Based Topology Control Protocol The authors claim that the protocol provides a minimal direction- based distributed rule to ensure that the whole network topology is connected, while keeping the power usage of each node as small as possible. Protocol Description Each node keeps increasing its transmit power until it has at least one neighboring node in every cone or it reaches its maximum transmission power limit It is assumed here that the communication range increases monotonically with transmit power CBTC showed that suffices to ensure that the network is connected A tighter result has shown that can further reduced to

1/29/ Cone-Based Topology Control Protocol Illustration of the cone-based topology control (CBTC) construction On the left an intermediate power level for a node at which there exists an cone in which the node does not have a neighbor. Therefore, as seen on the right, the node must increase its power until at least one neighbor is present in every.

1/29/ Coverage Metrics The choice of coverage metric is highly dependent on the application In most networks the objective is simply to ensure that there exists a path between every pair of nodes If robustness is a concern, the K-connectivity metric may be used

1/29/ K-Coverage A field is said to be K-covered if every point in the field is within the overlapping coverage region of at least K sensors. Only 2D coverage is considered in our course In an s ×s unit area, with a grid of resolution unit distance, there will be such points to examine, which can be computationally intensive

1/29/ K-Coverage.. A slightly more sophisticated approach would attempt to enumerate all subregions resulting from the intersection of different sensor node-regions and verify if each of these is K-covered In the worst case there can be O(n 2 ) such regions and they are not straightforward to compute

1/29/ K-Coverage.. An area with 2-coverage (note that all intersection points are 2-covered)

1/29/ K-Coverage..