1 Routing on a Logical Grid Mohamed Gouda, Anish Arora, Young-ri Choi, Vinayak Naik The University of Texas at Austin The Ohio-State University January.

Slides:



Advertisements
Similar presentations
What Is an Ad Hoc Network?
Advertisements

CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Communication Networks Recitation 3 Bridges & Spanning trees.
IP Fast Reroute Using Tunnel-AT draft-xu-ipfrr-tunnelat-00 Mingwei Xu, Lingtao Pan, Qing Li Tsinghua University, China 75 th IETF Meeting, Stockholm July.
Lecture 8: Asynchronous Network Algorithms
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Lecture 4: Routing Anish Arora CIS788.11J Introduction to Wireless Sensor Networks Material uses slides from Wattenhofer, Gouda, Estrin.
Courtesy: Nick McKeown, Stanford
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 7 Instructor: Haifeng YU.
STP Spanning tree protocol. Trunk port : A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a specific.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Complexity of Network Synchronization Raeda Naamnieh.
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
DNA Research Group 1 CountTorrent: Ubiquitous Access to Query Aggregates in Dynamic and Mobile Sensor Networks Abhinav Kamra, Vishal Misra and Dan Rubenstein.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
COMPUTER NETWORKS.
Routing Two papers: Location-Aided Routing (LAR) in mobile ad hoc networks (2000) Ad-hoc On-Demand Distance Vector Routing (1999)
Ming-Yu Jiang and Wanjiun Liao,IEEE ICC 2002 Family ACK Tree (FAT): A New Reliable Multicast Protocol for Mobile Ad Hoc Networks. Speaker : Wilson Lai.
Slide /2009COMM3380 Routing Algorithms Distance Vector Routing Each node knows the distance (=cost) to its directly connected neighbors A node sends.
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Link-state routing  each node knows network topology and cost of each link  quasi-centralized: each router periodically broadcasts costs of attached.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Compressive Data Gathering for Large-Scale Wireless Sensor Networks Chong Luo Feng Wu Jun Sun Chang Wen Chen.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
CIS 725 Network Layer. This layer provides communication between any two nodes Uniform addressing scheme independent of the network technology Network.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Computer Networks Dr. Jorge A. Cobb The Performance of Query Control Schemes for the Zone Routing Protocol.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Routing and Routing Protocols
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
By Matthew. Advantages: Can share and keep information private within a network Workstations do not need a hard drive to access the information Users.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
TOPICS INTRODUCTION CLASSIFICATION CHARACTERISTICS APPLICATION RELATED WORK PROBLEM STATEMENT OBJECTIVES PHASES.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks Matthew J. Miller, Cigdem Sengul, Indranil Gupta Department of Computer.
Routing Murat Demirbas SUNY Buffalo. 2 Routing patterns in WSN Model: static large-scale WSN Convergecast: Nodes forwards their data to basestation over.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
Routing: Distance Vector Algorithm
Intradomain Routing Outline Introduction to Routing
Communication Networks
Greedy Distributed Spanning tree routing (gdstr)
Bridges and Link Layer Switches
Bridges Neil Tang 10/10/2008 CS440 Computer Networks.
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

1 Routing on a Logical Grid Mohamed Gouda, Anish Arora, Young-ri Choi, Vinayak Naik The University of Texas at Austin The Ohio-State University January 2004

2 New Routing Protocol We present a new routing protocol that is suitable for the Echelon demo This protocol is simple: it requires each mote to send only one three-byte msg every 3 seconds This protocol is reliable: it can overcome random msg loss and mote failure

3 Motes A mote is a small computer that has a sensor board (sensing magnetism, sound, movement, etc.) A mote can communicate with adjacent motes by broadcasting messages over radio channels (i.e. wireless comm.). The motes in a network need to periodically send their sensing data to a particular mote called the network root.

4 The Logical Grid The motes are named as if they form an M*N logical grid Each mote is named by a pair (i, j) where i = 0.. M-1 and j = 0.. N-1 The network root is mote (0,0) Physical connectivity between motes is a superset of their connectivity in the logical grid: (0,0) (0,1) (1,1) (1,0) (2,1) (2,0) (0,0) (0,1) (1,0) (1,1) (2,0) (2,1)

5 Neighbors Each mote (i, j) has two low-neighbors (i-H, j) and (i, j-H) two high-neighbors (i+H, j) and (i, j+H) H is a positive integer called the tree hop If a mote (i, j) receives a msg from any mote other than its low- and high-neighbors, (i, j) discards the msg (i, j+H) (i+H, j) (i, j-H) (i-H, j) (i, j)

6 Communication Pattern Each mote (i, j) can send msgs whose ultimate destination is mote (0, 0) The motes need to maintain an incoming spanning tree whose root is (0, 0): each mote maintains a pointer to its parent When a mote (i, j) has a msg, it forwards the msg to its parent. This continues until the msg reaches mote (0, 0). (H = 2)

7 Choosing the Parent Usually, each mote (i, j) chooses one of its low-neighbors (i-H, j) or (i, j-H) to be its parent If both its low-neighbors fail, then (i, j) chooses one of its high- neighbors (i+H, j) or (i, j+H) to be its parent. This is called inversion Example: there is one inversion at mote (2, 2) because the two low-neighbors of (2, 2) have failed. (H = 2) failed

8 Inversion Count Each mote (i, j) maintains  the id (x, y) of its parent, and  the value c of its inversion count: the number of inversions that occur along the tree from (i, j) to (0, 0) Inversion count c has an upper value cmax Example: failed (H = 2) (3,2), 1(0,3), 0 (0,1), 0 (0,0), 0

9 Protocol Message If a mote (i, j) has a parent, then every 3 seconds it sends a msg with three fields: connected(i, j, c) where c is the inversion count of mote (i,j) Otherwise, mote (i, j) does nothing. Every 3 seconds, mote (0, 0) sends a msg with three fields: connected(0, 0, 0)

10 Acquiring a Parent Initially, every mote (i, j) has no parent. When mote (i, j) has no parent and receives connected(x, y, e), (i, j) chooses (x, y) as its parent if (x, y) is its low-neighbor, or if (x, y) is its high-neighbor and e < cmax When mote (i, j) receives a connected(x, y, e) and chooses (x, y) to be its parent, (i, j) computes its inversion count c as: if (x, y) is low-neighbor, c := e if (x, y) is high-neighbor, c := e + 1

11 Keeping the Parent If mote (i, j) has a parent (x, y) and receives any connected(x, y, e) then (i, j) updates its inversion count c as: if (x, y) is low-neighbor, c := e if (x, y) is high-neighbor and e < cmax, c := e + 1 if (x, y) is high-neighbor and e = cmax, then (i, j) loses its parent

12 Losing the Parent There are two scenarios that cause mote (i, j) to lose its parent (x, y) (i, j) receives a connected(x, y, cmax) msg and (x, y) happens to be a high-neighbor of (i, j) (i, j) does not receive any connected(x, y, e) msg for 30 seconds

13 Replacing the Parent If mote (i, j) has a parent (x, y), and receives a connected(u, v, f) msg where (u, v) is a neighbor of (i, j), and (i,j) detects that by adopting (u, v) as a parent and using f to compute its inversion count c, the value of c is reduced then (i, j) adopts (u, v) as its parent and recomputes its inversion count

14 For Line-in-the-Sand Demo We made the following decisions: Adjacent motes are placed 5 feet apart (to ensure accurate sensing). The motes are arranged in 7*13 grid (to cover the designated area for the demo). H = 2 (since reliable communication is ensured between two motes that are 15 feet apart). cmax = 3

15 Two Problems of this Protocol The protocol does not take advantage of any long links between motes that are not neighbors in the logical grid In an MxN grid, the protocol causes an average application message to make (M+N)/2H hops, which is relatively large For M=7, N=13, H=2, the average message makes 5 hops

16 Problems can be solved By allowing long links in the routing tree reducing the number of hops traveled by the application data messages

17 Allowing Long Links Add the following rule to the previous rules for acquiring and replacing a parent: If any mote (i,j) ever receives a message connected(0,0,0), then mote (i,j) makes mote (0,0) its parent

18 Reducing Number of Hops A mote (i,j) accepts any received application data(x,y,txt) message iff x=i and y=j This applies only when i!=0 or j!=0 Mote (0,0) accepts any received application data(x,y,txt) message

19 Concluding Remarks Currently Choi is working on simulating the grid routing protocol, after adding these two modifications, on a 5x5 grid Stay tuned!