Geometric Routing: Of Theory and Practice

Size: px
Start display at page:

Download "Geometric Routing: Of Theory and Practice"

Transcription

1 Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing GPSR: Greedy Perimeter Stateless Routing for Wireless Networks

2 Outline Context Model Algorithm Correctness Worst-case complexity Average-case efficiency Extensions

3 Context Routing Paradigm s If s and t are not connected, then report so? t

4 Context Routing Paradigm s If s and t are not connected, then report so Else, find a path p... p t

5 Context Routing Paradigm s If s and t are not connected, then report so p p Else, find a path p s.t. p / p is minimal t

6 Context Routing Paradigm s If s and t are not connected, then report so p p Else, find a path p s.t. p / p is minimal t Minimize amount of memory per node

7 (x, y) v Context Geometric Routing Each node v stores its own and its neighbors positions O(deg(v)) (= O(1) if deg(v) bounded) Each packet contains: the destination s position O(1) additional control info (e.g. estimated dist. to dest.) + No system state, no routing tables Requires an embedding of the nodes

8 Context Geometric Algorithms Greedy Routing + can be applied w. any embedding + very effective in practice

9 Context Geometric Algorithms? Greedy Routing + can be applied w. any embedding + very effective in practice can get stuck

10 Context Geometric Algorithms RH LH? RH LH LH RH RH Greedy Routing + can be applied w. any embedding + very effective in practice can get stuck Face Routing + certified + can be made asymptotically optimal AFR, OAFR [KWZ 02] requires a planar embedding not quite effective in practice

11 Context Geometric Algorithms RH LH? Solution: combine both techniques: Start by greedy routing When greedy routing gets stuck, toggle face routing GOAFR [KWZ 03], GPSR [KK00]

12 Context Geometric Algorithms RH LH? Solution: combine both techniques: Start by greedy routing When greedy routing gets stuck, toggle face routing GOAFR [KWZ 03], GPSR [KK00] fall back to greedy routing as soon as possible (>GPSR) bound the searchable area (>GOAFR) GOAFR+ (this paper)

13 Model input graph G = (V, E) is a PSLG nodes do not move nodes have same transmission range (say 1) G is a subgraph of the unit-disk graph G UDG (V ) each node has O(1) neighbors in G UDG (V ) G is a subgraph of the Gabriel graph G GG (V ) edges have various transmission costs increasing cost function c : ]0, 1] R + c l (x) = 1 x link distance c d (x) = x x Euclidean distance c α (x) = x α x (α 2) energy cost

14 Model Equivalence of metrics Lemma Assume the degrees of the vertices of G UDG (V ) are bounded by an absolute constant k. Then, for any cost functions c 1 (.) and c 2 (.), there exist four constants: α(k), β(k), α (k), β (k), such that for any cycle-free path p in G UDG (V ), α(k) c 1 (p) + β(k) c 2 (p) α (k) c 1 (p) + β (k)

15 Model Equivalence of metrics Lemma Assume the degrees of the vertices of G UDG (V ) are bounded by an absolute constant k. Then, for any cost functions c 1 (.) and c 2 (.), there exist four constants: α(k), β(k), α (k), β (k), such that for any cycle-free path p in G UDG (V ), α(k) c 1 (p) + β(k) c 2 (p) α (k) c 1 (p) + β (k) Proof. (with c 1 = c d and c 2 = c l ) Every edge of G has length at most 1 c d (p) c l (p). v, #(V D(v, 1)) k starting from v, p cannot travel more than k + 1 edges inside D(v, 1) without making a cycle c l (p) (k + 1) c d (p) (k + 1)(c d (p) + 1). D(v, 1) v

16 Model Equivalence of metrics Lemma Assume the degrees of the vertices of G UDG (V ) are bounded by an absolute constant k. Then, for any cost functions c 1 (.) and c 2 (.), there exist four constants: α(k), β(k), α (k), β (k), such that for any cycle-free path p in G UDG (V ), α(k) c 1 (p) + β(k) c 2 (p) α (k) c 1 (p) + β (k) In the sequel, wlog, we use the link distance metric c l

17 GOAFR+ Algorithm INPUT: G, s, t s t

18 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) s t C

19 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) s t C

20 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: s u min. F p = 0 q = 1 t C

21 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: s u F p = 0 q = 2 t C

22 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards hits C s u F p = 0 q = 2 t C

23 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s u F p = 0 q = 2 t C

24 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s u F p = 0 q = 3 t C

25 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 0 q = 3 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t hits C C

26 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 0 q = 4 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v C

27 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 0 q = 5 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v C

28 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 0 q = 6 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v C

29 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 1 q = 6 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v C

30 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C

31 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C

32 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C

33 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C

34 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C

35 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w C t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t

36 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w C t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t

37 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t 2d. F is entirely explored: let n F be closest to t: if n closer than u to t, then restart 1. from n else report graph disconnection to s (w. GOAFR+)

38 Definition a greedy step (1.) Correctness A round of the algorithm is either: a face routing phase terminated by early fallback (2b. or 2c.) a face routing phase terminated after complete exploration of the boundary of the current face (2d.)

39 Correctness Lemma (monotonicity) Consider a round of the algorithm. If t and the current node u are connected in G, then the packet gets closer to t during the round.

40 Correctness Lemma (monotonicity) Consider a round of the algorithm. If t and the current node u are connected in G, then the packet gets closer to t during the round. Proof. greedy step: the packet goes to a neighbor of u closer to t 2b. or 2c.: when fallback occurs, p 1 and the packet is sent to the previously visited node of F closest to t

41 Correctness Lemma (monotonicity) Consider a round of the algorithm. If t and the current node u are connected in G, then the packet gets closer to t during the round. Proof. greedy step: the packet goes to a neighbor of u closer to t 2b. or 2c.: when fallback occurs, p 1 and the packet is sent to the previously visited node of F closest to t 2d.: since u and t are connected, F contains a vertex closer than u to t. Indeed, if not, an edge e crosses the circle C(t, d(t, u)) between t and u. e cannot be a Gabriel edge. u e t

42 Worst-case complexity Upper bound Theorem The cost of routing a packet from s to t with GOAFR+ is O ( c l (p ) 2), where p is an optimal path from s to t.

43 Worst-case complexity Upper bound Theorem The cost of routing a packet from s to t with GOAFR+ is O ( c l (p ) 2), where p is an optimal path from s to t. Sketch of proof. Let C i = C(t, r max ρ i ), where r max is the radius of the biggest circle C used during the course of the algorithm. (1) r max ρ c l (p ) (radius update policy) p s t p C c d (p ) r c l (p ) r (G UDG ) r C

44 Worst-case complexity Upper bound Theorem The cost of routing a packet from s to t with GOAFR+ is O ( c l (p ) 2), where p is an optimal path from s to t. Sketch of proof. Let C i = C(t, r max ρ i ), where r max is the radius of the biggest circle C used during the course of the algorithm. (1) r max ρ c l (p ) (radius update policy) (2) inside C i, every edge of G is visited O(1) times by GOAFR+ (cf. monotonicity lemma). inside C i, the total cost of GOAFR+ is O( E i ) = O(rC 2 i )

45 Worst-case complexity Upper bound Theorem The cost of routing a packet from s to t with GOAFR+ is O ( c l (p ) 2), where p is an optimal path from s to t. Sketch of proof. Let C i = C(t, r max ρ i ), where r max is the radius of the biggest circle C used during the course of the algorithm. (1) r max ρ c l (p ) (radius update policy) (2) inside C i, every edge of G is visited O(1) times by GOAFR+ (cf. monotonicity lemma). inside C i, the total cost of GOAFR+ is O( E i ) = O(rC 2 i ) (3) sum up over all i s: O ( ( ) ) rc 2 i = r 2 max O ρ 2i = O ( ) ( rmax 2 = O cl (p ) 2) i i

46 Worst-case complexity Given n, distribute 2n nodes evenly along C r n /π Lower bound [KWZ 02] 1 C

47 Worst-case complexity Given n, distribute 2n nodes evenly along C r n /π radial chains stop at r /2 connected only by C n /2π nodes per radius Lower bound [KWZ 02] > 1 r C

48 Worst-case complexity Given n, distribute 2n nodes evenly along C r n /π radial chains stop at r /2 connected only by C n /2π nodes per radius Lower bound [KWZ 02] s t C

49 Given n, distribute 2n nodes evenly along C r n /π radial chains stop at r /2 connected only by C n /2π nodes per radius s Worst-case complexity Lower bound t [KWZ 02] s, t disconnected any algo. A with no routing tables has to explore the whole graph before reporting a graph disconnection. C

50 Worst-case complexity Given n, distribute 2n nodes evenly along C r n /π radial chains stop at r /2 connected only by C n /2π nodes per radius Lower bound [KWZ 02] w s, t disconnected any algo. A with no routing tables has to explore the whole graph before reporting a graph disconnection. s t if A is deterministic, then its execution is the same on this new graph Ω(n 2 ) steps C

51 Average case efficiency randomly and uniformly generated nodes on a field unit disk graph

52 Average case efficiency randomly and uniformly generated nodes on a field unit disk graph intersection with Gabriel graph randomly chosen source and destination

53 Average case efficiency GPSR GOAFR GOAFR FC GOAFR+

54 Extensions Dropping the O(1)-neighbors hypothesis Without the O(1)-neighbors hypothesis, GOAFR+ is still certified, but no longer guaranteed to be worst-case optimal. if a node v knows all its neighbors, then the data stored at v is no longer O(1)

55 Extensions Dropping the O(1)-neighbors hypothesis

56 Extensions Dropping the O(1)-neighbors hypothesis Initial construction: routing backbone graph G BG G: - G BG is a bounded-degree UDG - v G, w G BG s.t. [v, w] E

57 Extensions Dropping the O(1)-neighbors hypothesis Initial construction: routing backbone graph G BG G: - G BG is a bounded-degree UDG - v G, w G BG s.t. [v, w] E clustered backbone graph G CBG

58 Extensions Dropping the O(1)-neighbors hypothesis Initial construction: routing backbone graph G BG G: - G BG is a bounded-degree UDG - v G, w G BG s.t. [v, w] E clustered backbone graph G CBG Routing: (1) reach G BG from s, using G CBG (2) apply GOAFR+ on G BG (3) reach t from G BG, using G CBG

59 Extensions Dropping the O(1)-neighbors hypothesis Definition A cost function c(.) is linearly bounded if there exists some constant m > 0 such that x ]0, 1], c(x) m x. A cost function that is not linearly bounded is said super-linear. 1 c l (.) c d (.) c α (.) 0 1

60 Extensions Dropping the O(1)-neighbors hypothesis Definition A cost function c(.) is linearly bounded if there exists some constant m > 0 such that x ]0, 1], c(x) m x. A cost function that is not linearly bounded is said super-linear. Theorem if c(.) is linearly bounded, then for any UDG G, for any s, t V, the routing algorithm finds a path p from s to t, with c(p) = O ( c(p ) 2). if c(.) is super-linear, then no geometric routing algorithm can find a path p s.t. c(p) = O ( c(p ) 2) for any pair of vertices of any UDG.

61 Conclusion Contributions: Yet another geometric routing algorithm (combines existing techniques). Extension of geometric routing to UDGs with unbounded-degree vertices. Open questions: Is the UDG hypothesis relevant in practice? What is the pracicality of the general cost model linearly bounded vs. super-linear? Can one get rid of the planar embedding?

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Routing s??? t s PODC 2003 2 Greedy Routing Each node forwards message to best neighbor

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Geometric Ad-Hoc Routing: Of Theory and Practice

Geometric Ad-Hoc Routing: Of Theory and Practice Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerland {kuhn, wattenhofer, yzhang,

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing

Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 892 Zurich, Switzerland {kuhn, wattenhofer,

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

Routing. Geo-Routing. Thanks to Stefan Schmid for slides Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Chapter 6 DOMINATING SETS

Chapter 6 DOMINATING SETS Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs

Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs Aravind Ranganathan University of Cincinnati February 22, 2007 Motivation Routing in wireless

More information

Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

Geometric Spanners for Routing in Mobile Networks

Geometric Spanners for Routing in Mobile Networks 1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile

More information

Theory and Practice of Geographic Routing

Theory and Practice of Geographic Routing Theory and Practice of Geographic Routing Stefan Rührup Department of Computer Science University of Freiburg, Germany February 2009 Abstract Geographic routing algorithms use position information for

More information

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks Atekeh Maghsoudlou, Marc St-Hilaire, and Thomas Kunz Department of Systems and Computer Engineering Carleton University, Ottawa, ON,

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was

More information

Distributed Computing over Communication Networks: Leader Election

Distributed Computing over Communication Networks: Leader Election Distributed Computing over Communication Networks: Leader Election Motivation Reasons for electing a leader? Reasons for not electing a leader? Motivation Reasons for electing a leader? Once elected, coordination

More information

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department Mobile Advanced Networks Position-based routing geometric, geographic, location-based Navid Nikaein Mobile Communication Department Navid Nikaein 2010 1 Reminder In topology-based routing, each node has

More information

Robust Position-based Routing for Wireless Ad Hoc Networks

Robust Position-based Routing for Wireless Ad Hoc Networks Robust Position-based Routing for Wireless Ad Hoc Networks Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li Department of Computer Science Illinois Institute of Technology Abstract We consider a wireless

More information

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Overview What is Topology Control? Context related work Explicit interference model Interference

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Oblivious Routing on Geometric Networks

Oblivious Routing on Geometric Networks Oblivious Routing on Geometric Networks Costas Busch, Malik Magdon-Ismail and Jing Xi {buschc,magdon,xij2}@cs.rpi.edu July 20, 2005. Outline Oblivious Routing: Background and Our Contribution The Algorithm:

More information

Geographic Routing on Improved Coordinates

Geographic Routing on Improved Coordinates Geographic Routing on mproved Coordinates Ulrik Brandes, Daniel Fleischer Department of Computer & nformation Science, University of Konstanz Abstract We consider routing methods for networks when geographic

More information

Random Walks and Cover Times. Project Report. Aravind Ranganathan. ECES 728 Internet Studies and Web Algorithms

Random Walks and Cover Times. Project Report. Aravind Ranganathan. ECES 728 Internet Studies and Web Algorithms Random Walks and Cover Times Project Report Aravind Ranganathan ECES 728 Internet Studies and Web Algorithms 1. Objectives: We consider random walk based broadcast-like operation in random networks. First,

More information

Asymptotically Optimal Geometric Mobile Ad-Hoc Routing

Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Fabian Kuhn Department of Computer Science ETH Zurich 8092 Zurich, Switzerland kuhn@inf.ethz.ch Roger Wattenhofer Department of Computer Science ETH

More information

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Wen-Zhan Song Yu Wang Xiang-Yang Li Ophir Frieder Abstract. Topology control in wireless ad hoc networks is to select a subgraph

More information

Linear Programming in Small Dimensions

Linear Programming in Small Dimensions Linear Programming in Small Dimensions Lekcija 7 sergio.cabello@fmf.uni-lj.si FMF Univerza v Ljubljani Edited from slides by Antoine Vigneron Outline linear programming, motivation and definition one dimensional

More information

arxiv:cs/ v1 [cs.dc] 22 Nov 2006

arxiv:cs/ v1 [cs.dc] 22 Nov 2006 arxiv:cs/0611117v1 [cs.dc] 22 Nov 06 Abstract 2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing Mark Miyashita Mikhail Nesterenko Department of Computer Science Kent State University

More information

Sorting Based Data Centric Storage

Sorting Based Data Centric Storage Sorting Based Data Centric Storage Fenghui Zhang, Anxiao(Andrew) Jiang, and Jianer Chen Dept. of Computer Science, Texas A&M Univ. College Station, TX 77843. {fhzhang, ajiang, chen}@cs.tamu.edu. Abstract

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

SAMPLING AND THE MOMENT TECHNIQUE. By Sveta Oksen

SAMPLING AND THE MOMENT TECHNIQUE. By Sveta Oksen SAMPLING AND THE MOMENT TECHNIQUE By Sveta Oksen Overview - Vertical decomposition - Construction - Running time analysis - The bounded moments theorem - General settings - The sampling model - The exponential

More information

Improved algorithms for constructing fault-tolerant spanners

Improved algorithms for constructing fault-tolerant spanners Improved algorithms for constructing fault-tolerant spanners Christos Levcopoulos Giri Narasimhan Michiel Smid December 8, 2000 Abstract Let S be a set of n points in a metric space, and k a positive integer.

More information

Survey on Position-Based Routing 1

Survey on Position-Based Routing 1 Survey on Position-Based Routing 1 Filipe Araújo and Luís Rodrigues Universidade de Lisboa {filipius,ler}@di.fc.ul.pt Abstract In this paper we review position-based routing for wireless ad hoc and for

More information

Online Algorithms. Lecture 11

Online Algorithms. Lecture 11 Online Algorithms Lecture 11 Today DC on trees DC on arbitrary metrics DC on circle Scheduling K-server on trees Theorem The DC Algorithm is k-competitive for the k server problem on arbitrary tree metrics.

More information

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility Outline CS38 Introduction to Algorithms Lecture 18 May 29, 2014 coping with intractibility approximation algorithms set cover TSP center selection randomness in algorithms May 29, 2014 CS38 Lecture 18

More information

Clustering: Centroid-Based Partitioning

Clustering: Centroid-Based Partitioning Clustering: Centroid-Based Partitioning Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong 1 / 29 Y Tao Clustering: Centroid-Based Partitioning In this lecture, we

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Approximation Algorithms for Clustering Uncertain Data

Approximation Algorithms for Clustering Uncertain Data Approximation Algorithms for Clustering Uncertain Data Graham Cormode AT&T Labs - Research graham@research.att.com Andrew McGregor UCSD / MSR / UMass Amherst andrewm@ucsd.edu Introduction Many applications

More information

arxiv: v2 [cs.dc] 28 Feb 2018

arxiv: v2 [cs.dc] 28 Feb 2018 Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &

More information

Geographical Quadtree Routing

Geographical Quadtree Routing Geographical Quadtree Routing Chen Avin, Yaniv Dvory, Ran Giladi Department of Communication Systems Engineering Ben Gurion University of the Negev Beer Sheva 84105, Israel Email: avin@cse.bgu.ac.il, dvory@bgu.ac.il,

More information

Geometric Problems on Ad-Hoc Networ (Computational Geometry and Discret. Citation 数理解析研究所講究録 (2009), 1641:

Geometric Problems on Ad-Hoc Networ (Computational Geometry and Discret. Citation 数理解析研究所講究録 (2009), 1641: Title Geometric Problems on Ad-Hoc Networ (Computational Geometry and Discret Author(s) Tokuyama, Takeshi Citation 数理解析研究所講究録 (2009), 1641: 135-143 Issue Date 2009-04 URL http://hdl.handle.net/2433/140577

More information

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Wen-Zhan Song Yu Wang Xiang-Yang Li Ophir Frieder ABSTRACT We propose several novel localized algorithms to construct energy

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

Localized Topology Control for Heterogeneous Wireless Sensor Networks

Localized Topology Control for Heterogeneous Wireless Sensor Networks Localized Topology Control for Heterogeneous Wireless Sensor Networks Xiang-Yang Li Wen-Zhan Song Yu Wang 2 The paper studies topology control in heterogeneous wireless sensor networks, where different

More information

Computational Geometry

Computational Geometry Lecture 12: Lecture 12: Motivation: Terrains by interpolation To build a model of the terrain surface, we can start with a number of sample points where we know the height. Lecture 12: Motivation: Terrains

More information

CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension

CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension Antoine Vigneron King Abdullah University of Science and Technology November 7, 2012 Antoine Vigneron (KAUST) CS 372 Lecture

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

Approximation Algorithms

Approximation Algorithms Chapter 8 Approximation Algorithms Algorithm Theory WS 2016/17 Fabian Kuhn Approximation Algorithms Optimization appears everywhere in computer science We have seen many examples, e.g.: scheduling jobs

More information

Wireless Networking Graph Theory Unplugged. Distributed Computing Group Roger Wattenhofer WG 2004

Wireless Networking Graph Theory Unplugged. Distributed Computing Group Roger Wattenhofer WG 2004 Wireless Networking Graph Theory Unplugged Distributed Computing Group Roger Wattenhofer WG 2004 Overview Introduction Ad-Hoc and Sensor Networks Routing / Broadcasting Clustering Topology Control Conclusions

More information

On the perimeter of k pairwise disjoint convex bodies contained in a convex set in the plane

On the perimeter of k pairwise disjoint convex bodies contained in a convex set in the plane On the perimeter of k pairwise disjoint convex bodies contained in a convex set in the plane Rom Pinchasi August 2, 214 Abstract We prove the following isoperimetric inequality in R 2, conjectured by Glazyrin

More information

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Graphs Extremely important concept in computer science Graph, : node (or vertex) set : edge set Simple graph: no self loops, no multiple

More information

Guaranteed-delivery Geographic Routing under Uncertain Node Locations

Guaranteed-delivery Geographic Routing under Uncertain Node Locations Guaranteed-delivery Geographic Routing under Uncertain Node Locations Stefan Funke Max-Planck-Institut für Informatik Stuhlsatzenhausweg 85 66123 Saarbrücken, Germany Email: funke@mpi-inf.mpg.de Nikola

More information

Routing on Overlay Graphs in Mobile Ad Hoc Networks

Routing on Overlay Graphs in Mobile Ad Hoc Networks Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming

More information

Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks

Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Mohit Chawla 1, Nishith Goel 2, Kalai Kalaichelvan 3, Amiya Nayak 4, and Ivan Stojmenovic 4 1 IIT Guwahati,

More information

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks

Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks By Evangelos Kranakis School of Computer Science Carleton

More information

A Robust Interference Model for Wireless Ad-Hoc Networks

A Robust Interference Model for Wireless Ad-Hoc Networks A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach, Stefan Schmid, Roger Wattenhofer, Aaron Zollinger {vonrickenbach, schmiste, wattenhofer, zollinger}@tik.ee.ethz.ch Computer

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Outline Localisation and Positioning Topology Control Routing Summary WS 2009/2010 Prof. Dr. Dieter Hogrefe/Prof. Dr. Xiaoming Fu Dr. Omar

More information

GRAAL/AEOLUS School on Hot Topics in Network Algorithms. Algorithms for Sensor Networks Roger Wattenhofer 2/1

GRAAL/AEOLUS School on Hot Topics in Network Algorithms. Algorithms for Sensor Networks Roger Wattenhofer 2/1 Algorithms for Sensor Networks GRAAL/AEOLUS School on Hot Topics in Network Algorithms Algorithms for Sensor Networks Roger Wattenhofer 2/1 Sensor Networks = Distributed Algorithms? Reloaded Distributed

More information

Highway Dimension and Provably Efficient Shortest Paths Algorithms

Highway Dimension and Provably Efficient Shortest Paths Algorithms Highway Dimension and Provably Efficient Shortest Paths Algorithms Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Joint with Ittai Abraham, Amos Fiat, and Renato

More information

arxiv: v1 [cs.ma] 8 May 2018

arxiv: v1 [cs.ma] 8 May 2018 Ordinal Approximation for Social Choice, Matching, and Facility Location Problems given Candidate Positions Elliot Anshelevich and Wennan Zhu arxiv:1805.03103v1 [cs.ma] 8 May 2018 May 9, 2018 Abstract

More information

Compact and Low Delay Routing Labeling Scheme for Unit Disk. Graphs

Compact and Low Delay Routing Labeling Scheme for Unit Disk. Graphs Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang and Feodor F. Dragan Algorithmic Research Laboratory, Department of Computer Science Kent State University, Kent,

More information

Convex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes

Convex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes Convex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes Menelaos I. Karavelas joint work with Eleni Tzanaki University of Crete & FO.R.T.H. OrbiCG/ Workshop on Computational

More information

CS133 Computational Geometry

CS133 Computational Geometry CS133 Computational Geometry Voronoi Diagram Delaunay Triangulation 5/17/2018 1 Nearest Neighbor Problem Given a set of points P and a query point q, find the closest point p P to q p, r P, dist p, q dist(r,

More information

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer

More information

Divided-and-Conquer for Voronoi Diagrams Revisited. Supervisor: Ben Galehouse Presenter: Xiaoqi Cao

Divided-and-Conquer for Voronoi Diagrams Revisited. Supervisor: Ben Galehouse Presenter: Xiaoqi Cao Divided-and-Conquer for Voronoi Diagrams Revisited Supervisor: Ben Galehouse Presenter: Xiaoqi Cao Outline Introduction Generalized Voronoi Diagram Algorithm for building generalized Voronoi Diagram Applications

More information

Competitive analysis of aggregate max in windowed streaming. July 9, 2009

Competitive analysis of aggregate max in windowed streaming. July 9, 2009 Competitive analysis of aggregate max in windowed streaming Elias Koutsoupias University of Athens Luca Becchetti University of Rome July 9, 2009 The streaming model Streaming A stream is a sequence of

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Approximation Algorithms: The Primal-Dual Method. My T. Thai

Approximation Algorithms: The Primal-Dual Method. My T. Thai Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the

More information

Online Graph Exploration

Online Graph Exploration Distributed Computing Online Graph Exploration Semester thesis Simon Hungerbühler simonhu@ethz.ch Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich Supervisors: Sebastian

More information

Thomas Moscibroda Roger Wattenhofer MASS Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks

Thomas Moscibroda Roger Wattenhofer MASS Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks Thomas Moscibroda Roger Wattenhofer Distributed Computing Group MASS 2004 Algorithms for Ad Hoc and Sensor Networks...

More information

Near Optimal Broadcast with Network Coding in Large Sensor Networks

Near Optimal Broadcast with Network Coding in Large Sensor Networks in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA

More information

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,

More information

Given a graph, find an embedding s.t. greedy routing works

Given a graph, find an embedding s.t. greedy routing works Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there

More information

Routing. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1

Routing. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Routing Chapter 11 Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Application of the Week: Games / Art Uncountable possibilities, below, e.g., a beer coaster that can interact with other coasters [sentilla]

More information

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges 1 Connected Dominating Sets in Wireless Networks with Different Transmission Ranges My T. Thai Feng Wang Dan Liu Shiwei Zhu Ding-Zhu Du Dept. of Computer Science & Enginering University of Minnesota Minneapolis,

More information

Routing with Guaranteed Delivery on Virtual Coordinates

Routing with Guaranteed Delivery on Virtual Coordinates Routing with Guaranteed Delivery on Virtual Coordinates The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Published Version

More information

Localized Topology Control for Heterogeneous Wireless Sensor Networks

Localized Topology Control for Heterogeneous Wireless Sensor Networks Localized Topology Control for Heterogeneous Wireless Sensor Networks XIANG-YANG LI Illinois Institute of Technology WEN-ZHAN SONG Washington State University and YU WANG University of North Carolina at

More information

The geometry and combinatorics of closed geodesics on hyperbolic surfaces

The geometry and combinatorics of closed geodesics on hyperbolic surfaces The geometry and combinatorics of closed geodesics on hyperbolic surfaces CUNY Graduate Center September 8th, 2015 Motivating Question: How are the algebraic/combinatoric properties of closed geodesics

More information

A Local O(1)-Approximation for Dominating Sets on Bounded Genus Graphs

A Local O(1)-Approximation for Dominating Sets on Bounded Genus Graphs A Local O(1)-Approximation for Dominating Sets on Bounded Genus Graphs Saeed Akhoondian Amiri Stefan Schmid Sebastian Siebertz Table of contents 1 Introduction 2 Definitions and Prelims 3 Algorithm 4 Analysis

More information

PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS

PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS Shinya Ito 1 and Kenji Yoshigoe 1 BeachHead, Inc., 37899 W. 1 Mile Rd, Suite 100 Farmington Hills, MI

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 10

CPSC 536N: Randomized Algorithms Term 2. Lecture 10 CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very

More information

Ma/CS 6b Class 11: Kuratowski and Coloring

Ma/CS 6b Class 11: Kuratowski and Coloring Ma/CS 6b Class 11: Kuratowski and Coloring By Adam Sheffer Kuratowski's Theorem Theorem. A graph is planar if and only if it does not have K 5 and K 3,3 as topological minors. We know that if a graph contains

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

A synchronizer generates sequences of clock pulses at each node of the network satisfying the condition given by the following definition.

A synchronizer generates sequences of clock pulses at each node of the network satisfying the condition given by the following definition. Chapter 8 Synchronizers So far, we have mainly studied synchronous algorithms because generally, asynchronous algorithms are often more di cult to obtain and it is substantially harder to reason about

More information

Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost

Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R

More information