• Keine Ergebnisse gefunden

Local Data Communication

N/A
N/A
Protected

Academic year: 2022

Aktie "Local Data Communication"

Copied!
41
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Local Network Structures

Local Data Communication

(2)

MOTIVATION

Anwendung von schnittfeien Teilgraphen zur lokalen Lösung von netzwerkweiten Aufgaben

2

(3)

Beispiele und ausgewählte Arbeiten (1)

 Unicast

[1] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,”Wireless Networks, vol. 7, no. 6, pp. 609–

616, nov 2001.

[2] B. Karp and H. T. Kung, “Gpsr: Greedy perimeter stateless routingfor wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, 2000, pp. 243–254.

[3] F. Kuhn, R. Wattenhofer, and A. Zollinger, “An algorithmic approach to

geographic routing in ad hoc and sensor networks,” IEEE/ACM Transactions on Networking, vol. 16, no. 1, pp. 51–62, Feb 2008.

 Multicast

[4] H. Frey, F. Ingelrest, and D. Simplot-Ryl, “Localized minimum spanning tree based multicast routing with energy-efficient guaranteed delivery in ad hoc and sensor networks,” in 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, June 2008, pp.1–8.

[5] J. A. Sanchez, P. M. Ruiz, J. Liu, and I. Stojmenovic, “Bandwidth-Efficient Geographic Multicast Routing Protocol for Wireless Sensor Networks,” IEEE Sensors Journal, vol. 7, no. 5, pp. 627–636, may 2007.

3

(4)

Beispiele und ausgewählte Arbeiten (2)

 Geocast

[6] I. Stojmenovic, “Geocasting with guaranteed delivery in sensor net-works,” IEEE Wireless Communications, vol. 11, no. 6, pp. 29–37, Dec 2004.

 Anycast

[7] N. Mitton, D. Simplot-Ryl, and I. Stojmenovic, “Guaranteed delivery

forgeographical anycasting in wireless multi-sink sensor and sensor-actornetworks,”

in IEEE INFOCOM 2009, April 2009, pp. 2691–2695.

 Mobicast

[8] Q. Huang, C. Lu, and G. C. Roman, “Reliable mobicast via face-aware routing,” in IEEE INFOCOM 2004, vol. 3, March 2004, pp. 2108–2118 vol.3.

 Broadcast

[9] M. Seddigh, J. S. Gonzalez, and I. Stojmenovic, “RNG and internal node based broadcasting algorithms for wireless one-to-one networks,” SIGMOBILE Mobile Computing and Communications Review, vol. 5,no. 2, pp. 37–44, Apr. 2001.

[10] I. Stojmenovic, M. Seddigh, and J. Zunic, “Dominating Sets and Neighbor Elimination-Based Broadcasting Algorithms in Wireless Networks,” IEEE

Transactions on Parallel and Distributed Systems, vol. 13, no. 1,pp. 14–25, 2002.

4

(5)

Beispiele und ausgewählte Arbeiten (3)

 Void- und Boundary-Detection

[11] Q. Fang, J. Gao, and L. J. Guibas, “Locating and bypassing routing holes in sensor networks,” in IEEE INFOCOM 2004, vol. 4, March 2004, pp.2458–2468 vol.

4.

 Distributed Data-Storage

[12] S. Rathnasamy, B. Krap, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu,

“Data-centric storage in sensornets with GHT, a geographic hashtable,” Mobile Networks and Applications, vol. 8, no. 4, pp. 427–442,Aug 2003.

[13] Y. Deng and I. Stojmenovic, “Partial delaunay triangulations based data-centric storage and routing with guaranteed delivery in wireless ad hoc and sensor

networks,” in 2009 Mexican International Conference on Computer Science, Sept 2009, pp. 24–32

.

 Mobile-Object tracking

[14] H.-W. Tsai, C.-P. Chu, and T.-S. Chen, “Mobile object tracking in wireless sensor networks,” Computer Communications, vol. 30, no. 8,pp. 1811–1825, Jun.

2007.

5

(6)

Beispiele und ausgewählte Arbeiten (4)

 Lokale Adress-Autokonfiguration

[15] X. Li, Y. Deng, V. Narasimhan, A. Nayak, and I. Stojmenovic, “Localized address auto configuration in wireless ad hoc networks,” in2010 International

Conference on Wireless Communications Signal Processing (WCSP), Oct 2010, pp.

1–6.

 Koordination von mobilen Sensoren

[16] J. Tan, A Scalable Graph Model and Coordination Algorithms for Mobile Sensor Networks. Boston, MA: Springer US, 2008, pp. 65–83.

6

(7)

We consider exemplarily Unicast and Multicast

Ad-Hoc Routing Protocols

Proactive

Topology-based Geographic

Reactive Basic Greedy

Partial Flooding DFS-based

Stateless

Energy aware Remark 1: Topology control is typically

achieved by a localized algorithm.

Remark 2: Topology-based routing will be covered in the lecture DraKo

(Drahtlose Kommunikation)

non-localized localized

7

A Classification of Wireless Network Routing in general

(8)

Discussion

 However correctness of localized routing strategies requires some structuring of the underlying network.

There exists no local Routing algorithm which works for any underlying connected graph.

• See Durocher, S., Kirkpatrick, D., & Narayanan, L. (2008). On Routing with Guaranteed Delivery in Three-Dimensional Ad Hoc Wireless

Networks. In Proceedings of the Ninth International Conference on Distributed Computing and Networking (ICDCN 2008) (pp. 546–557).

 A sufficient condition for correctness of some local routing strategies is exactly that the underlying graph has no intersecting links

8

(9)

GEOGRAPHISCHES UNICAST- FORWARDING

9

(10)

10 Localized Geographic Unicast Forwarding

Assumptions:

 Localization system

 Nodes know position of

• Themselves

• Their neighbors

• The destination source node

destination node

(11)

Data Communication

Localized Geographic Greedy Packet Forwarding

(12)

Localized Geographic Routing

 Determine own location

 Acquire destination’s location

• Unicast and Multicast

• Geocast

• Anycast

 Routing message

• Constant Size

• Stores destination position

 Localized forwarding decision

Destination

Source

15

(13)

Greedy Packet Forwarding

 Select neighbor with the “best” location regarding the metric being optimized

 Each node applies this greedy principle until destination is eventually reached

T S

A B

F

D C

E

16

(14)

Basic Single-Path Strategies

 Produce nearly the same path

 If successful performance close to SP

 Delivery rate decreases significantly in sparse networks

MFR GREEDY

17

(15)

Basic Single Path Strategies

 Rationale: try to minimize Euclidean path length a packet has to travel DIR

18

(16)

Loop-Freedom of Greedy Routing

 The discussed forwarding based on distance and progress consider nodes in forward direction only to provide loop-free operation (see Fig. (a))

 Direction-based strategies do not guarantee loop-free operation (see Fig. (b))

S

A B

D

(a) (b)

19

(17)

Greedy Routing Failure

 Choosing node in backward direction may lead to packet loops

 Nevertheless, there may exist a path from S to D (S may also be an intermediate node)

 Loop-freedom and delivery rate are conflicting goals

 Solutions?

34

(18)

Motivation

 Many greedy routing schemes perform well in dense networks

 Greedy routing has a small communication overhead

 Desirable to run greedy routing as long as possible

 However, greedy routing might fail in sparse networks

 Guaranteed delivery is a desirable property as well

 In case of failure

• run a recovery mechanism which requires memorizing past routing information

in the message

in the visited node

• run a stateless recovery mechanism

does such strategy exist at all??

37

(19)

MEMORYLESS MESSAGE DELIVERY WITH

GUARANTEED DELIVERY?

42

(20)

44 Recovery based on Planar-Graph Routing

source node

destination node

(21)

45 Planar Graph Routing Example

T S

P

F

(22)

46 Planar Graph Routing Example

T S

Q

F

P

(23)

47 Planar Graph Routing Example

T S

F

P

(24)

48 Planar Graph Routing Example

T S

P

F

(25)

Data Communication

Localized Geographic Multicasting

(26)

69 EMST Backbone Assisted Localized Routing

T9

T7

T6

T4

T1

T3 S

T8

T5

T2

T1,…,T9

(27)

70 EMST Backbone Assisted Localized Routing

T8 T9

T7

T6

T5

T4

T1

T2

T3 S

EMST(S,T1,…,T9)

(28)

71 EMST Backbone Assisted Localized Routing

T8 T9

T7

T6

T5

T4

T1

T2

T3

D1

D2 D3

S

(29)

72 EMST Backbone Assisted Localized Routing

T8 T9

T7

T6

T5

T4

T1

T2

T3 A

B

C

S

T7,T8,T9

T1,T2,T3

T4,T5,T6

(30)

73 The Cost over Progress Framework

T3

T1

W V

T2 S

Which one is the better next hop node?

T1,T2,T3

(31)

74 The Cost over Progress Framework

 Approximate expected number of hops H(S,V)

 H(S,V)  |EMST(S,T1,T2,T3)| / (|EMST(S,T1,T2,T3)| - |EMST(V,T1,T2,T3)|)

 Approximate expected cost C(S,V) = cost(S,V) * H(S,V)

 Select node X which provides progress and minimizes C(S,X) T3

T1

W V

T2

S

(32)

75

MSTEAM & MFACE

S T6

T5

T4

T3

T1

T2

F1

F2

(33)

76

MSTEAM & MFACE

S T6

T5

T4

T3

T1

T2

F1

F2

(34)

77

MSTEAM & MFACE

S

U

V W

F1 F2

F3

T1

T2

T3

(35)

78

MSTEAM & MFACE

S

U

V W

F1 F2

F3

T1

T2

T3

(36)

79

MSTEAM & MFACE

S

U

V W

F1 F2

F3

T1

T2

T3

(37)

80

MSTEAM & MFACE

S

U

V W

F1 F2

F3

T1

T2

T3

p

(38)

81

MSTEAM & MFACE

S

U

V W

F1 F2

F3

T1

T2

(39)

82

MSTEAM & MFACE

S

U

V W

F1 F2

F3

T2

(40)

Summary

 We considered here: wireless networking without complex infrastructure

 Coverage of larger areas and limited communication range

 Multi-hop communication

 So we're mainly dealing with a network problem

 Major problems: routing and topology control

 Adaptation of traditional routing procedures: topology-based routing

 New routing approach based on node coordinates

 This approach allows completely new forms of data communication and generally completely new forms of network organization

 General paradigm to deal with the dynamics of such multihop networks without infrastructure: local algorithms / procedures

 (This paradigm can also be used to master complex and dynamic Internet overlay topologies)

85

(41)

Summary

 We considered construction of intersection free graphs as one important feature

 In addition to that, other graph related problems can be studied

• Maximal Connected Dominating Sets

• Maximal Independent Sets

• Clustering

• Spectral Graph theory (e.g. for Consensus)

86

Thank you for your interest!

If you like graphs and algorithms – and the principle idea of localized algorithm design – joint the AG UniKoRN. We have interesting master and bachelor

topics in that regards 

Referenzen

ÄHNLICHE DOKUMENTE

Vehicles equipped with a self-organizing wireless ad hoc communication system form a Vehicular Ad Hoc Network (VANET) for exchang- ing data on the locally seen road and traffic

Since a local graph contains all edges used by traditional user-based CF for rating predictions based on the global graph, the same results can be obtained from the local graph

As a result, we confirm that the MIPR-LC method can reduce energy consumption by up to 23% when compared with a simple routing protocol, and the mobile sink nodes can gather almost

Adaptive protocols perform slightly better in scenarios with a higher update frequency (400 updates) because more information in the network produces more status information

Aufgrund des Overlay-Routing-Protokolls stellen diese Elternknoten auch jeweils die Kno- ten dar, von welchen Daten einer Quelle am effizientesten bezogen werden k¨onnen.. Ein

In addition, multicast ad hoc routing protocols specifically designed for mobile ad hoc networks such as ODMRP[LSG00] and ADMR[JJ01] are only suitable for isolated ad hoc networks,

They observed increased throughput in mobile ad-hoc networks by complementing DSR with a watchdog for detection of de- nied packet forwarding and a pathrater for trust management

We showed that approaches to this problem that use only three variables per link l, namely: F , the load induced by the primary paths, G, the load induced by the backup paths, and