Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl.

Similar presentations


Presentation on theme: "Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl."— Presentation transcript:

1 Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl

2 SS 05Ad hoc & sensor networs - Ch 10: Topology control2 Goals of this chapter  Networks can be too dense – too many nodes in close (radio) vicinity  This chapter looks at methods to deal with such networks by  Reducing/controlling transmission power  Deciding which links to use  Turning some nodes off  Focus is on basic ideas, some algorithms  Complexity results are only very superficially covered

3 SS 05Ad hoc & sensor networs - Ch 10: Topology control3 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

4 SS 05Ad hoc & sensor networs - Ch 10: Topology control4 Motivation: Dense networks  In a very dense networks, too many nodes might be in range for an efficient operation  Too many collisions/too complex operation for a MAC protocol, too many paths to chose from for a routing protocol, …  Idea: Make topology less complex  Topology: Which node is able/allowed to communicate with which other nodes  Topology control needs to maintain invariants, e.g., connectivity

5 SS 05Ad hoc & sensor networs - Ch 10: Topology control5 Topology Control  Drop long-range neighbors: Reduces interference and energy!  But still stay connected (or even spanner)

6 SS 05Ad hoc & sensor networs - Ch 10: Topology control6 Topology Control as a Trade-Off Network Connectivity Spanner Property Topology Control Conserve Energy Reduce Interference Sparse Graph, Low Degree Planarity Symmetric Links Less Dynamics Sometimes also clustering, dominating set construction (see later) d(u,v) ¢ t ¸ d TC (u,v)

7 SS 05Ad hoc & sensor networs - Ch 10: Topology control7 Options for topology control Topology control Control node activity – deliberately turn on/off nodes Control link activity – deliberately use/not use certain links Topology control Flat network – all nodes have essentially same role Hierarchical network – assign different roles to nodes; exploit that to control node/link activity Power controlBackbonesClustering

8 SS 05Ad hoc & sensor networs - Ch 10: Topology control8 Flat networks  Main option: Control transmission power  Do not always use maximum power  Selectively for some links or for a node as a whole  Topology looks “thinner”  Less interference, …  Alternative: Selectively discard some links  Usually done by introducing hierarchies

9 SS 05Ad hoc & sensor networs - Ch 10: Topology control9 Hierarchical networks – backbone  Construct a backbone network  Some nodes “control” their neighbors – they form a (minimal) dominating set  Each node should have a controlling neighbor  Controlling nodes have to be connected (backbone)  Only links within backbone and from backbone to controlled neighbors are used  Formally: Given graph G=(V,E), construct D ½ V such that

10 SS 05Ad hoc & sensor networs - Ch 10: Topology control10 Hierarchical network – clustering  Construct clusters  Partition nodes into groups (“clusters”)  Each node in exactly one group  Except for nodes “bridging” between two or more groups  Groups can have clusterheads  Typically: all nodes in a cluster are direct neighbors of their clusterhead  Clusterheads are also a dominating set, but should be separated from each other – they form an independent set  Formally: Given graph G=(V,E), construct C ½ V such that

11 SS 05Ad hoc & sensor networs - Ch 10: Topology control11 Aspects of topology-control algorithms  Connectivity – If two nodes connected in G, they have to be connected in G 0 resulting from topology control  Stretch factor – should be small  Hop stretch factor: how much longer are paths in G 0 than in G?  Energy stretch factor: how much more energy does the most energy-efficient path need?  Throughput – removing nodes/links can reduce throughput, by how much?  Robustness to mobility  Algorithm overhead

12 SS 05Ad hoc & sensor networs - Ch 10: Topology control12 Example: Price for maintaining connectivity  Maintaining connectivity can be very “costly” for a power control approach  Compare power required for connectivity compared to power required to reach a very big maximum component

13 SS 05Ad hoc & sensor networs - Ch 10: Topology control13 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

14 SS 05Ad hoc & sensor networs - Ch 10: Topology control14 Power control – magic numbers?  Question: What is a good power level for a node to ensure “nice” properties of the resulting graph?  Idea: Controlling transmission power corresponds to controlling the number of neighbors for a given node  Is there an “optimal” number of neighbors a node should have?  Is there a “magic number” that is good irrespective of the actual graph/network under consideration?  Historically, k=6 or k=8 had been suggested as such “magic numbers”  However, they optimize progress per hop – they do not guarantee connectivity of the graph!! ! Needs deeper analysis

15 SS 05Ad hoc & sensor networs - Ch 10: Topology control15 Controlling transmission range  Assume all nodes have identical transmission range r=r(|V|), network covers area A, V nodes, uniformly distr.  Fact: Probability of connectivity goes to zero if:  Fact: Probability of connectivity goes to 1 for if and only if  |V| ->inf. with |V|  Fact (uniform node distribution, density  ):

16 SS 05Ad hoc & sensor networs - Ch 10: Topology control16 Controlling number of neighbors  Knowledge about range also tells about number of neighbors  Assuming node distribution (and density) is known, e.g., uniform  Alternative: directly analyze number of neighbors  Assumption: Nodes randomly, uniformly placed, only transmission range is controlled, identical for all nodes, only symmetric links are considered  Result: For connected network, required number of neighbors per node is  (log |V|)  It is not a constant, but depends on the number of nodes!  For a larger network, nodes need to have more neighbors & larger transmission range! – Rather inconvenient  Constants can be bounded

17 SS 05Ad hoc & sensor networs - Ch 10: Topology control17 Some example constructions for power control  Basic idea for most of the following methods: Take a graph G=(V,E), produce a graph G 0 =(V,E 0 ) that maintains connectivity with fewer edges  Assume, e.g., knowledge about node positions  Construction should be local (for distributed implementation)

18 SS 05Ad hoc & sensor networs - Ch 10: Topology control18 Example 1: Relative Neighborhood Graph (RNG)  Edge between nodes u and v if and only if there is no other node w that is closer to either u or v  Formally:  RNG maintains connectivity of the original graph  Easy to compute locally  But: Worst-case spanning ratio is  (|V|)  Average degree is 2.6 This region has to be empty for the two nodes to be connected

19 SS 05Ad hoc & sensor networs - Ch 10: Topology control19 Example 2: Gabriel graph  Gabriel graph (GG) similar to RNG  Difference: Smallest circle with nodes u and v on its circumference must only contain node u and v for u and v to be connected  Formally:  Properties: Maintains connectivity, Worst-case spanning ratio  (|V| 1/2 ), energy stretch O(1) (depending on consumption model!), worst-case degree  (|V|) This region has to be empty for the two nodes to be connected

20 SS 05Ad hoc & sensor networs - Ch 10: Topology control20 Example 3: Delaunay triangulation  Assign, to each node, all points in the plane for which it is the closest node ! Voronoi diagram  Constructed in O(|V| log |V|) time  Connect any two nodes for which the Voronoi regions touch ! Delaunay triangulation  Problem: Might produce very long links; not well suited for power control Voronoi region for upper left node Edges of Delaunay triangulation

21 SS 05Ad hoc & sensor networs - Ch 10: Topology control21 Spanning Tree Based Construction  Build local spanning trees  Each node collects info about its neighbors at max. Power  Construct an MST using asy Prim’s Algorithm  Use only tree topology for communication

22 SS 05Ad hoc & sensor networs - Ch 10: Topology control22 Finding a Spanning Tree Given a Root  a distinguished processor is known, to serve as the root  root sends M to all its neighbors  when non-root first gets M  set the sender as its parent  send "parent" msg to sender  send M to all other neighbors  when get M otherwise  send "reject" msg to sender  use "parent" and "reject" msgs to set children variables and know when to terminate

23 SS 05Ad hoc & sensor networs - Ch 10: Topology control23 Execution of Spanning Tree Alg. gh a bc def Synchronous: always gives breadth-first search (BFS) tree gh a bc def Asynchronous: not necessarily BFS tree Both models: O(m) messages O(diam) time

24 SS 05Ad hoc & sensor networs - Ch 10: Topology control24 Distributed Spanning tree construction  Chang-Robert’s algorithm  {The root is known}  Uses signals and acks, similar to the termination detection algorithm. Uses the same rule for sending acknowledgment. For a graph G=(V,E), a spanning tree is a maximally connected subgraph T=(V,E’), E’  E,such that if one more edge is added, then the subgraph is no more a tree. Used for broadcasting in a network. Question: What if the root is not designated?

25 SS 05Ad hoc & sensor networs - Ch 10: Topology control25 Chang Roberts Spanning Tree Alg  program probe-echo  define N : integer (no. of neighbors)  C, D : integer;  initially parent :=i; C=0; D=0; {for the initiator}  send probes to each neighbor;  D:=no. of neighbors;  do D!=0  echo -> D:=D-1 od{D=0 signals end}  { for a non-initator process i>0}  do probe  parent=i  C=0 -> C:=1;  parent := sender;  if i is not a leaf -> send probes to non – parent neighbors;  D:= no. of non-parent neighbors  fi;   echo-> D:=D-1;   probe  sender != parent -> send echo to sender;   C=1  D=0 -> send echo to parent; C:=0; ÿod

26 SS 05Ad hoc & sensor networs - Ch 10: Topology control26 Example: Cone-based topology control  Assumption: Distance and angle information between nodes is available  Two-phase algorithm  Phase 1  Every node starts with a small transmission power  Increase it until a node has sufficiently many neighbors  What is “sufficient”? – When there is at least one neighbor in each cone of angle    = 5/6  is necessary and sufficient condition for connectivity!  Phase 2  Remove redundant edges: Drop a neighbor w of u if there is a node v of w and u such that sending from u to w directly is less efficient than sending from u via v to w  Essentially, a local Gabriel graph construction

27 SS 05Ad hoc & sensor networs - Ch 10: Topology control27 Example: Cone-based topology control (2)  Properties: simple, local construction  Extensions for k-connectivity (Yao graph)  Little exercise: What happens when  5/6  ? 22 22 22 22 22 22 22 22

28 SS 05Ad hoc & sensor networs - Ch 10: Topology control28 Centralized power control algorithm  Goal: Find topology control algorithm minimizing the maximum power used by any node  Ensuring simple or bi-connectivity  Assumptions: Locations of all nodes and path loss between all node pairs are known; each node uses an individually set power level to communicate with all its neighbors  Idea: Use a centralized, greedy algorithm  Initially, all nodes have transmission power 0  Connect those two components with the shortest distance between them (raise transmission power accordingly)  Second phase: Remove links (=reduce transmission power) not needed for connectivity  Exercise: Relation to Kruskal’s MST algorithm?

29 SS 05Ad hoc & sensor networs - Ch 10: Topology control29 Centralized power control algorithm 1 1 2 3 4 4 A B C D E F D Topology 1 1 A B C D E F 1) Connect A-C and B-D 1 1 2 A B C D E F 2) Connect A-B 1 1 2 3 A B C D E F 3) Connect C-D 1 1 2 3 4 4 A B C E F 4) Connect C-E and D-F 1 1 3 4 4 A B C D E F 5) Remove edge A-B

30 SS 05Ad hoc & sensor networs - Ch 10: Topology control30 Gabriel Graph  Let disk(u,v) be a disk with diameter (u,v) that is determined by the two points u,v.  The Gabriel Graph GG(V) is defined as an undirected graph (with E being a set of undirected edges). There is an edge between two nodes u,v iff the disk(u,v) including boundary contains no other points.  As we will see the Gabriel Graph has interesting properties. disk(u,v) v u

31 SS 05Ad hoc & sensor networs - Ch 10: Topology control31 Delaunay Triangulation  Let disk(u,v,w) be a disk defined by the three points u,v,w.  The Delaunay Triangulation (Graph) DT(V) is defined as an undirected graph (with E being a set of undirected edges). There is a triangle of edges between three nodes u,v,w iff the disk(u,v,w) contains no other points.  The Delaunay Triangulation is the dual of the Voronoi diagram, and widely used in various CS areas; the DT is planar; the distance of a path (s,…,t) on the DT is within a constant factor of the s-t distance. disk(u,v,w) v u w

32 SS 05Ad hoc & sensor networs - Ch 10: Topology control32 Other planar graphs  Relative Neighborhood Graph RNG(V)  An edge e = (u,v) is in the RNG(V) iff there is no node w with (u,w) < (u,v) and (v,w) < (u,v).  Minimum Spanning Tree MST(V)  A subset of E of G of minimum weight which forms a tree on V. v u

33 SS 05Ad hoc & sensor networs - Ch 10: Topology control33 Properties of planar graphs  Theorem 1:  Corollary: Since the MST(V) is connected and the DT(V) is planar, all the planar graphs in Theorem 1 are connected and planar.  Theorem 2: The Gabriel Graph contains the Minimum Energy Path (for any path loss exponent  ¸ 2)  Corollary: GG(V) Å UDG(V) contains the Minimum Energy Path in UDG(V)

34 SS 05Ad hoc & sensor networs - Ch 10: Topology control34 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

35 SS 05Ad hoc & sensor networs - Ch 10: Topology control35 Hierarchical networks – backbones  Idea: Select some nodes from the network/graph to form a backbone  A connected, minimal, dominating set (MDS or MCDS)  Dominating nodes control their neighbors  Protocols like routing are confronted with a simple topology – from a simple node, route to the backbone, routing in backbone is simple (few nodes)  Problem: MDS is an NP-hard problem  Hard to approximate, and even approximations need quite a few messages

36 SS 05Ad hoc & sensor networs - Ch 10: Topology control36 Backbone by growing a tree  Construct the backbone as a tree, grown iteratively

37 SS 05Ad hoc & sensor networs - Ch 10: Topology control37 Backbone by growing a tree – Example 1:2: 3:4:

38 SS 05Ad hoc & sensor networs - Ch 10: Topology control38 Problem: Which gray node to pick?  When blindly picking any gray node to turn black, resulting tree can be very bad Solution: Look ahead! One step suffices

39 SS 05Ad hoc & sensor networs - Ch 10: Topology control39 Performance of tree growing with look ahead  Dominating set obtained by growing a tree with the look ahead heuristic is at most a factor 2(1+ H(  )) larger than MDS  H(¢) harmonic function, H(k) =  i=1 k 1/i <= ln k + 1   is maximum degree of the graph  It is automatically connected  Can be implemented in a distributed fashion as well

40 SS 05Ad hoc & sensor networs - Ch 10: Topology control40 Start big, make lean  Idea: start with some, possibly large, connected dominating set, reduce it by removing unnecessary nodes  Initial construction for dominating set  All nodes are initially white  Mark any node black that has two neighbors that are not neighbors of each other (they might need to be dominated) ! Black nodes form a connected dominating set (proof by contradiction); shortest path between ANY two nodes only contains black nodes  Needed: Pruning heuristics

41 SS 05Ad hoc & sensor networs - Ch 10: Topology control41 Pruning heuristics  Heuristic 1: Unmark node v if  Node v and its neighborhood are included in the neighborhood of some node marked node u (then u will do the domination for v as well)  Node v has a smaller unique identifier than u (to break ties)  Heuristic 2: Unmark node v if  Node v’s neighborhood is included in the neighborhood of two marked neighbors u and w  Node v has the smallest identifier of the tree nodes  Nice and easy, but only linear approximation factor uv w abcd

42 SS 05Ad hoc & sensor networs - Ch 10: Topology control42 One more distributed backbone heuristic: Span  Construct backbone, but take into account need to carry traffic – preserve capacity  Means: If two paths could operate without interference in the original graph, they should be present in the reduced graph as well  Idea: If the stretch factor (induced by the backbone) becomes too large, more nodes are needed in the backbone  Rule: Each node observes traffic around itself  If node detects two neighbors that need three hops to communicate with each other, node joins the backbone, shortening the path  Contention among potential new backbone nodes handled using random backoff A B C

43 SS 05Ad hoc & sensor networs - Ch 10: Topology control43 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

44 SS 05Ad hoc & sensor networs - Ch 10: Topology control44 Clustering  Partition nodes into groups of nodes – clusters  Many options for details  Are there clusterheads? – One controller/representative node per cluster  May clusterheads be neighbors? If no: clusterheads form an independent set C: Typically: clusterheads form a maximum independent set  May clusters overlap? Do they have nodes in common?

45 SS 05Ad hoc & sensor networs - Ch 10: Topology control45 Clustering  Further options  How do clusters communicate? Some nodes need to act as gateways between clusters If clusters may not overlap, two nodes need to jointly act as a distributed gateway  How many gateways exist between clusters? Are all active, or some standby?  What is the maximal diameter of a cluster? If more than 2, then clusterheads are not necessarily a maximum independent set  Is there a hierarchy of clusters?

46 SS 05Ad hoc & sensor networs - Ch 10: Topology control46 Maximum independent set  Computing a maximum independent set is NP-complete  Can be approximate within (  +3)/5 for small , within O(  log log  / log  ) else;  bounded degree  Show: A maximum independent set is also a dominating set  Maximum independent set not necessarily intuitively desired solution  Example: Radial graph, with only (v 0,v i ) 2 E

47 SS 05Ad hoc & sensor networs - Ch 10: Topology control47 A basic construction idea for independent sets  Use some attribute of nodes to break local symmetries  Node identifiers, energy reserve, mobility, weighted combinations… - matters not for the idea as such (all types of variations have been looked at)  Make each node a clusterhead that locally has the largest attribute value  Once a node is dominated by a clusterhead, it abstains from local competition, giving other nodes a chance 1236574 Init: 1236574 Step 1: 1236574 Step 2: 1236574 Step 3: 1236574 Step 4:

48 SS 05Ad hoc & sensor networs - Ch 10: Topology control48 Determining gateways to connect clusters  Suppose: Clusterheads have been found  How to connect the clusters, how to select gateways?  It suffices for each clusterhead to connect to all other clusterheads that are at most three hops  Resulting backbone (!) is connected  Formally: Steiner tree problem  Given: Graph G=(V,E), a subset C ½ V  Required: Find another subset T ½ V such that S [ T is connected and S [ T is a cheapest such set  Cost metric: number of nodes in T, link cost  Here: special case since C are an independent set

49 SS 05Ad hoc & sensor networs - Ch 10: Topology control49 Steiner Tree (from Yao Wen Chang)

50 SS 05Ad hoc & sensor networs - Ch 10: Topology control50 Rotating clusterheads  Serving as a clusterhead can put additional burdens on a node  For MAC coordination, routing, …  Let this duty rotate among various members  Periodically reelect – useful when energy reserves are used as discriminating attribute  LEACH – determine an optimal percentage P of nodes to become clusterheads in a network  Use 1/P rounds to form a period  In each round, nP nodes are elected as clusterheads  At beginning of round r, node that has not served as clusterhead in this period becomes clusterhead with probability P/(1-p(r mod 1/P))

51 SS 05Ad hoc & sensor networs - Ch 10: Topology control51 Multi-hop clusters  Clusters with diameters larger than 2 can be useful, e.g., when used for routing protocol support  Formally: Extend “domination” definition to also dominate nodes that are at most d hops away  Goal: Find a smallest set D of dominating nodes with this extended definition of dominance  Only somewhat complicated heuristics exist  Different tilt: Fix the size (not the diameter) of clusters  Idea: Use growth budgets – amount of nodes that can still be adopted into a cluster, pass this number along with broadcast adoption messages, reduce budget as new nodes are found

52 SS 05Ad hoc & sensor networs - Ch 10: Topology control52 Passive clustering  Constructing a clustering structure brings overheads  Not clear whether they can be amortized via improved efficiency  Question: Eat cake and have it?  Have a clustering structure without any overhead?  Maybe not the best structure, and maybe not immediately, but benefits at zero cost are no bad deal… ! Passive clustering  Whenever a broadcast message travels the network, use it to construct clusters on the fly  Node to start a broadcast: Initial node  Nodes to forward this first packet: Clusterhead  Nodes forwarding packets from clusterheads: ordinary/gateway nodes  And so on… ! Clusters will emerge at low overhead

53 SS 05Ad hoc & sensor networs - Ch 10: Topology control53 Overview  Motivation, basics  Power control  Backbone construction  Clustering  Adaptive node activity

54 SS 05Ad hoc & sensor networs - Ch 10: Topology control54 Adaptive node activity  Remaining option: Turn some nodes off deliberately  Only possible if other nodes remain on that can take over their duties  Example duty: Packet forwarding  Approach: Geographic Adaptive Fidelity (GAF) r r R  Observation: Any two nodes within a square of length r < R/5 1/2 can replace each other with respect to forwarding  R radio range  Keep only one such node active, let the other sleep

55 SS 05Ad hoc & sensor networs - Ch 10: Topology control55 Conclusion  Various approaches exist to trim the topology of a network to a desired shape  Most of them bear some non-negligible overhead  At least: Some distributed coordination among neighbors, or they require additional information  Constructed structures can turn out to be somewhat brittle – overhead might be wasted or even counter-productive  Benefits have to be carefully weighted against risks for the particular scenario at hand


Download ppt "Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl."

Similar presentations


Ads by Google