Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks

Size: px
Start display at page:

Download "Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks"

Transcription

1 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks By Evangelos Kranakis School of Computer Science Carleton University

2 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Wireless systems from Piconets Home/Office Networks Bluetooth Networks (Packet) Radio Networks Cellular phone systems Sensor Networks Satellite networks Lots of Wireless Systems have become all too pervasive in our everyday lives. Question: How do you discover efficiently a route in such a wireless system?

3 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 3 The Way it is Wireless Connection Wireless Connection s t A CLOUD Public Telephone System B How do you discover a route from a source s to a destination t? Simple: 1. s sends message to base station A. 2. The public phone system transmits it to base station B. 3. Base station B transmits it to t.

4 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 4 Routing Data from s to t in a Wireless Ad-Hoc System s t How do you discover a route from a source s to a destination t through a maze of mobile devices (radios, mobile phones, PDAs, etc) and antenas?

5 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 5 Power of the Signal and Connectivity A B A B The power of received signal is inversely proportional to the distance d between the receivers raised to some power a, i.e., P (d) = P 0 d a, where P 0 is the power received at distance 1 from the transmitter.

6 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 6 Equal Power Assumption! A B A B To simplify things stations are assumed to have equal power! In the left picture A can reach B and B can reach A. In the right picture A can reach B but B cannot reach A. Later we will remove the equal power assumption!

7 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 7 From Mobile Devices to Circles s t Looking at the power of received signal a group of circles is formed that determines network connectivity, i.e. who can reach whom!

8 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 8 There are Other Factors Complicating Connectivity! More than one node may be transmiting to a given node t. Source Nodes u 2 u 1 u 3 u 4 t Target u 5 u 6 Node i succeeds only if P (u i,t) d(u i,t) a N + j i P (u j,t) d(u j,t) a α where α is a threshold value, and N is the noise level We ignore these factors!

9 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 9 From Circles to Edges s t There is always an underlying geometric graph with faces and edges. How do you construct this geometric graph from the mobile devices? You must remove non-essential edges!

10 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 10 Constructing Geometric Graph not Always Simple! s t Graph is too complicated when transmitters are too close to each other!

11 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 11 Gabriel Test A C B Assume points A and B can reach each other. Draw circle with diameter AB. If there is another point, say C inside this circle then the link connecting A to B is not needed! So, forget the direct link from A to B!

12 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 12 You maintain a Routing Table. How do you forget something? A kind of data base that when you are at A you ask: How do I reach B? It gives you the answer: Go to C. And when you reach C you ask again: How do I reach B? It gives you the answer: Go to B. Standard routing table contains an entry for each possible destination with the out-going link to use for destination Message delivery proceeds in the obvious manner one link at a time, looking up the next link in the table.

13 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 13 Simple Example: Applying the Gabriel Test How do we apply the Gabriel test? A B

14 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 14 Applying the Gabriel Test A B

15 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 15 Applying the Gabriel Test A B

16 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 16 Applying the Gabriel Test A B

17 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 17 Applying the Gabriel Test A B

18 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 18 Applying the Gabriel Test A B

19 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 19 Applying the Gabriel Test A B

20 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 20 Applying the Gabriel Test A B

21 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 21 Applying the Gabriel Test A B

22 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 22 Applying the Gabriel Test A B

23 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 23 Too many hops spoil the batteries! The Gabriel test creates a planar graph but removes long links. A B I could have reached B directly from A in one hop. Instead it takes me five hops! What is important: the Gabriel test will remove all crossings!

24 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 24 Global Positioning Systems (GPS) s t Can use GPS to discover the (x, y) coordinates of the target node. GPS uses three satellites in line of sight. It determines location by time-of-arrival differences (temporal delays of several signals). Can always construct an undelying geometric planar graph using the Gabriel test!

25 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 25 Routing in a Geometric Planar Network Input: A geometric graph. Goal. Go from source node s to target node t. We need some kind of capabilities in order to move towards the target t. This may include the following Updating coordinates of current position c. Must know the coordinates of t. If c is our current position we need to be able to determine the slope of the line ct. We need to be able to determine the slopes of the edges incident to our current position.

26 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 26 Back to Route Discovery After applying the Gabriel test we have a planar graph. s t Using GPS we can find out the (x, y) coordinates of s and t. Hence, we can compute the slope of the line st. But how do we use this information in order to discover a route?

27 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 27 Algorithm 1. Start at source node c := s. 2. in a recursive way: Compass Routing (a) Choose edge of our geometric graph incident to our current position and with the smallest slope to that of the line ct. (b) Traverse the chosen edge. (c) Go back to (a) and repeat until target t is found With compass routing s will never reach t!

28 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 28 s t

29 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 29 Face-Routing Algorithm. Face-Routing 1. Starting at c := s determine face F := F 0 incident to c intersected by the line segment st. 2. Select any of the two edges of F 0 incident to c and start traversing the edges of F 0 until we find the second edge, say xy, of F 0 intersected by st. 3. Update face F to the new face of the graph containing edge uv, and vertex v to either of the vertices x or y. 4. Iterate until t is found.

30 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 30 Go from s to t s c t Initially c := s. Update c and repeat.

31 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 31 Go from s to t s c t Update c and repeat.

32 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 32 Go from s to t s c t Update c : and repeat.

33 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 33 Go from s to t s t c Update c : and repeat.

34 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 34 Go from s to t s t Now t is found.

35 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 35 Analysis of Face-Routing Face routing always advances to a new face. We never traverse the same face twice. The distance from the current position c to t gets smaller with each iteration. Each link is traversed a constant number of times. Since the graph is planar face routing traverses at most O(n) edges. Problems with Face-Routing No indication how long is the Euclidean distance traveled! But does it matter? All we wanted was to discover a route!

36 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 36 And now the Butterflies: Butterfly test A B With the butterfly test we can test for a larger region! Can eliminate links faster! Compare with the Gabriel test!

37 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 37 Monarch Butterflies: Morelia test Can we test if a link has to be removed? A B A B Morelia Test Morelia Test

38 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 38 Keep long links! Morelia test 1. As in the Gabriel test, nodes A, B form a circle with diameter AB. 2. Nodes A and B compute their neighborhood at distance If the neighborhood of A or B has links crossing AB then the link AB must be deleted, else the link is presetved Look at the two previous examples: in left example the morelia test has no effect! in the right example it keeps the long link!

39 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 39 Tricks of the Trade: Eliminating Nodes at Close distance Nodes have distinct identities, e.g., their coordinates would suffice. 1. Each node broadcasts its id 2. Each node selects the max id selected among its own and the ones it received and calls it its center. For each node u let c(u) be its center. Let C be the set of center nodes. 3. Center nodes C selected in 2 broadcast their id. Center nodes elect the max node received as leaders. Let L(c) be the leader associated to c C. With the election process nodes that are too close to each other drop out! Now apply Face-Routing to leaders. Original nodes route by forwarding their data to their leaders.

40 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 40 Stations with Different Powers Typically, stations in a wireless network will have different powers. For simplicity, lets assume we have two radii: r < R: One type of stations can reach up to a radius r and the other up to a radius R. How do apply face-routing in a wireless network with two radii? How do we form the planar geometric graph?

41 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 41 The Menace of Non-planarity A A B B A and B, two powerful mobiles, may not be aware of the presence of two weak mobiles A and B. They do not know there is a crossing!

42 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 42 Algorithm for Forming a Planar Graph 1. Form a planar subsgraph by applying the Gabriel (or Morelia) test to the nodes assuming the reachability radius is equal to r. 2. Inform the nodes concerned of the connected component they belong to by using a broadcast algorithm. 3. Form a planar subsgraph by applying the Gabriel (or Morelia) test to the nodes having reachability R. Connect the connected components. 4. The resulting graph may not be planar because there might be crossings between long and short links. Apply a mixed radius test to form a planar subgraph as follows (a) If there is a crossing of a long link with a short link which you must keep in order to maintain connectivity, replace long link with a virtual link.

43 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 43 Formation of the Connected Components Here nodes are connected using only the small radius r and then the planar subgraph is formed using the Gabriel or Morelia test. It may well be disconnected!

44 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 44 Using the powerful Stations Here nodes are connected using only the bigger radius R and then the planar subgraph is formed for the thick links using the Gabriel or Morelia test. Then we eliminate thick links within a component.

45 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 45 Creating Planarity: Essential Links with Crossings Essential Edge The resulting graph is not planar! The bottom two connected components are connected with an essential link with a crossing: If we remove it the network is disconnected! If we leave it the network is not planar!

46 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 46 Bingo: Virtual Links Eliminate Crossings! The only way to connect C and D is via the long link AB. A B C D C and D keep in their routing tables the route: C virual D := C A, A B, B D D virual C := D B, B A, A C. The thick link is eliminated, the dashed link is created and... bingo the graph remains planar and connected! Now we can use face routing!

47 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 47 Conclusions You can always find a route in a planar network By using GPS And you need little memory Sometimes you can create planarity: By applying link removal tests By creating virtual links By increasing power Very important to look at tradeoffs! Can you do the same thing in 3-dimensional space?

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Routing and Traversal via Location Awareness in Ad-Hoc Networks

Routing and Traversal via Location Awareness in Ad-Hoc Networks Routing and Traversal via Location Awareness in Ad-Hoc Networks Evangelos Kranakis Ladislav Stacho August 14, 2004 Abstract We survey some recent results that make use of location awareness of the hosts

More information

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was

More information

Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

Routing on Overlay Graphs in Mobile Ad Hoc Networks

Routing on Overlay Graphs in Mobile Ad Hoc Networks Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming

More information

A Review on 3-Dimention in Wireless Networks

A Review on 3-Dimention in Wireless Networks A Review on 3-Dimention in Wireless Networks Eiman Alotaibi Department of Computer Science University of California, Davis Introduction 7/31/2009 2 Introduction 7/31/2009 3 Introduction 7/31/2009 4 Introduction

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

(Refer Slide Time: 06:01)

(Refer Slide Time: 06:01) Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 28 Applications of DFS Today we are going to be talking about

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

ADHOC SYSTEMSS ABSTRACT. the system. The diagnosis strategy. is an initiator of. can in the hierarchy. paper include. this. than.

ADHOC SYSTEMSS ABSTRACT. the system. The diagnosis strategy. is an initiator of. can in the hierarchy. paper include. this. than. Journal of Theoretical and Applied Information Technology 2005-2007 JATIT. All rights reserved. www.jatit.org A HIERARCHICAL APPROACH TO FAULT DIAGNOSIS IN LARGE S CALE SELF-DIAGNOSABLE WIRELESS ADHOC

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department Mobile Advanced Networks Position-based routing geometric, geographic, location-based Navid Nikaein Mobile Communication Department Navid Nikaein 2010 1 Reminder In topology-based routing, each node has

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

Introduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.

Introduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Introduction The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block Diagram Intro-1

More information

Simple Graph. General Graph

Simple Graph. General Graph Graph Theory A graph is a collection of points (also called vertices) and lines (also called edges), with each edge ending at a vertex In general, it is allowed for more than one edge to have the same

More information

Geometric Routing: Of Theory and Practice

Geometric Routing: Of Theory and Practice Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and

More information

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions Yu Wang Dept. of Computer Science Illinois Institute of Technology Chicago, USA wangyu1@iit.edu Ivan Stojmenovic

More information

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic

More information

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks Atekeh Maghsoudlou, Marc St-Hilaire, and Thomas Kunz Department of Systems and Computer Engineering Carleton University, Ottawa, ON,

More information

ME 111: Engineering Drawing. Geometric Constructions

ME 111: Engineering Drawing. Geometric Constructions ME 111: Engineering Drawing Lecture 2 01-08-2011 Geometric Constructions Indian Institute of Technology Guwahati Guwahati 781039 Geometric Construction Construction of primitive geometric forms (points,

More information

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

Internal node and shortcut based routing with guaranteed delivery in wireless networks

Internal node and shortcut based routing with guaranteed delivery in wireless networks Internal node and shortcut based routing with guaranteed delivery in wireless networks Susanta Datta 1, Ivan Stojmenovic 1,2 and Jie Wu 3 1 SITE, University of Ottawa, Ottawa, Ontario K1N 6N5, Canada ivan@site.uottawa.ca

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Module 2: NETWORKS AND DECISION MATHEMATICS

Module 2: NETWORKS AND DECISION MATHEMATICS Further Mathematics 2017 Module 2: NETWORKS AND DECISION MATHEMATICS Chapter 9 Undirected Graphs and Networks Key knowledge the conventions, terminology, properties and types of graphs; edge, face, loop,

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Further Mathematics 2016 Module 2: NETWORKS AND DECISION MATHEMATICS Chapter 9 Undirected Graphs and Networks

Further Mathematics 2016 Module 2: NETWORKS AND DECISION MATHEMATICS Chapter 9 Undirected Graphs and Networks Further Mathematics 2016 Module 2: NETWORKS AND DECISION MATHEMATICS Chapter 9 Undirected Graphs and Networks Key knowledge the conventions, terminology, properties and types of graphs; edge, face, loop,

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Strong Edge Coloring for Channel Assignment in Wireless Radio Networks

Strong Edge Coloring for Channel Assignment in Wireless Radio Networks IEEE Workshop on Foundations and Algorithms for Wireless Networking (FAWN 2006) Strong Edge Coloring for Channel Assignment in Wireless Radio Networks Christopher L. Barrett Gabriel Istrate V. S. Anil

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS. A Thesis. Presented to. the Faculty of California Polytechnic State University

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS. A Thesis. Presented to. the Faculty of California Polytechnic State University HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS A Thesis Presented to the Faculty of California Polytechnic State University San Luis Obispo In Partial Fulfillment of the Requirements for the

More information

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

Routing. Geo-Routing. Thanks to Stefan Schmid for slides Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

Geometric Spanners for Routing in Mobile Networks

Geometric Spanners for Routing in Mobile Networks 1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile

More information

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Michiel Smid October 14, 2003 1 Introduction In these notes, we introduce a powerful technique for solving geometric problems.

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Topology Control in Wireless Networks 4/24/06

Topology Control in Wireless Networks 4/24/06 Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing Message Passing From Shared Memory to Message Passing but pass messages along networks: classic social networks Stefan Schmid T-Labs & TU Berlin Some parts of the lecture (e.g., Skript and exercises) are

More information

Rumor Routing Algorithm

Rumor Routing Algorithm Aleksi.Ahtiainen@hut.fi T-79.194 Seminar on Theoretical Computer Science Feb 9 2005 Contents Introduction The Algorithm Research Results Future Work Criticism Conclusions Introduction is described in paper:

More information

Testing Bipartiteness of Geometric Intersection Graphs David Eppstein

Testing Bipartiteness of Geometric Intersection Graphs David Eppstein Testing Bipartiteness of Geometric Intersection Graphs David Eppstein Univ. of California, Irvine School of Information and Computer Science Intersection Graphs Given arrangement of geometric objects,

More information

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer

More information

1 Matchings in Graphs

1 Matchings in Graphs Matchings in Graphs J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 Definition Two edges are called independent if they are not adjacent

More information

The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

More information

Definition: A graph G = (V, E) is called a tree if G is connected and acyclic. The following theorem captures many important facts about trees.

Definition: A graph G = (V, E) is called a tree if G is connected and acyclic. The following theorem captures many important facts about trees. Tree 1. Trees and their Properties. Spanning trees 3. Minimum Spanning Trees 4. Applications of Minimum Spanning Trees 5. Minimum Spanning Tree Algorithms 1.1 Properties of Trees: Definition: A graph G

More information

Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing

Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing Yujun Li, Yaling Yang, and Xianliang Lu School of Computer Science and Engineering, University of Electronic Science and Technology

More information

Networking Sensors, II

Networking Sensors, II Networking Sensors, II Sensing Networking Leonidas Guibas Stanford University Computation CS321 ZG Book, Ch. 3 1 Class Administration Paper presentation preferences due today, by class time Project info

More information

CALCULATION OF INFERENCE IN AD-HOC NETWORK

CALCULATION OF INFERENCE IN AD-HOC NETWORK CALCULATION OF INFERENCE IN AD-HOC NETWORK POOJA GROVER, 2 NEHA GUPTA, 3 RANJIT KUMAR Asst. Prof., Department of Computer Science & Engineering, MDU, Rohtak, India-3300 2 Lecturer, Department of Information

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.

More information

September 23,

September 23, 1. In many ruler and compass constructions it is important to know that the perpendicular bisector of a secant to a circle is a diameter of that circle. In particular, as a limiting case, this obtains

More information

Localization of Sensor Networks Using Sweeps

Localization of Sensor Networks Using Sweeps Localization of Sensor Networks Using Sweeps J. Fang Dept. of Electrical Engineering Yale University jia.fang@yale.edu M. Cao Dept. of Electrical Engineering Yale University m.cao@yale.edu A. S. Morse

More information

Theory and Practice of Geographic Routing

Theory and Practice of Geographic Routing Theory and Practice of Geographic Routing Stefan Rührup Department of Computer Science University of Freiburg, Germany February 2009 Abstract Geographic routing algorithms use position information for

More information

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing 309 Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing Sinchan Roychowdhury Instrumentation Control Engineering Calcutta Institute of Engineering & Management Kolkata, India

More information

Survey on Position-Based Routing 1

Survey on Position-Based Routing 1 Survey on Position-Based Routing 1 Filipe Araújo and Luís Rodrigues Universidade de Lisboa {filipius,ler}@di.fc.ul.pt Abstract In this paper we review position-based routing for wireless ad hoc and for

More information

INTRODUCTION TO GRAPH THEORY. 1. Definitions

INTRODUCTION TO GRAPH THEORY. 1. Definitions INTRODUCTION TO GRAPH THEORY D. JAKOBSON 1. Definitions A graph G consists of vertices {v 1, v 2,..., v n } and edges {e 1, e 2,..., e m } connecting pairs of vertices. An edge e = (uv) is incident with

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Dezhen Song CS Department, Texas A&M University Technical Report: TR 2005-2-2 Email: dzsong@cs.tamu.edu

More information

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined

More information

Asymptotically Optimal Geometric Mobile Ad-Hoc Routing

Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Fabian Kuhn Department of Computer Science ETH Zurich 8092 Zurich, Switzerland kuhn@inf.ethz.ch Roger Wattenhofer Department of Computer Science ETH

More information

Simultaneous Diagonal Flips in Plane Triangulations

Simultaneous Diagonal Flips in Plane Triangulations @ _ d j 5 6 5 6 Simultaneous Diagonal Flips in Plane Triangulations Prosenjit Bose Jurek Czyzowicz Zhicheng Gao Pat Morin David R. Wood Abstract Simultaneous diagonal flips in plane triangulations are

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

Math 443/543 Graph Theory Notes 5: Planar graphs and coloring

Math 443/543 Graph Theory Notes 5: Planar graphs and coloring Math 443/543 Graph Theory Notes 5: Planar graphs and coloring David Glickenstein October 10, 2014 1 Planar graphs The Three Houses and Three Utilities Problem: Given three houses and three utilities, can

More information

CS6702 GRAPH THEORY AND APPLICATIONS 2 MARKS QUESTIONS AND ANSWERS

CS6702 GRAPH THEORY AND APPLICATIONS 2 MARKS QUESTIONS AND ANSWERS CS6702 GRAPH THEORY AND APPLICATIONS 2 MARKS QUESTIONS AND ANSWERS 1 UNIT I INTRODUCTION CS6702 GRAPH THEORY AND APPLICATIONS 2 MARKS QUESTIONS AND ANSWERS 1. Define Graph. A graph G = (V, E) consists

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

Regional Gossip Routing for Wireless Ad Hoc Networks

Regional Gossip Routing for Wireless Ad Hoc Networks Mobile Networks and Applications 10, 61 77, 2005 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Regional Gossip Routing for Wireless Ad Hoc Networks XIANG-YANG LI, KOUSHA

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn

More information

A graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial.

A graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial. 2301-670 Graph theory 1.1 What is a graph? 1 st semester 2550 1 1.1. What is a graph? 1.1.2. Definition. A graph G is a triple (V(G), E(G), ψ G ) consisting of V(G) of vertices, a set E(G), disjoint from

More information

Construction Instructions. Construct the perpendicular bisector of a line segment. Or, construct the midpoint of a line segment.

Construction Instructions. Construct the perpendicular bisector of a line segment. Or, construct the midpoint of a line segment. Construction Instructions Construct the perpendicular bisector of a line segment. Or, construct the midpoint of a line segment. 1.) Begin with line segment XY. 2.) Place the compass at point X. Adjust

More information

COP 4531 Complexity & Analysis of Data Structures & Algorithms

COP 4531 Complexity & Analysis of Data Structures & Algorithms COP Complexity & Analysis of Data Structures & Algorithms Overview of Graphs Breadth irst Search, and Depth irst Search hanks to several people who contributed to these slides including Piyush Kumar and

More information

Networks. 1 Introduction

Networks. 1 Introduction Bluetrees-Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks Gergely V. ZBruba, Stefan0 Basagni, and Imrich Chlamtac Center for Advanced Telecommunications Systems and Services (CATSS) Erik

More information

Distributed Computing over Communication Networks: Leader Election

Distributed Computing over Communication Networks: Leader Election Distributed Computing over Communication Networks: Leader Election Motivation Reasons for electing a leader? Reasons for not electing a leader? Motivation Reasons for electing a leader? Once elected, coordination

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

MATH20902: Discrete Maths, Solutions to Problem Set 1. These solutions, as well as the corresponding problems, are available at

MATH20902: Discrete Maths, Solutions to Problem Set 1. These solutions, as well as the corresponding problems, are available at MATH20902: Discrete Maths, Solutions to Problem Set 1 These solutions, as well as the corresponding problems, are available at https://bit.ly/mancmathsdiscrete.. (1). The upper panel in the figure below

More information

Efficient and Robust Geocasting Protocols for Sensor Networks

Efficient and Robust Geocasting Protocols for Sensor Networks Efficient and Robust Geocasting Protocols for Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Abstract- Geocasting is

More information

Compact and Low Delay Routing Labeling Scheme for Unit Disk. Graphs

Compact and Low Delay Routing Labeling Scheme for Unit Disk. Graphs Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang and Feodor F. Dragan Algorithmic Research Laboratory, Department of Computer Science Kent State University, Kent,

More information

What is a minimal spanning tree (MST) and how to find one

What is a minimal spanning tree (MST) and how to find one What is a minimal spanning tree (MST) and how to find one A tree contains a root, the top node. Each node has: One parent Any number of children A spanning tree of a graph is a subgraph that contains all

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

Future-Generation Wireless Networks: Beyond 3G and 4G.

Future-Generation Wireless Networks: Beyond 3G and 4G. Future-Generation Wireless Networks: Beyond 3G and 4G. Kumar Adumulla 29 March 2006 Networks 1 Outline Introduction Wireless Networking Generations Issues in 3G What is 4G Beyond 3G & 4G Conclusion References

More information

Problem Set 1. Solution. CS4234: Optimization Algorithms. Solution Sketches

Problem Set 1. Solution. CS4234: Optimization Algorithms. Solution Sketches CS4234: Optimization Algorithms Sketches Problem Set 1 S-1. You are given a graph G = (V, E) with n nodes and m edges. (Perhaps the graph represents a telephone network.) Each edge is colored either blue

More information

Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs

Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs Aravind Ranganathan University of Cincinnati February 22, 2007 Motivation Routing in wireless

More information

Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices

Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices Wireless Networks 10, 197 213, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices

More information

Ray shooting from convex ranges

Ray shooting from convex ranges Discrete Applied Mathematics 108 (2001) 259 267 Ray shooting from convex ranges Evangelos Kranakis a, Danny Krizanc b, Anil Maheshwari a;, Jorg-Rudiger Sack a, Jorge Urrutia c a School of Computer Science,

More information

Centralities (4) Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California Excellence Through Knowledge

Centralities (4) Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California Excellence Through Knowledge Centralities (4) Ralucca Gera, Applied Mathematics Dept. Naval Postgraduate School Monterey, California rgera@nps.edu Excellence Through Knowledge Different types of centralities: Betweenness Centrality

More information

THE rapid adoption of the Internet and mobile wireless

THE rapid adoption of the Internet and mobile wireless 350 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 4, APRIL 2004 Partial Delaunay Triangulation and Degree Limited Localized Bluetooth Scatternet Formation Xiang-Yang Li, Member, IEEE,

More information

Localized Topology Control for Heterogeneous Wireless Sensor Networks

Localized Topology Control for Heterogeneous Wireless Sensor Networks Localized Topology Control for Heterogeneous Wireless Sensor Networks Xiang-Yang Li Wen-Zhan Song Yu Wang 2 The paper studies topology control in heterogeneous wireless sensor networks, where different

More information

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL 63 CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL 4.1 INTRODUCTION This chapter explains the impact of the blackhole, rushing, sybil and wormhole active attacks, in the route discovery

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Monash University Department of Electrical and Computer Systems Engineering Wireless and Mobile Networks Present and Future Y. Ahmet Şekercioğlu August 2007wireless-nets.tex,v1.5 Y. Ahmet Şekercioğlu:

More information

This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane?

This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane? Intersecting Circles This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane? This is a problem that a programmer might have to solve, for example,

More information

Undirected Network Summary

Undirected Network Summary Undirected Network Summary Notice that the network above has multiple edges joining nodes a to d and the network has a loop at node d. Also c is called an isolated node as it is not connected to any other

More information