Architectures and Applications for Wireless Sensor Networks (01204525) Topology Control Chaiporn Jaikaeo Department of Computer Engineering.

Slides:



Advertisements
Similar presentations
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Advertisements

1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 23rd Lecture Christian Schindelhauer.
4/29/2015 Wireless Sensor Networks COE 499 Deployment of Sensor Networks II Tarek Sheltami KFUPM CCSE COE
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1st Meeting Industrial Geometry Computational Geometry ---- Some Basic Structures 1st IG-Meeting.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 18th Lecture Christian Schindelhauer.
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach Stefan Schmid Roger Wattenhofer Aaron Zollinger.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Topology Control Murat Demirbas SUNY Buffalo Uses slides from Y.M. Wang and A. Arora.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 20th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Network Kernel Architectures and Implementation ( ) Naming and Addressing Chaiporn Jaikaeo Department of Computer Engineering.
Design and Analysis of Computer Algorithm September 10, Design and Analysis of Computer Algorithm Lecture 5-2 Pradondet Nilagupta Department of Computer.
Efficient Gathering of Correlated Data in Sensor Networks
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Network Kernel Architectures and Implementation ( ) Network Architecture Chaiporn Jaikaeo Department of Computer Engineering.
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Connected Dominating Sets. Motivation for Constructing CDS.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Maximizing the lifetime of WSN using VBS Yaxiong Zhao and Jie Wu Computer and Information Sciences Temple University.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Algorithm Design and Analysis June 11, Algorithm Design and Analysis Pradondet Nilagupta Department of Computer Engineering This lecture note.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
Greedy Algorithms.
Does Topology Control Reduce Interference?
Topology Control –power control
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
Net 435: Wireless sensor network (WSN)
Topology Control and Its Effects in Wireless Networks
Introduction Wireless Ad-Hoc Network
Data-Centric Networking
Overview: Chapter 4 Infrastructure Establishment
Presentation transcript:

Architectures and Applications for Wireless Sensor Networks ( ) Topology Control Chaiporn Jaikaeo Department of Computer Engineering Kasetsart University Materials taken from lecture slides by Karl and Willig

2 Overview Motivation, basics Motivation, basics Power control Power control Backbone construction Backbone construction Clustering Clustering Adaptive node activity Adaptive node activity

3 Motivation: Dense networks Too many collisions/too complex operation for a MAC protocol, too many paths to chose from for a routing protocol, … Too many collisions/too complex operation for a MAC protocol, too many paths to chose from for a routing protocol, … Idea: Make topology less complex Idea: Make topology less complex  Topology: Which node is able/allowed to communicate with which other nodes  Topology control needs to maintain invariants, e.g., connectivity

4 Options for topology control Topology control Control node activity – deliberately turn on/off nodes Control link activity – deliberately use/not use certain links Topology control Flat network – all nodes have essentially same role Hierarchical network – assign different roles to nodes; exploit that to control node/link activity Power controlBackbonesClustering

5 Flat networks Main option: Control transmission power Main option: Control transmission power Alternative: Selectively discard some links Alternative: Selectively discard some links  Usually done by introducing hierarchies

6 Hierarchical Networks Construct a backbone network Construct a backbone network  Some nodes form a (minimal) dominating set  Controlling nodes have to be connected (backbone) Formally: Given graph G=(V,E), construct D  V such that Formally: Given graph G=(V,E), construct D  V such that

7 Hierarchical Networks Construct clusters Construct clusters  Each node in exactly one group  Except “bridging” nodes  Groups can have clusterheads  Typically: all nodes in a cluster are direct neighbors of their clusterhead  Clusterheads form both Independent set and Dominating Set  Clusterheads + bridges  Connected Dominating set

8 Cluster Formulation Formally: Given graph G=(V,E), construct C  V such that Formally: Given graph G=(V,E), construct C  V such that

9 Aspects of Topology Control Connectivity Connectivity Stretch factor – should be small Stretch factor – should be small  Hop stretch factor: how much longer are paths in G 0 than in G?  Energy stretch factor: how much more energy does the most energy-efficient path need? Throughput – removing nodes/links can reduce throughput, by how much? Throughput – removing nodes/links can reduce throughput, by how much? Robustness to mobility Robustness to mobility Algorithm overhead Algorithm overhead

10 Example: Maintaining connectivity Maintaining connectivity can be very “costly” for a power control approach Maintaining connectivity can be very “costly” for a power control approach

11 Overview Motivation, basics Motivation, basics Power control Power control Backbone construction Backbone construction Clustering Clustering Adaptive node activity Adaptive node activity

12 Power control – Magic Numbers? Idea: Controlling transmission power corresponds to controlling the number of neighbors for a given node Idea: Controlling transmission power corresponds to controlling the number of neighbors for a given node Is there an “optimal” number of neighbors a node should have? Is there an “optimal” number of neighbors a node should have? Historically, k=6 or k=8 had been suggested as such “magic numbers” Historically, k=6 or k=8 had been suggested as such “magic numbers”  However, they optimize progress per hop – they do not guarantee connectivity of the graph!!

13 Controlling Number of Neighbors Assumption: Nodes randomly, uniformly placed, only transmission range is controlled, identical for all nodes, only symmetric links are considered Assumption: Nodes randomly, uniformly placed, only transmission range is controlled, identical for all nodes, only symmetric links are considered Result: For connected network, required number of neighbors per node is  (log |V|) Result: For connected network, required number of neighbors per node is  (log |V|)  It is not a constant, but depends on the number of nodes!  Constants can be bounded

14 Example: Power Control Basic idea for most of the following methods: Basic idea for most of the following methods:  Given a graph G=(V,E)  Produce a graph G 0 =(V,E 0 ) that maintains connectivity with fewer edges  Assume, e.g., knowledge about node positions  Construction should be local (for distributed implementation)

15 Example 1: Relative Neighborhood Graph (RNG) Edge between nodes u and v if and only if there is no other node w that is closer to either u or v Edge between nodes u and v if and only if there is no other node w that is closer to either u or v RNG maintains connectivity of the original graph RNG maintains connectivity of the original graph Easy to compute locally Easy to compute locally Worst-case spanning ratio is  (|V|) Worst-case spanning ratio is  (|V|) Average degree is 2.6 Average degree is 2.6 Connected only when this region is empty

16 Example 2: Gabriel Graph (GG) Similar to RNG Similar to RNG Difference: Smallest circle with nodes u and v on its circumference must only contain node u and v Difference: Smallest circle with nodes u and v on its circumference must only contain node u and v Properties: Maintains connectivity, worst-case spanning ratio  (|V| 1/2 ), worst-case degree  (|V|) Properties: Maintains connectivity, worst-case spanning ratio  (|V| 1/2 ), worst-case degree  (|V|) Connected only when this circle is empty

17 Example 3: Delaunay triangulation Construct Voronoi diagram Construct Voronoi diagram  Can be done in O(|V| log |V|) time Connect any two nodes for which the Voronoi regions touch Connect any two nodes for which the Voronoi regions touch  Delaunay triangulation  Delaunay triangulation Problem: Might produce very long links; not well suited for power control Problem: Might produce very long links; not well suited for power control Voronoi region for upper left node Edges of Delaunay triangulation

18 Example 4: Cone-Based Topology Control Assumption: Distance and angle information between nodes is available Assumption: Distance and angle information between nodes is available Two-phase algorithm Two-phase algorithm Phase 1 Phase 1  Every node starts with a small transmission power  Increase it until a node has sufficiently many neighbors  When there is at least one neighbor in each cone of angle    = 5/6  is necessary and sufficient condition for connectivity!

19 Cone-Based Topology Control Phase 2 Phase 2  Remove redundant edges: Drop a neighbor w of u if there is a node v of w and u such that sending from u to w directly is less efficient than sending from u via v to w  Essentially, a local Gabriel graph construction

20 Cone-Based Topology Control Properties: simple, local construction Properties: simple, local construction Extensions for k-connectivity (Yao graph) Extensions for k-connectivity (Yao graph) 22 22 22 22 22 22 22 22

21 Centralized Algorithm Goal: Find topology control algorithm minimizing the maximum power used by any node Goal: Find topology control algorithm minimizing the maximum power used by any node Idea: Use a centralized, greedy algorithm Idea: Use a centralized, greedy algorithm  Initially, all nodes have transmission power 0  Connect those two components with the shortest distance between them (raise transmission power accordingly)  Remove redundant links Based on Kruskal's MST Based on Kruskal's MST

22 Centralized Algorithm A B C D E F D Topology 1 1 A B C D E F 1) Connect A-C and B-D A B C D E F 2) Connect A-B A B C D E F 3) Connect C-D A B C E F 4) Connect C-E and D-F A B C D E F 5) Remove edge A-B

23 Overview Motivation, basics Motivation, basics Power control Power control Backbone construction Backbone construction Clustering Clustering Adaptive node activity Adaptive node activity

24 Hierarchical Networks – Backbones Idea: Select some nodes from the network/graph to form a backbone Idea: Select some nodes from the network/graph to form a backbone  A connected, minimal, dominating set (MDS or MCDS)  Dominating nodes control their neighbors  Protocols like routing are confronted with a simple topology – from a simple node, route to the backbone, routing in backbone is simple (few nodes) Problem: MDS/MCDS is an NP-hard problem Problem: MDS/MCDS is an NP-hard problem

25 Backbone by growing a tree Construct the backbone as a tree, grown iteratively Construct the backbone as a tree, grown iteratively

26 Backbone by growing a tree – Example 1:2: 3:4:

27 Start big, make lean Idea: start with some, possibly large, connected dominating set, reduce it by removing unnecessary nodes Idea: start with some, possibly large, connected dominating set, reduce it by removing unnecessary nodes Initial construction for dominating set Initial construction for dominating set  All nodes are initially white  Mark any node black that has two neighbors that are not neighbors of each other (they might need to be dominated)  Black nodes form a connected dominating set (proof by contradiction); shortest path between ANY two nodes only contains black nodes

28 Overview Motivation, basics Motivation, basics Power control Power control Backbone construction Backbone construction Clustering Clustering Adaptive node activity Adaptive node activity

29 Clustering Partition nodes into clusters Partition nodes into clusters Many options for details Many options for details  Are there clusterheads?  May clusterheads be neighbors?  If not  Independent Set  May clusters overlap? Do they have nodes in common?

30 Clustering Further options Further options  How do clusters communicate?  Some nodes need to act as gateways between clusters  If clusters may not overlap, two nodes need to jointly act as a distributed gateway  Is there a hierarchy of clusters?

31 Constructing Independent Sets Make each node a clusterhead that locally has the largest priority Make each node a clusterhead that locally has the largest priority Once a node is dominated by a clusterhead, it abstains from local competition, giving other nodes a chance Once a node is dominated by a clusterhead, it abstains from local competition, giving other nodes a chance Init: Step 1: Step 2: Step 3: Step 4:

32 Connecting Clusters Suppose: Clusterheads have been found Suppose: Clusterheads have been found How to connect the clusters, how to select gateways? How to connect the clusters, how to select gateways? It suffices for each clusterhead to connect to all other clusterheads that are at most three hops It suffices for each clusterhead to connect to all other clusterheads that are at most three hops  Resulting backbone is connected

33 Rotating clusterheads Serving as a clusterhead can put additional burdens on a node Serving as a clusterhead can put additional burdens on a node  For MAC coordination, routing, … Let this duty rotate among various members Let this duty rotate among various members  Periodically reelect – useful when energy reserves are used as discriminating attribute  LEACH – determine an optimal percentage P of nodes to become clusterheads in a network

34 Overview Motivation, basics Motivation, basics Power control Power control Backbone construction Backbone construction Clustering Clustering Adaptive node activity Adaptive node activity

35 Adaptive node activity Remaining option: Turn some nodes off deliberately Remaining option: Turn some nodes off deliberately Only possible if other nodes remain on that can take over their duties Only possible if other nodes remain on that can take over their duties Example duty: Packet forwarding Example duty: Packet forwarding  Approach: Geographic Adaptive Fidelity (GAF) r r R Observation: Any two nodes within a square of length r < R/5 1/2 can replace each other with respect to forwarding Observation: Any two nodes within a square of length r < R/5 1/2 can replace each other with respect to forwarding  R radio range Keep only one such node active, let the other sleep Keep only one such node active, let the other sleep

36 Conclusion Various approaches exist to trim the topology of a network to a desired shape Various approaches exist to trim the topology of a network to a desired shape Most of them bear some non-negligible overhead Most of them bear some non-negligible overhead  At least: Some distributed coordination among neighbors, or they require additional information  Constructed structures can turn out to be somewhat brittle – overhead might be wasted or even counter- productive Benefits have to be carefully weighted against risks for the particular scenario at hand Benefits have to be carefully weighted against risks for the particular scenario at hand