Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Networking Graph Theory Unplugged WG 2004

Similar presentations


Presentation on theme: "Wireless Networking Graph Theory Unplugged WG 2004"— Presentation transcript:

1 Wireless Networking Graph Theory Unplugged WG 2004
Distributed Computing Group Roger Wattenhofer

2 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Ad-Hoc and Sensor Networks Routing / Broadcasting Clustering Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

3 Wireless ad-hoc nodes (“terminodes”) are distributed
Radio Power Wireless ad-hoc nodes (“terminodes”) are distributed Processor Sensors Picture is from the Berkeley Smart Dust project: The RF motes' final design was finished in the early part of 1999.  Since then, various projects have been undertaken to test communication protocols for distributed sensor networks with the RF motes. Memory

4 What are Ad-Hoc/Sensor Networks?
Roger Wattenhofer, ETH WG 2004

5 Open Problem #1: Positioning and Virtual Coordinates
Unit Disk Graph: Link if and only if Euclidean distance at most 1. Positioning: Some nodes know their position (“anchor nodes”). Virtual Coordinates: Unit Disk Graph Embedding Graph Drawing? (Edge crossings  I couldn’t care less!!!) Known to be NP-hard [Breu & Kirkpatrick 1998] There is no PTAS [Kuhn et al, 2004] Approximation algorithms? Minimize ratio of longest edge over shortest non-edge. Mobile/dynamic nodes  Local updates, stability Roger Wattenhofer, ETH WG 2004

6 Routing in Ad-Hoc Networks
Multi-Hop Routing Moving information through a network from a source to a destination if source and destination are not within mutual transmission range Reliability Nodes in an ad-hoc network are not 100% reliable Algorithms need to find alternate routes when nodes are failing Mobile Ad-Hoc Network (MANET) It is often assumed that the nodes are mobile (“Moteran”) Roger Wattenhofer, ETH WG 2004

7 Simple Classification of Ad-hoc Routing Algorithms
Proactive Routing Small topology changes trigger a lot of updates, even when there is no communication  does not scale Reactive Routing Flooding the whole network does not scale Distance Vector Routing: as in a fixnet nodes maintain routing tables using update messages Flooding: when node received message the first time, forward it to all neighbors DSDV 10 tricks  2^10 algorithms no mobility critical mobility mobility very high Source Routing (DSR, AODV): flooding, but re-use old routes Roger Wattenhofer, ETH WG 2004

8 Roger Wattenhofer, ETH Zurich @ WG 2004
Discussion Lecture “Mobile Computing”: 10 Tricks  210 routing algorithms In reality there are almost that many! Q: How good are these routing algorithms?!? Any hard results? A: Almost none! Method-of-choice is simulation… Perkins: “if you simulate three times, you get three different results” Flooding is key component of (many) proposed algorithms At least flooding should be efficient Wattenhofer: “even if you don’t implement provably good algorithms (because they are too complicated, or too simple), they still help you to understand the problem” Roger Wattenhofer, ETH WG 2004

9 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Flooding vs. Dominating Sets Algorithm Overview Phase A Phase B Lower Bounds Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

10 Finding a Destination by Flooding
One active node > weight 1 Roger Wattenhofer, ETH WG 2004

11 Finding a Destination Efficiently
One active node > weight 1 Roger Wattenhofer, ETH WG 2004

12 (Connected) Dominating Set
A Dominating Set DS is a subset of nodes such that each node is either in DS or has a neighbor in DS. A Connected Dominating Set CDS is a connected DS, that is, there is a path between any two nodes in CDS that does not use nodes that are not in CDS. It might be favorable to have few nodes in the (C)DS. This is known as the Minimum (C)DS problem. Dominating set problem: how many queens do you need to attack/own all 64 squares of the chess board. How many for a CDS? Popular in 1850 among chess players (also famous: maximum independent set) Answer 5. rows 2,3,4,5,8 in column D, is also CDS. Show it! Ask them what they think. Dominating set is an important problem. Domination number \gamma of a graph is the size of the smallest dominating set Roger Wattenhofer, ETH WG 2004

13 Formal Problem Definition: M(C)DS
Input: We are given an (arbitrary) undirected graph. Output: Find a Minimum (Connected) Dominating Set, that is, a (C)DS with a minimum number of nodes. Problems M(C)DS is NP-hard Find a (C)DS that is “close” to minimum (approximation) The solution must be local (global solutions are impractical for mobile ad-hoc network) – topology of graph “far away” should not influence decision who belongs to (C)DS Roger Wattenhofer, ETH WG 2004

14 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Flooding vs. Dominating Sets Algorithm Overview Phase A Phase B Lower Bounds Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

15 Roger Wattenhofer, ETH Zurich @ WG 2004
Algorithm Overview Input: Local Graph Fractional Dominating Set Dominating Set Connected Dominating Set 0.2 0.2 0.5 0.3 0.3 0.8 0.5 0.2 0.1 Phase A: Distributed linear program rel. high degree gives high value Phase B: Probabilistic algorithm Phase C: Connect DS by “tree” of “bridges” Roger Wattenhofer, ETH WG 2004

16 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Flooding vs. Dominating Sets Algorithm Overview Phase A Phase B Lower Bounds Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

17 Phase A is a Distributed Linear Program
Nodes 1, …, n: Each node u has variable xu with xu ¸ 0 Sum of x-values in each neighborhood at least 1 (local) Minimize sum of all x-values (global) = 1.5 ¸ 1 Linear Programs can be solved optimally in polynomial time But not in a distributed fashion! That’s what we do here… Linear Program 0.2 0.2 0.5 0.3 0.3 0.8 0.5 0.2 0.1 Adjacency matrix with 1’s in diagonal Roger Wattenhofer, ETH WG 2004

18 Roger Wattenhofer, ETH Zurich @ WG 2004
Phase A Algorithm A constant series of steps. In each step each node talks to all the neighbors, and then does local computation… Roger Wattenhofer, ETH WG 2004

19 Roger Wattenhofer, ETH Zurich @ WG 2004
Result after Phase A Distributed Approximation for Linear Program Instead of the optimal values xi* at nodes, nodes have xi(), with The value of  depends on the number of rounds k (the locality) For some special kind of graphs alpha with only 1 round (regular graphs) Roger Wattenhofer, ETH WG 2004

20 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Flooding vs. Dominating Sets Algorithm Overview Phase A Phase B Lower Bounds Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

21 Dominating Set as Integer Program
What we have after phase A What we want after phase B Roger Wattenhofer, ETH WG 2004

22 Roger Wattenhofer, ETH Zurich @ WG 2004
Phase B Algorithm Each node applies the following algorithm: Calculate (= maximum degree of neighbors in distance 2) Become a dominator (i.e. go to the dominating set) with probability Send status (dominator or not) to all neighbors If no neighbor is a dominator, become a dominator yourself From phase A Highest degree in distance 2 1 takes two rounds… Roger Wattenhofer, ETH WG 2004

23 Roger Wattenhofer, ETH Zurich @ WG 2004
Result after Phase B Randomized rounding technique Expected number of nodes joining the dominating set in step 2 is bounded by  log(+1) ¢ |DSOPT|. Expected number of nodes joining the dominating set in step 4 is bounded by |DSOPT|. Theorem: E[|DS|] · O( ln  ¢ |DSOPT|) Roger Wattenhofer, ETH WG 2004

24 Related Work on (Connected) Dominating Sets
Global algorithms Johnson (1974), Lovasz (1975), Slavik (1996): Greedy is optimal Guha, Kuller (1996): An optimal algorithm for CDS Feige (1998): ln  lower bound unless NP 2 nO(log log n) Local (distributed) algorithms “Handbook of Wireless Networks and Mobile Computing”: All algorithms presented have no guarantees Gao, Guibas, Hershberger, Zhang, Zhu (2001): “Discrete Mobile Centers” O(loglog n) time, but nodes know coordinates MIS-based algorithms (e.g. Alzoubi, Wan, Frieder, 2002) that only work on unit disk graphs. Kuhn, Wattenhofer (2003): Tradeoff time vs. approximation Roger Wattenhofer, ETH WG 2004

25 Roger Wattenhofer, ETH Zurich @ WG 2004
Recent Improvements Improved algorithms (Kuhn, Wattenhofer, 2004): O(log2 / 4) time for a (1+)-approximation of phase A with logarithmic sized messages. If messages can be of unbounded size there is a constant approximation of phase A in O(log n) time, using the graph decomposition by Linial and Saks. An improved and generalized distributed randomized rounding technique for phase B. Works for quite general linear programs. Is it any good…? Roger Wattenhofer, ETH WG 2004

26 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Flooding vs. Dominating Sets Algorithm Overview Phase A Phase B Lower Bounds Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

27 Lower Bound for Dominating Sets: Intuition…
Two graphs (m << n). Optimal dominating sets are marked red. complete n n n n-1 m m m n |DSOPT| = 2. |DSOPT| = m+1. Roger Wattenhofer, ETH WG 2004

28 Lower Bound for Dominating Sets: Intuition…
In local algorithms, nodes must decide only using local knowledge. In the example green nodes see exactly the same neighborhood. So these green nodes must decide the same way! n-1 m m n Roger Wattenhofer, ETH WG 2004

29 Lower Bound for Dominating Sets: Intuition…
But however they decide, one way will be devastating (with n = m2)! complete n n n n-1 m m m n |DSOPT| = 2. |DSOPT without green| ¸ m. |DSOPT| = m+1. |DSOPT with green| > n Roger Wattenhofer, ETH WG 2004

30 Roger Wattenhofer, ETH Zurich @ WG 2004
The Lower Bound Lower bounds (Kuhn, Moscibroda, Wattenhofer, 2004): Model: In a network/graph G (nodes = processors), each node can exchange a message with all its neighbors for k rounds. After k rounds, node needs to decide. We construct the graph such that there are nodes that see the same neighborhood up to distance k. We show that node ID’s do not help, and using Yao’s principle also randomization does not. Results: Many problems (vertex cover, dominating set, matching, etc.) can only be approximated (nc/k2 / k) and/or (1/k / k). It follows that a polylogarithmic dominating set approximation (or maximal independent set, etc.) needs at least (log  / loglog ) and/or ((log n / loglog n)1/2) time. Roger Wattenhofer, ETH WG 2004

31 Graph Used in Dominating Set Lower Bound
The example is for k = 3. All edges are in fact special bipartite graphs with large enough girth. Roger Wattenhofer, ETH WG 2004

32 Clustering for Unstructured Radio Networks
“Big Bang” (deployment) of a sensor and/or ad-hoc network: Nodes wake up asynchronously (very late, maybe) Neighbors unknown Hidden terminal problem No global clock No established MAC protocol No reliable collision detection Limited knowledge of the number of nodes or degree of network. We have randomized algorithms that compute DS (or MIS) in polylog(n) time even under these harsh circumstances, where n is an upper bound on the number of nodes in the system. [Kuhn, Moscibroda, Wattenhofer, 2004] Roger Wattenhofer, ETH WG 2004

33 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Topology Control What is it? What is it good for? Does Topology Control Reduce Interference? Cellular Networks, Sensor Networks, etc. Conclusions Roger Wattenhofer, ETH WG 2004

34 Roger Wattenhofer, ETH Zurich @ WG 2004
Topology Control Drop long-range neighbors: Reduces interference and energy! But still stay connected (or even spanner) Roger Wattenhofer, ETH WG 2004

35 Topology Control as a Trade-Off
Sometimes also clustering (first part of the talk) is called topology control Topology Control Network Connectivity Spanner Property Conserve Energy Reduce Interference d(u,v) ¢ t ¸ dTC(u,v) Roger Wattenhofer, ETH WG 2004

36 Classic Solution: Gabriel Graph
Let disk(u,v) be a disk with diameter (u,v) that is determined by the two points u,v. The Gabriel Graph GG(V) is defined as an undirected graph (with E being a set of undirected edges). There is an edge between two nodes u,v iff the disk(u,v) including boundary contains no other points. Gabriel Graph is planar Gabriel Graph is energy optimal [energy of link is at least distance squared] disk(u,v) v u Extra pages Explain RNG Roger Wattenhofer, ETH WG 2004

37 Roger Wattenhofer, ETH Zurich @ WG 2004
Topology Control Drop long-range neighbors: Reduces interference and energy! But still stay connected (or even spanner) Really?!? Roger Wattenhofer, ETH WG 2004

38 Roger Wattenhofer, ETH Zurich @ WG 2004
Related Work Mid-Eighties: randomly distributed nodes [Takagi & Kleinrock 1984, Hou & Li 1986] Second Wave: constructions from computational geometry, Delaunay Triangulation [Hu 1993], Minimum Spanning Tree [Ramanathan & Rosales-Hain INFOCOM 2000], Gabriel Graph [Rodoplu & Meng J.Sel.Ar.Com 1999] Cone-Based Topology Control [Wattenhofer et al. INFOCOM 2000]; explicitly prove several properties (energy spanner, sparse graph), locality. Collecting more and more properties [Li et al. PODC 2001, Jia et al. SPAA 2003, Li et al. INFOCOM 2002] (e.g. local, planar, distance and energy spanner, constant node degree [Wang & Li DIALM-POMC 2003]) Explicit interference [Meyer auf der Heide et al. SPAA 2002]. Interference between edges, time-step routing model, congestion; trade-offs; however, interference model based on network traffic Roger Wattenhofer, ETH WG 2004

39 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Topology Control What is it? What is it good for? Does Topology Control Reduce Interference? Cellular Networks, Sensor Networks, etc. Conclusions Roger Wattenhofer, ETH WG 2004

40 What Is Interference? Model Problem statement
Transmitting edge e = (u,v) disturbs all nodes in vicinity Interference of edge e = # Nodes covered by union of the two circles with center u and v, respectively, and radius |e| Problem statement We want to minimize maximum interference! At the same time topology must be connected or a spanner etc. 8 Exact size of interference range does not change the results Roger Wattenhofer, ETH WG 2004

41 Low Node Degree Topology Control?
Low node degree does not necessarily imply low interference: Very low node degree but huge interference Roger Wattenhofer, ETH WG 2004

42 Let’s Study the Following Topology!
…from a worst-case perspective Roger Wattenhofer, ETH WG 2004

43 Topology Control Algorithms Produce…
All known topology control algorithms (with symmetric edges) include the nearest neighbor forest as a subgraph and produce something like this: The interference of this graph is (n)! Roger Wattenhofer, ETH WG 2004

44 Roger Wattenhofer, ETH Zurich @ WG 2004
But Interference… Interference does not need to be high… This topology has interference O(1)!! Roger Wattenhofer, ETH WG 2004

45 Algorithms and Lower Bounds
[Burkhart, von Rickenbach, Wattenhofer, Zollinger, 2004] Interference-optimal connectivity-preserving topology Local interference-optimal spanner topology Algorithms also work if interference radius >> transmission radius No local algorithm can find a good topology Optimal topology is not planar UDG, I = 50 RNG, I = 25 LLISE10, I = 12 Roger Wattenhofer, ETH WG 2004

46 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Topology Control What is it? What is it good for? Does Topology Control Reduce Interference? Cellular Networks, Sensor Networks, etc. Conclusions Roger Wattenhofer, ETH WG 2004

47 Roger Wattenhofer, ETH Zurich @ WG 2004
New Results… Interference-driven topology control is exciting new paradigm… We have a few other upcoming results: For cellular networks: minimize number of base stations a mobile station overhears by reducing the transmission power of the base stations  “minimum membership set cover” problem For sensor networks: data gathering without listening to lots of unwanted traffic… Roger Wattenhofer, ETH WG 2004

48 Open Problem #2: In-Interference
Given ad-hoc network represented by nodes in a plane. Connect nodes by spanning tree. Circle of each node centered at node with the radius being the length of longest adjacent edge in spanning tree. Coverage of node is the number of circles node falls into. Minimize the maximum (or average) coverage. 4 4 2 3 3 3 Roger Wattenhofer, ETH WG 2004

49 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Topology Control Conclusions Clustering vs. Topology Control More realism, more realism, more realism, … … Practice! Roger Wattenhofer, ETH WG 2004

50 Clustering vs. Topology Control
(Connected) Dominating Set (Connected) Domatic Partition Both approaches sparsen the graph in order to reduce energy… … by turning off fraction of the nodes, and thus interference. Two sides of the same medal? Topology Control Interference-Driven T.C. … by turning off long-range links, and thus interference. Roger Wattenhofer, ETH WG 2004

51 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Topology Control Conclusions Clustering vs. Topology Control More realism, more realism, more realism, … … Practice! Roger Wattenhofer, ETH WG 2004

52 What does a typical ad-hoc network look like?

53 Roger Wattenhofer, ETH Zurich @ WG 2004
Like this? Roger Wattenhofer, ETH WG 2004

54 Roger Wattenhofer, ETH Zurich @ WG 2004
Like this? One active node > weight 1 Roger Wattenhofer, ETH WG 2004

55 Roger Wattenhofer, ETH Zurich @ WG 2004
Or rather like this? One active node > weight 1 Roger Wattenhofer, ETH WG 2004

56 Roger Wattenhofer, ETH Zurich @ WG 2004
Or even like this? Roger Wattenhofer, ETH WG 2004

57 What about typical mobility?
Brownian Motion? Random Way-Point? Statistical Data Model? Roger Wattenhofer, ETH WG 2004

58 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Clustering Topology Control Conclusions Clustering vs. Topology Control More realism, more realism, more realism, … … Practice! Roger Wattenhofer, ETH WG 2004

59 Combine Theory with Practice
Practical experiments… btnodes of NCCR/MICS Scatterweb Shockfish Roger Wattenhofer, ETH WG 2004

60 Roger Wattenhofer, ETH Zurich @ WG 2004
Some credit… Problem (Algorithm) Reference Dominating Set Kuhn, PODC 2003 Kuhn, Moscibroda, PODC 2004 Topology Control and Interference (LISE, XTC, MMSC, Sensor Networks) Burkhart et MobiHoc 2004 W., WMAN 2004 von Rickenbach et submitted Zollinger et submitted Geo-Routing (GOAFR) Kuhn, W., MobiHoc 2003 Kuhn, W., Zhang, PODC 2003 Positioning (GHoST) Bischoff, PerCom 2004 Kuhn et submitted, Bischoff et subm. Data gathering Cristescu et submitted von Rickenbach, submitted Models: Quasi-UDG Kuhn, W., DIALM 2003 “Big Bang” problem Moscibroda, Kuhn, ESA & MobiCom 2004 Roger Wattenhofer, ETH WG 2004

61 Questions? Comments? Distributed Computing Group Roger Wattenhofer
Thanks to my students Fabian Kuhn, Aaron Zollinger, Regina Bischoff, Thomas Moscibroda, Pascal von Rickenbach, Martin Burkhart, etc.

62 BACKUP

63 Distributed Computing and Networking Graph Theory
Mobile Computing Distributed Computing and Networking Graph Theory Computational Geometry

64 TODO Invitation back: graph theory is needed urgently…! Only few groups study provable results. Graphs, UDG, QUDG, etc. New Dominating set, lower bound GOAFR Open Problems

65 Open Problems UDG Embedding Edge crossings  I couldn’t care less!!!
Applications in ad-hoc/sensor networks (GPS) Known to be NP-hard [Breu & Kirkpatrick 1998] There is no PTAS [Kuhn et al, 2004] Approximation algorithms? Minimize ratio of longest edge over shortest non-edge. Mobile/dynamic nodes  Local updates, stability

66 Interference Tree In-Interference Highway-Model 3. The routing issue
(few bits only, for example)

67 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Routing in Ad-Hoc Networks Dominating Set Based Routing Geometric Routing What is geometric routing? Correct geometric routing Worst-case efficient geometric routing Average-case efficient geometric routing Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

68 Roger Wattenhofer, ETH Zurich @ WG 2004
Geometric Routing ??? t s s Roger Wattenhofer, ETH WG 2004

69 Roger Wattenhofer, ETH Zurich @ WG 2004
Greedy Routing Each node forwards message to “best” neighbor t s Roger Wattenhofer, ETH WG 2004

70 Roger Wattenhofer, ETH Zurich @ WG 2004
Greedy Routing Each node forwards message to “best” neighbor But greedy routing may fail: message may get stuck in a “dead end” Needed: Correct geometric routing algorithm t ? s Roger Wattenhofer, ETH WG 2004

71 What is Geometric Routing?
A.k.a. location-based, position-based, geographic, etc. Chapter 18 (“Routing […] in Geometric and Wireless Networks”) in “Handbook of Wireless Networking and Mobile Computing” Each node knows its own position and position of neighbors Source knows the position of the destination No routing tables stored in nodes! Geometric routing makes sense Own position: GPS/Galileo, local positioning algorithm Destination: overlay P2P net, geocasting, source routing++ Learn about ad-hoc routing in general Roger Wattenhofer, ETH WG 2004

72 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Routing in Ad-Hoc Networks Dominating Set Based Routing Geometric Routing What is geometric routing? Correct geometric routing Worst-case efficient geometric routing Average-case efficient geometric routing Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

73 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing Based on ideas by [Kranakis, Singh, Urrutia CCCG 1999] Here simplified (and actually improved) Roger Wattenhofer, ETH WG 2004

74 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing Remark: Planar graph can easily (and locally!) be computed with the Gabriel Graph, for example. Roger Wattenhofer, ETH WG 2004

75 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing s t Roger Wattenhofer, ETH WG 2004

76 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing s t Roger Wattenhofer, ETH WG 2004

77 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing s t Roger Wattenhofer, ETH WG 2004

78 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing s t Roger Wattenhofer, ETH WG 2004

79 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing s t Roger Wattenhofer, ETH WG 2004

80 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing s t Roger Wattenhofer, ETH WG 2004

81 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing s t Roger Wattenhofer, ETH WG 2004

82 Face Routing Properties
All necessary information is stored in the message Source and destination positions Point of transition to next face Completely local: Knowledge about direct neighbors‘ positions sufficient Faces are implicit Planarity of graph is computed locally (not an assumption) “Right Hand Rule” Roger Wattenhofer, ETH WG 2004

83 Face Routing Works on Any Graph
Roger Wattenhofer, ETH WG 2004

84 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Routing in Ad-Hoc Networks Dominating Set Based Routing Geometric Routing What is geometric routing? Correct geometric routing Worst-case efficient geometric routing Average-case efficient geometric routing Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

85 Roger Wattenhofer, ETH Zurich @ WG 2004
Face Routing Theorem: Face Routing reaches destination in O(n) steps But: Can be very bad compared to the optimal route Roger Wattenhofer, ETH WG 2004

86 Bounding Searchable Area
t Roger Wattenhofer, ETH WG 2004

87 Adaptively Bound Searchable Area
What is the correct size of the bounding area? Start with a small searchable area Grow area each time you cannot reach the destination In other words, adapt area size whenever it is too small Theorem: Algorithm finds destination after O(c2) steps, where c is the cost of the optimal path from source to destination. Proof: Not in this presentation. Roger Wattenhofer, ETH WG 2004

88 Algorithm is worst-case optimal
Can we do any better? No, with “wheel” example Destination is central node Source is any node on ring Any spoke can go to middle Geometric routing: no routing tables  test many spines Best path of size O(c)+O(c) Test (c) spokes of length (c) Cost (c2) instead of O(c) Theorem: Algorithm is asymptotically worst-case optimal. Roger Wattenhofer, ETH WG 2004

89 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Routing in Ad-Hoc Networks Dominating Set Based Routing Geometric Routing What is geometric routing? Correct geometric routing Worst-case efficient geometric routing Average-case efficient geometric routing Topology Control Conclusions Roger Wattenhofer, ETH WG 2004

90 GOAFR – Greedy Other Adaptive Face Routing
Algorithm is not very efficient (especially in dense graphs) Combine Greedy and (Other Adaptive) Face Routing Route greedily as long as possible Circumvent “dead ends” by use of face routing Then route greedily again Theorem: GOAFR is still asymptotically worst-case optimal… …and it is efficient in practice, in the average-case. What does “practice” mean? Usually nodes placed uniformly at random Roger Wattenhofer, ETH WG 2004

91 Roger Wattenhofer, ETH Zurich @ WG 2004
Average Case Not interesting when graph not dense enough Not interesting when graph is too dense Critical density range (“percolation”) Shortest path is significantly longer than Euclidean distance too sparse critical density too dense Roger Wattenhofer, ETH WG 2004

92 Critical Density: Shortest Path vs. Euclidean Distance
Shortest path is significantly longer than Euclidean distance Critical density range mandatory for the simulation of any routing algorithm (not only geometric) Roger Wattenhofer, ETH WG 2004

93 Simulation on Randomly Generated Graphs
9 1 GPSR worse 0.9 8 Connectivity 0.8 7 0.7 6 Greedy success 0.6 Performance 5 0.5 Frequency 0.4 4 GOAFR+ 0.3 3 better 0.2 2 0.1 critical 1 2 4 6 8 10 12 Network Density [nodes per unit disk] Roger Wattenhofer, ETH WG 2004

94 Roger Wattenhofer, ETH Zurich @ WG 2004
Discussion Previously known Non-competitive algorithms (Face Routing, GPSR, …) Three papers [DIALM 2002, MOBIHOC 2003, PODC 2003]: The first worst-case optimal algorithm The first worst-case optimal and average-case efficient algorithm Percolation theory to evaluate routing algorithms Various results for different cost metrics (“super-linear” not competitive) Various related results (“bounded degree graphs”) Algorithm is simple: Can be implemented in network processor Quite a few implementations available Algorithm can be married with other approaches Geometric routing as a more stable form of source routing First tight result in ad-hoc routing (to our knowledge) Roger Wattenhofer, ETH WG 2004

95 Roger Wattenhofer, ETH Zurich @ WG 2004
Topology Control Drop long-range neighbors: Reduces interference, and energy! But still stay connected (or even spanner) Roger Wattenhofer, ETH WG 2004

96 Roger Wattenhofer, ETH Zurich @ WG 2004
Overview Introduction Routing in Ad-Hoc Networks Dominating Set Based Routing Geometric Routing Topology Control What’s that? XTC Interference Conclusions Roger Wattenhofer, ETH WG 2004

97 XTC Algorithm (W., Zollinger)
D C G B Each node produces “ranking” of neighbors. Examples Distance (closest) Energy (lowest) Link Quality (best) Nodes exchange rankings with neighbors A 1. C 2. E 3. B 4. F 5. D 6. G E F Roger Wattenhofer, ETH WG 2004

98 Roger Wattenhofer, ETH Zurich @ WG 2004
XTC Algorithm (Part 2) 3. B 4. A 6. G 8. D 2. C 4. G 5. A 4. B 6. A 7. C D C G 7. A 8. C 9. E B 1. F 3. A 6. D Each node locally goes through all neighbors, in order of their ranking If the candidate (current neighbor) ranks any of your already processed neighbors higher than yourself, then you don’t need to connect to the candidate. A 1. C 2. E 3. B 4. F 5. D 6. G E F 3. E 7. A Roger Wattenhofer, ETH WG 2004

99 Roger Wattenhofer, ETH Zurich @ WG 2004
XTC Analysis (Part 1) Symmetry: A node u wants node v as a neighbor if and only if v wants u (provided that link-weights are symmetric). Connectivity: If two nodes are connected originally, they will stay so. If the ranking is energy or link quality based, then XTC will choose a topology that routes around walls and obstacles. Roger Wattenhofer, ETH WG 2004

100 Roger Wattenhofer, ETH Zurich @ WG 2004
XTC Analysis (Part 2) If the graph was a Euclidean graph (no obstacles, nodes homogeneous, but not necessarily uniformly distributed), then … The degree of each node is at most 6. The topology will be planar. The graph will be a sub-graph of the RNG. Relative Neighborhood Graph RNG(V): An edge e = (u,v) is in the RNG(V) iff there is no node w with (u,w) < (u,v) and (v,w) < (u,v). u v Roger Wattenhofer, ETH WG 2004

101 Roger Wattenhofer, ETH Zurich @ WG 2004
XTC Average-Case Remark: We are currently implementing XTC… Unit Disk Graph XTC Roger Wattenhofer, ETH WG 2004

102 XTC Average-Case (Degrees)
Roger Wattenhofer, ETH WG 2004

103 XTC Average-Case (Span)
Roger Wattenhofer, ETH WG 2004

104 K-Neigh (Blough, Leoncini, Resta, Santi @ MobiHoc 2003)
“Connect to k closest neighbors!” Tough Question: What should k be? Algorithm is dead simple. On average as good as others… [Thanks to P. Santi] W. et al. Infocom 2001 Roger Wattenhofer, ETH WG 2004

105 K-Neigh and the worst-case?
What if the network looks like this: Does a typical/average network (or parts of an average network) really look like this? Probably not… but… Still, cool simulation and analysis results by Blough et al. For example: energy to compute K-Neigh topology is much smaller than CBTC topology (figure right) k+1 nodes k+1 nodes Roger Wattenhofer, ETH WG 2004

106 Roger Wattenhofer, ETH Zurich @ WG 2004
Percolation Node density such that the graph is just about to become connected (about 5 nodes per unit disk). What’s the value for k at percolation?!? (Tough question?) too sparse critical density too dense Roger Wattenhofer, ETH WG 2004

107 Roger Wattenhofer, ETH Zurich @ WG 2004
Lessons to be learned? Average-case µ Worst-case (A worst-case algorithm also works in the average-case, but not vice versa) Average-case as great source of inspiration Algorithm should at least be correct (whatever that means)! It seems to be easier to tune a worst-case algorithm for the average case than vice versa (e.g. AFR  GOAFR+) Roger Wattenhofer, ETH WG 2004

108 Expected number of dominators in step 2
By definition By step 2: Using Phase A: xi* is the optimum Roger Wattenhofer, ETH WG 2004

109 Expected number of additional dominators in step 4
Pr[node i not dominated] No neighbor dominator after step 2 Roger Wattenhofer, ETH WG 2004

110 Roger Wattenhofer, ETH Zurich @ WG 2004
Result after Phase B With Uncovered nodes become dominators Previous slide Solution of Dual LP, and Dual · Primal Theorem: E[|DS|] · O( ln  ¢ |DSOPT|) Roger Wattenhofer, ETH WG 2004

111 Algorithms – Requirement: Retain Graph Connectivity
LIFE (Low Interference Forest Establisher) Attribute interference values as weights to edges Compute minimum spanning tree/forest (Kruskal’s algorithm) Theorem: LIFE constructs a Minimum Interference Forest Proof: Algorithm computes forest MST also minimizes maximum interference value Roger Wattenhofer, ETH WG 2004

112 Algorithms – Requirement: Construct Spanner
LISE (Low Interference Spanner Establisher) Add edges with increasing interference until spanner property fulfilled Theorem: LISE constructs a Minimum Interference t-Spanner Proof: Algorithm computes t-spanner Algorithm inserts edges with increasing coverage only “as long as necessary” Roger Wattenhofer, ETH WG 2004

113 Algorithms – Requirement: Construct Spanner Locally
LLISE Local algorithm: scalable Nodes collect (t/2)-neighborhood Locally compute interference-minimal paths guaranteeing spanner property Only request that path to stay in the resulting topology Theorem: LLISE constructs a Minimum Interference t-Spanner Roger Wattenhofer, ETH WG 2004

114 Average-Case Interference: Preserve Connectivity
UDG GG RNG LIFE Roger Wattenhofer, ETH WG 2004

115 Interference-Optimal Topology
There is no local algorithm that can find a good interference topology The optimal topology will not be planar Roger Wattenhofer, ETH WG 2004

116 Average-Case Interference: Spanners
RNG LLISE, t=2 t=4 t=6 t=8 t=10 LIFE Roger Wattenhofer, ETH WG 2004

117 Algorithms and Lower Bounds
[Burkhart, von Rickenbach, Wattenhofer, Zollinger, 2004] Interference-optimal connectivity-preserving topology Local interference-optimal spanner topology Algorithms also work if interference radius >> transmission radius No local algorithm can find a good topology Optimal topology is not planar Roger Wattenhofer, ETH WG 2004

118 Roger Wattenhofer, ETH Zurich @ WG 2004
Simulation UDG, I = 50 RNG, I = 25 20 Knoten pro Unit Disk 10 Units Seitenlänge RNG kein Spanner! LLISE2, I = 23 LLISE10, I = 12 Roger Wattenhofer, ETH WG 2004


Download ppt "Wireless Networking Graph Theory Unplugged WG 2004"

Similar presentations


Ads by Google