• Keine Ergebnisse gefunden

Example 1: All nodes closer to destination

N/A
N/A
Protected

Academic year: 2022

Aktie "Example 1: All nodes closer to destination"

Copied!
84
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Addressing Lifetime and Energy Consumption

Problem

Addressing network lifetime only might produce very energy consuming paths

Total energy consumption will affect network lifetime as well

Solution: combine cost c(w) metric and energy metric u(v,w) in one

Example: pc(v,w) = c(w) * u(v,w)

If u(v,w) is high and another node x with about same or better c(w) exists it is unlikely that w is selected

If c(w) is high and another node x with with about same or better u(v,w) exists it is unlikely that w is selected

V

W

X u(v,w)

u(v,x)

c(w)

c(x)

u(v,x) * c(x) u(v,w) * c(w)

(2)

Traffic Balance by Randomization

Requires criteria which selects some nodes in forward direction

Example 1: All nodes closer to destination

Example 2: All nodes lying a threshold closer to the destination

Example 3: All node in forward direction but not exceeding a certain delay threshold

Randomly select a node out of this set

Example 1: uniformly distributed

Example 2: weighted distribution with highest weight on best node

Effect: traffic balance in a large relay area

Reduced congestion

(3)

Data Communication

Beacon-less Routing

(4)

Beacon-less Routing (1)

Traditional greedy routing need information about all one- hop neighbors

Periodic hello messages

Transmitted with maximum signal strength

Independently of current data traffic

Problem of bidirectional connections

Heissenbüttel, Brown: Beacon-less routing (BLR)

Node is unaware of its neighbors

Just broadcast a message to all unknown neighbors

Receiving node introduces a small timeout before forwarding

Node located at the “best” position introduces the fewest delay

Nodes hearing of retransmission cancel the scheduled packet

(5)

Beacon-less Routing (2)

Problem: Message duplicates

E and F are in backward direction

E.g.: B introduces fewest delay

A removes scheduled packet

C does not hear transmission from B and forwards the packet too

Avoiding message duplicates

Only nodes in a certain forwarding area allowed as candidate nodes

Nodes in forwarding area are able to overhear retransmission of each other node in that area

Active selection method: control Message instead of full packet

Forwarding node sends unicast to “winning”

node

Large packet can be sent with reduced transmission power

S

D

A B

C

E F

(6)

Beacon-less Routing (3)

Possible delay functions (r=radius, p=progress, d=

distance)

Basically MFR:

Max_delay(r-p)/r

Slightly modified NFP:

Max_delay(p/r)

An advanced delay function

Possible forwarding areas

Circle: good forwarding area regarding progress and

successful hops

BLR Example

(7)

Data Communication

The Greedy Routing Failure

(8)

Greedy Routing Failure

Choosing node in backward direction may lead to packet loops

Nevertheless, there may exist a path from S to D (S may also be an intermediate node)

Loop-freedom and delivery rate are conflicting goals

Solutions?

(9)

Improved Single-Path Strategies

Improvements trying to reduce package drop probability

Example: GEDIR – Allow message to travel one hop in backward direction, i.e. packet dropped only if it would be sent back to the previous node

However, fact: greedy heuristic can not guarantee delivery

Additional requirements to provide delivery guarantees

Network with specific properties supporting greedy routing

Recovery strategies for greedy routing failures

(10)

Data Communication

Guaranteed Delivery Based on

Memorization

(11)

Motivation

Many greedy routing schemes perform well in dense networks

Greedy routing has a small communication overhead

Desirable to run Greedy routing as long as possible

However, greedy routing might fail in sparse networks

Guaranteed delivery is desirable property as well

In case of failure: run a recovery mechanism which requires memorizing past routing information

In the message

In the visited node

(12)

Recovery by Flooding

Stojmenovic, Lin: Partial flooding to guarantee delivery (f- GEDIR, f-MFR, f-DIR)

Intermediate nodes handle packet according to GEDIR, MFR, …

Concave node broadcasts packet to all neighbors

To avoid message loops: concave node rejects further copies of the message, concave nodes are removed from the list of candidate nodes

Example: Message from S to D

S C

E

F

A

B G

H

D

unicast broadcast

(13)

Recovery by Flooding

When there is a path from source to destination then one of the neighbors lies on the path → guaranteed delivery

Observation: flooding produces many redundant message transmissions

Improvement: Component routing

Connected components in node v – partitions in the one-hop neighborhood graph N(v) when removing v

Algorithm

Concave node determines connected components

Forward message to only the best neighbor in each component

Number of message transmissions reduced significantly

e.g. concave node has at most four connected components in the unit disk graph model

(14)

DFS-Based Routing

Jain et al.: Geographic Routing Algorithm (GRA)

Intermediate node handles message greedily

Concave node maintains route to destination node

Start route discovery for outdated routing tables

Stuck packet is routed to destination after successful route discovery

How to perform route discovery?

(15)

DFS-Based Routing

Depth first search from concave node S

Yields an acyclic path from S to D

Node X puts its address on route discovery packet p

Forward to neighbor who has not seen p before

Select neighbor Y which minimizes |XY|+|YD|

If no possible neighbor exists, remove address from p and send it back to the node from which p was originally received

Alternative implementation: memorize DFS data in nodes

Other metrics may be applied on next neighbor selection

Quality-of-service paths (delay and bandwidth criteria, connection time, …)

X W

1 2 3

Y1

Y2 root Y3

t1, t6: path = …W

t2: path = …W X

t3: path = …W X Y1

t4: path = …W X Y2 t5: path = …W X Y3

(16)

Data Communication

Memoryless Guaranteed Delivery

(17)

Motivation

Disadvantage of greedy recovery based on memorizing traffic

Traffic may increase

Memorized data may be outdated

Greedy routing does not suffer from this fact

Instantaneous forwarding decision

Not affected by previous (and probably outdated) state information

Question: is there a recovery strategy which

preserves greedy’s memoryless property?

(18)

The Face Recovery Principle

Locally construct a planar graph

Visit face sequence providing progress towards T

Traverse faces according to the left/right hand rule

Return into greedy mode whenever possible

S F1

F2

F3

F4

F5

T

A B

C D

(19)

Face Recovery Details

When to change current face traversal?

How to decide the next face locally?

(20)

Example 1

Greedy-Face-Greedy GFG, [Bose et al., 1999]

(21)

GFG – The face routing part

P  S repeat

Let F be the face with P on boundary and intersecting PT

Traverse* F until reaching an edge that intersects PT at some point Q≠P P  Q

until P=T

*counterclockwise if inner, clockwise if outer face

T S

P

F

(22)

GFG – The face routing part

P  S repeat

Let F be the face with P on boundary and intersecting PT

Traverse* F until reaching an edge that intersects PT at some point Q≠P P  Q

until P=T

*counterclockwise if inner, clockwise if outer face

T S

Q

F

P

(23)

GFG – The face routing part

P  S repeat

Let F be the face with P on boundary and intersecting PT

Traverse* F until reaching an edge that intersects PT at some point Q≠P P  Q

until P=T

*counterclockwise if inner, clockwise if outer face

T S

F

P

(24)

GFG – The face routing part

P  S repeat

Let F be the face with P on boundary and intersecting PT

Traverse* F until reaching an edge that intersects PT at some point Q≠P P  Q

until P=T

*counterclockwise if inner, clockwise if outer face

T S

P

F

(25)

Example 2

Greedy Other Adaptive Face Routing GOAFR,

[Kuhn et al., 2003]

(26)

Face Routing Part of GOAFR

P  S repeat

Explore the complete boundary of face F containing the line PT Advance to Q on F’s boundary which is closest to T and set P  Q until reaching T

S T

F

P

(27)

Face Routing Part of GOAFR

P  S repeat

Explore the complete boundary of face F containing the line PT Advance to Q on F’s boundary which is closest to T and set P  Q until reaching T

S T

Q

F

P

(28)

Face Routing Part of GOAFR

P  S repeat

Explore the complete boundary of face F containing the line PT Advance to Q on F’s boundary which is closest to T and set P  Q until reaching T

S T

Q

F

P

(29)

Face Routing Part of GOAFR

P  S repeat

Explore the complete boundary of face F containing the line PT Advance to Q on F’s boundary which is closest to T and set P  Q until reaching T

S T

Q

F

P

(30)

General Face Change Mechanism

Observation: face can be traversed in two directions

After crossing variant: U selects V

Before crossing variant: U selects W

Best angle variant: U selects W

S T

V

U

W

(31)

Comparison of Variants

(32)

FACE over Dominating Set

Fact: localized planar graph construction prefers short edges over long ones

Affects performance of face traversal: increased hop count

How to reduce number of network nodes used by FACE?

Remember: connected dominating set – subset S of nodes of a graph G which satisfies

Induced subgraph G[S] is connected

Each node in G is either in S or has a one-hop neighbor in S

Datta et al.: Perform FACE algorithm only on internal nodes defined by a connected dominating set

Gabriel graph construction performed on DS only

If concave node is no internal node forward to neighbor in DS

Route along Gabriel graph until

Local minimum handled

Or node with destination in its neighbor list reached

(33)

Shortcut-Based FACE Routing

Possibly more neighbor nodes along path produced by face traversal

Locally construct planar graph used by all neighbor nodes → 2-hop neighbor information needed!

Perform a local planar graph traversal until reaching the last node in view and send packet to that node directly

S

D

(34)

Geographical Cluster Based

Routing

(35)

The main Idea

Connect neighboring clusters connected by a pair of nodes

No UDG assumption; nodes need to be connected within one cluster

Message loosely follows faces of the planar overlay graph

Graph exploration requires local knowledge of all adjacent clusters

Forwarding requires connectivity within Cluster C

S u T

F1 F2 F3 w

C v

D

(36)

GCR versus FACE

(37)

GCR Enables Local Traffic Dispersion

v

A B C

(38)

The Impact of Mobility

Routing on sub graph Routing on overlay

Source Node

Destination Node Destination Cluster

Source Cluster

(39)

Performance Study on Success Rate

(40)

The Advantages of Overlays

No geometric network requirements

Cluster membership sufficient

Greedy forwarding even in recovery mode

More robust to mobility

(41)

The Bad News

Disconnection

S

u

v

T

(42)

The Bad News

Disconnection

Consider all edges

A

B

C

(43)

The Bad News

Disconnection

Consider all edges

Not implicitly planar C

D A

B

(44)

The Bad News

Disconnection

Consider all edges

Not implicitly planar

Remove bad edges

Always possible?

Local detection?

(45)

Planarity and Connectivity

(46)

Planarization by Edge Removal

Undirected graph

Unit disk graph

Circular transmission range

Unique sending radius

Aggregated UDG ?

Observation

Redundancy Property

Locally detectable intersection

Planarity and connectivity? C

D

A

B A

B

C

D (a)

(b)

R vw

E w

v, )   (

(47)

Redundancy Property not Sufficient

Assumption

Arbitrary network

Redundancy property

Conflicting goals

Planarity

Connectivity

Additional property?

( co-existence property)

u1 u2

u3

u4 u5

v1

v3 v2 v4

v5

w

(48)

Aggregated Gabriel Graph

Construction

Properties

(49)

Aggregated Gabriel Graph

Construction

Gabriel graph on UDG

Properties

u v

w

(50)

Aggregated Gabriel Graph

Construction

Gabriel graph on UDG

Aggregation afterwards

Properties

(51)

Aggregated Gabriel Graph

Construction

Gabriel graph on UDG

Aggregation afterwards

Properties

Connected

No regular intersection

Localized construction

Planar?

(52)

Irregular Intersection Problem

A B C

u w

v

A B C

u w

v

A B C

u w

v Aggregated Graph

Sub Graph 1

Sub graph 2

(53)

Purged Aggregated Gabriel Graph

A

B C

Irregular intersection ABxC

(54)

Purged Aggregated Gabriel Graph

A

C

B

Irregular intersection ABxC

UDG  exists AC or BC

(55)

Purged Aggregated Gabriel Graph

Irregular intersection ABxC

UDG  exists AC or BC

Remove AB

A

C

B

(56)

Purged Aggregated Gabriel Graph

Irregular intersection ABxC

UDG  exists AC or BC

Remove AB

Introduce implicit edge BC

Properties

Planar

Connected

Localized construction possible

Forwarding along implicit edge BC?

A

C

B

(57)

Localized Multicasting

(58)

The Localized Multicasting Problem

Known information

Current node

Neighbors

Destinations

T1

T3

T2 S

B A

D C

(59)

The Localized Multicasting Problem

Known information

Current node

Neighbors

Destinations

Building blocks

Message split

T1

T3

T2 S

B A

D C

(60)

The Localized Multicasting Problem

Known information

Current node

Neighbors

Destinations

Building blocks

Message split

Next hop selection

T1

T3

T2 S

B A

D C

?

(61)

The Localized Multicasting Problem

Known information

Current node

Neighbors

Destinations

Building blocks

Message split

Next hop selection

Recovery

T1

T3

T2 S

B A

D C

?

?

(62)

The MSTEAM Algorithm

(63)

EMST Backbone Assisted Localized Routing

T9

T7

T6

T4

T1

T3 S

T8

T5

T2 T1,…,T9

Additional requirement:

Location information

(64)

EMST Backbone Assisted Localized Routing

T8 T9

T7

T6

T5

T4

T1

T2

T3 S

EMST(S,T1,…,T9)

(65)

EMST Backbone Assisted Localized Routing

T8 T9

T7

T6

T5

T4

T1

T2

T3

D1

D2 D3

S

(66)

EMST Backbone Assisted Localized Routing

T8 T9

T7

T6

T5

T4

T1

T2

T3 A

B

C

S

T7,T8,T9

T1,T2,T3 T4,T5,T6

(67)

EMST Backbone Assisted Localized Routing

T8 T9

T7

T6

T5

T4

T1

T2

T3 A

B

C

EMST(C,T7,T8,T9 )

EMST(B,T4,T5,T6 )

EMST(A,T1,T2,T3)

(68)

The Cost over Progress Framework

T3

T1

W V

T2 S

Which one is the better next hop node?

T1,T2,T3

(69)

The Cost over Progress Framework

Approximate expected number of hops H(S,V)

H(S,V)  (|EMST(S,T1,T2,T3)| - |EMST(V,T1,T2,T3)|) / |EMST(S,T1,T2,T3)|

Approximate expected cost C(S,V) = cost(S,V) * H(S,V)

Select node X which provides progress and minimizes C(S,X)

Example: cost(S,X) = b |SX| + c

T3

T1

W V

T2 S

(70)

Example: EMST(s,t0,…,t9)

s

t0

t1 t2

t3

t4

t5

t6 t7

t8

t9

(71)

Example: Final Multicasting Result MT(s,t0,…,t9)

s

t0

t1 t2

t3

t4

t5

t6 t7

t8

t9

(72)

MFACE: Traversal Start

S T6

T5

T4

T3

T1

T2

F1

F2

(73)

MFACE: Traversal Start

S T6

T5

T4

T3

T1

T2

F1

F2

(74)

MFACE: Traversal Continue

S

U

V W

F1 F2

F3

T1

T2 T3

(75)

MFACE: Traversal Continue

S

U

V W

F1 F2

F3

T1

T2 T3

(76)

MFACE: Traversal Continue

S

U

V W

F1 F2

F3

T1

T2 T3

(77)

MFACE: Traversal Continue

S

U

V W

F1 F2

F3

T1

T2 T3 p

(78)

MFACE: Traversal Continue

S

U

V W

F1 F2

F3

T1

T2

(79)

MFACE: Traversal Continue

S

U

V W

F1 F2

F3

T2

(80)

Other Geographic Routing

Approaches

(81)

Geocasting

Reach nodes in a certain area

Geocasting Components

Routing towards the area

Single-path, multi-path

Restricted directional flooding

Dissemination inside the area

Location-aware flooding

Reducing redundant transmissions

Geocast with guaranteed

delivery?

(82)

Geographic Hash Table (GHT) (1)

Idea: hashing on geographical positions

Put() and Get() operations map to the same device near to the hashed location

Mapped device stores data

Use of planar graph routing to find the same device

Source F1 F2 F4 Sink

F5

F6 F3

(83)

Geographic Hash Table (GHT) (2)

Problem: changing network topology

Storing node might disappear

Put() and Get() may retrieve different storing nodes

Source F1 F2 F4 Sink

F5

F6 F3

(84)

Geographic Hash Table (GHT) (3)

Solution

Replication along the face perimeter

Periodic refresh messages traveling along the perimeter

New home node selected when

Refresh packet is missing for a certain timeout

Node closer to destination receives refresh packet

D E

F B

C

A home

replica

D E

F B

C

D E

F B

C

(a) (b) (c)

Referenzen

ÄHNLICHE DOKUMENTE

The results of our computational study also indicate two directions for potential future research: a) Since even for the strongest among the proposed models the bounds of the linear

Here, Rutten is surely right to direct our attention to the concepts of ‘ability’ and ‘willingness’ (Reagan and McEvily, 2003), and to stress the critical role of individuals

mitochondria  requires  the  release  of  cytochrome  c  into  the  cytosol    through  a  process  that  may  involve  the   formation  of  specific  pores  or

The shift method is a linear-time algorithm to pro- duce a straight-line drawing of maximally triconnected, that is, triangulated graphs on a grid with an area bound quadratic in

In Section 5, we show how to construct a hierarchically clustered graph from a cactus representation such that its c-planar drawing represents the set of pairwise non-crossing

We let g r ( x, y ) and g R ( x, y ) be the generating functions for the number of light and heavy r -vertices generated in two steps (first generating a blue tree and then red

Use of BRIVIACT in these age groups is supported by evidence from adequate and well-controlled studies of BRIVIACT in adults with partial-onset seizures, pharmacokinetic data

1 Department of Radiology, Charité – Universitätsmedizin Berlin, corporate member of Freie Universität Berlin, Humboldt-Universität zu Berlin, and Berlin Institute of