We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?
|
|
- Mark Garrison
- 5 years ago
- Views:
Transcription
1 Geographical routing in practice We noticed that the trouble is due to face routing. Is greedy routing robust to localization noise? Can we ignore the real coordinates and use virtual coordinates for routing? 1
2 Approach I: Rubber band representation 2
3 Rubber band drawing of a graph All edges are rubber bands. Nail down some nodes S in the plane, let the graph go. Theorem: the algorithm converges to a unique state rubber band representation extending S. Peterson graph with one pentagon nailed down. 3
4 Rubber band drawing of a graph The rubber band algorithm minimizes the total energy: Claim: E(x) is convex. When any x i goes to infinity, E(x) goes to infinity. So we have a unique global minimum. Peterson graph with one pentagon nailed down. 4
5 Rubber band drawing of a graph How does the rubber band representation look like? E(x)/ x i =0. neighbors The rubber band connecting i and j pulls i with force x j - x i. The total force acting on x i is 0. The graph is at equilibrium. Peterson graph with one pentagon nailed down. 5
6 Rubber band drawing of a graph 1. Every free node is at the center of gravity of its neighbors. 2. no reflex vertices. Peterson graph with one pentagon nailed down. 6
7 More examples 7
8 Rubber band algorithm Recall the mass-spring model. First we assume nodes on the boundary know their location. Fix the nodes on the outer boundary. Iterative algorithm: Every node moves to the center of gravity of its neighbors. Until no node moves more than distance δ. 8
9 A network with 3200 nodes Greedy routing success rate: 0.989, avg path length
10 Perimeter nodes are known (10 iterations) 10
11 Perimeter nodes are known (100 iterations) 11
12 Perimeter nodes are known (1000 iterations) Greedy routing success rate: 0.993, avg path length
13 Resiliency of the rubber band approach Greedy routing success rate: 0.981, avg path length
14 Resiliency of the rubber band approach Greedy routing success rate: 0.99, avg path length
15 How to fix perimeter nodes? Need nodes on the perimeter to stretch out the net. First assume we know nodes on the perimeter, but not the locations. 1. Each perimeter sends hello messages. 2. All the nodes record hop counts to each perimeter node. 3. The hop count between every pair of perimeter node is broadcast to all perimeter nodes. (quite expensive) 4. Embed perimeter nodes in the plane, say by any localization algorithm. 15
16 Perimeter nodes 1. The embedding only gives relative positions: include 2 bootstrapping beacons in the embedding of perimeters. Use the center of gravity as origin. 1 st bootstrap node defines the positive x-axis. 2 nd bootstrap node defines the positive y-axis. 2. Non-perimeter nodes actually have the distances to all perimeter nodes, and embed themselves. Gives good initial positions for the rubber band algorithm. 16
17 How to find perimeter nodes? The bootstrapping nodes send hello messages to everyone. The node which is the farthest among all its 2-hop neighbors will identify itself as a perimeter node. 17
18 Success rate of greedy routing Success rate on virtual coordinates is comparable with true coordinates, when the sensors are dense and uniform. 18
19 Weird Shapes 19
20 Obstacles Success rate on virtual coordinates degrades when there are a lot of obstacles, but better than true coordinates. 20
21 Conclusions Geographical forwarding is quite robust to localization errors, or reasonable virtual coordinates. Geographical forwarding can easily scale to tens of thousands of nodes with acceptable overhead. For dense uniform sensor layout, we can eliminate the need for face routing altogether. Rubber band virtual coordinates respect the connectivity better than the true coordinates. 21
22 Next Rubber band approach is kind of ad-hoc. Next: In-depth study of routing around holes. Greedy embedding? 22
23 Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 23
24 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there is a neighbor of s closer to t than s itself. t s 24
25 Questions to ask We want to find a virtual coordinates such that greedy routing always works. Does there exist such a greedy embedding in R 2? in R 3? in Euclidean metric? Hyperbolic space? If it exists, how to compute? 25
26 Greedy embedding does not always exist K 1,6 does not have a greedy embedding in R 2 26
27 A lemma Lemma: each node t must have an edge to its closest (in terms of Euclidean distance) node u. Otherwise, u has no neighbor that is closer to t than itself. 27
28 Proof K 1,6 does not have a greedy embedding in R 2 Proof: 1. One of the angles is less than π/3. 2. One of ab 2 and ab 3, say, ab 2, is longer than b 2 b Then b 2 does not have edge with its closest point b 3. 28
29 A conjecture Corollary: K k, 5k+1 does not have a greedy embedding in R 2. Conjecture: Any planar 3-connected graph has a greedy embedding R 2. Hint: this is tight. K 2,11 is planar but not 3-connected. K 3.16 is 3-connected but not planar. (it has K 3.3 minor). Planar 3-connected graph has a greedy embedding in R 3 29
30 Polyhedral routing Theorem: Any 3-connected planar graph has a greedy embedding e in R 3, where the distance function is defined as d(u, v) = - e(u) e(v). Proof: 1. Any 3-connected planar graph is the edge graph of a 3D convex polytope, with edges tangent to a sphere. [Steinitz 1922]. 2. Each vertex has a supporting hyperplane with the normal being the 3D coordinate of the vertex. 30
31 Polyhedral routing Proof: For any s, t, there is a neighbor v of s, d(v,t)<d(s,t). 1. d(s,t)-d(v,t)=[e(v)-e(s)] e(t)>0. 2. Now suppose such neighbor v does not exist, then s is a reflex vertex, with all the neighbors pointing away from t. v 3. This contradicts with the convexity of the polytope. t s 31
32 Discussions Papadimitriou s conjecture: Any planar 3-connected graph has a greedy embedding R 2. has been proved! The theorem only gives a sufficient condition, not necessary. K 3.3 has a greedy embedding. A graph with a Hamiltonian cycle has a greedy embedding on a line. Given a graph, can we tell whether it has a greedy embedding in R 2? Is this problem hard? (Recall that many such embedding problems are hard ) More understanding of greedy embedding in R 2, R 3 32
33 Follow-up work Dhandapani proved that any triangulation admits a greedy embedding (SODA 08). Leighton and Moitra proved the conjecture (FOCS 08). Independently, Angelini et al. also proved it (Graph Drawing 08). Goodrich and D. Strash improved the coordinates to be of size O(log n) (under submission). We briefly introduce the main idea. 33
34 Leighton and Moitra All 3-connected planar graph contain a spanning Christmas Cactus graph. All Christmas Cactus graphs admit a greedy embedding in the plane. 34
35 Leighton and Moitra A cactus graph is connected, each edge is in at most one simple cycle. A Christmas Cactus graph is a cactus graph for which the removal of any node disconnects into at most 2 pieces. 35
36 A Christmas Cactus 36
37 Example 37
38 Connection to graph labeling Given a graph, find a labeling of the nodes such that one can compute the (approximate) shortest path distance between any two vertices from their labels only. Tradeoff between approximation ratio and the label size. For shortest path distance, the maximum label size is Θ(n) for general graph, O(n 1/2 ) (Ω(n 1/3 )) for planar graphs, and Θ(log 2 n) for trees. General graph: a scheme with label size O(kn 1/k ) and approximation ratio 2k-1. Google distance labeling for the literature. 38
39 Approach II: Embed a spanning tree in polar coordinate system 39
40 Embed a tree in polar coordinate system Start from any node as root, flood to find the shortest path tree. Assign polar ranges to each node in the tree. The range of a node is divided among its children. The size of the range is proportional to the size of its subtree. Order the subtrees that align with the sensor connectivity. 40
41 Embed a tree in polar coordinate system Order the subtrees that align with the sensor connectivity. Three reference nodes flood the network. Each node knows the hop count to each reference. Each node embed itself with respect to the references. (trilateration with hop counts) A node s position is defined as the center of mass of all the nodes in its subtree. This will provide an angular ordering of all the children. 41
42 Routing on a tree Route to the common ancestor of the source and destination. Check whether the destination range is included in the range of the current node. If not, go to the parent. Otherwise go to the corresponding child. Root is the bottleneck. Path may be long. 42
43 Routing on a tree Be a little smarter: store a local routing table that keeps the ranges of up to k-hop neighbors. find shortcuts. Virtual Polar Coordinate Routing: check the neighborhood, find the node that is closer to the destination. greedy forwarding in polar coordinates. If the upper/lower bound is closer to the destination. 43
44 Load balancing Root is still the bottleneck even for smart routing. Shortest path routing, still not the most load balanced routing 44
45 Routing on spanning trees in theory and in practice For any graph G there is a spanning tree T, s.t. the average stretch of the shortest paths on T, compared with G, is O((lognloglogn) 2 ). 45
46 General framework Find a substructure such that we can define virtual coordinates. The virtual coordinates guarantee delivery. Greedy routing in the connectivity graph. 46
47 Virtual ring routing Some slides from 47
48 VRR: the virtual ring topology-independent node identifiers, e.g., MAC address 910 8F6 90E 8F0 8E2 FFF 0 each node maintains a virtual neighbor set (vset) nodes organized into virtual ring by increasing identifier value 48
49 VRR: routing paths 8F6 8F6 physical network topology nodes only maintain paths to virtual neighbors: vset-paths are typically multi-hop vset-paths are maintained proactively 49
50 VRR: forwarding table 14A endpointa endpointb nexta nextb pathid 8F6 90E ME F F6 10E ME 10 14A 140 F42 10E 2 8F6 F42 ME F42 FF forwarding table for node 8F6 F42 8F6 10E vset-paths recorded in forwarding tables along path forwarding table contains 140 vset-paths between node and vset members vset-paths between other nodes that go through node paths to physical neighbors 50
51 VRR: forwarding forward message destined to x by picking endpoint e numerically closest to x forwarding message to next hop towards e deliver message to node with id closest to x how does this work? can find x because nodes are connected in a ring low stretch because of additional forwarding state many alternate paths to route around failures 51
52 VRR: example routing physical network Topology 52
53 VRR: example routing there may be some stretch physical network Topology 53
54 Node joining broadcast hellos to find physical neighbors send setup request to 16E (itself) through proxy (19A) A 8F6 Network Topology 16E 54
55 Node joining 16E sends setup requests to nodes in received vset 164 sends setup to 16E with its vset 16E adds node to vset when it receives setup A 8F6 171 Network Topology 16E 55
56 Size of routing table Assume the nodes are randomly placed, each vpath 56
57 Simulation experiments in ns-2 ran experiments with b MAC varied network size, mobility, session lifetime compared with DSDV, DSR, and AODV VRR performed well in all experiments high delivery ratios even with fast movement significantly lower delays with route instability 57
58 Delivery ratio: fast movement Delivery ra atio DSDV DSR AODV VRR Number of nodes 58
59 Delay: fast movement Delay (sec conds) DSDV DSR AODV VRR Number of nodes 59
60 Sensor network sensor network testbed 67 mica2dot motes in UCB building comparison with BVR delivery ratio with mote failures 60
61 Sensor network: mote failures Number of nodes Number of nodes VRR delivery ratio BVR delivery ratio Time (mins) Percentage of pac ckets delivered 61
62 Wireless office testbed 30 machines running windows communicate using a throughput comparison with LQSR using ttcp 62
63 Wireless office testbed: throughput Bandwidth (Mbps) MR-LQSR VRR Machine 63
64 Why a virtual ring? Alternatively, use an Euler tour to define coordinates on the sensor nodes. An Euler tour is a cycle that visits every vertex. Can be constructed by a depth-first tour on a spanning tree. Also use shortcuts for greedy routing. 64
Given a graph, find an embedding s.t. greedy routing works
Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there
More informationGeographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic
More informationGreedy Routing in Wireless Networks. Jie Gao Stony Brook University
Greedy Routing in Wireless Networks Jie Gao Stony Brook University A generic sensor node CPU. On-board flash memory or external memory Sensors: thermometer, camera, motion, light sensor, etc. Wireless
More informationRouting in Sensor Networks
Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing
More informationGeometry in Wireless Sensor Networks
How cancomputational Geometry help Mobile Networks: Geometry in Wireless Sensor Networks Jie Gao Stony Brook University CG Week 2012 Algorithms in the Field Workshop 2013/6/21 1 A generic sensor node CPU.
More informationSimulations of the quadrilateral-based localization
Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution
More informationFractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University
Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,
More informationGeographical routing 1
Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes
More informationarxiv: v1 [cs.ni] 28 Apr 2015
Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland
More informationGreedy Routing with Guaranteed Delivery Using Ricci Flow
Greedy Routing with Guaranteed Delivery Using Ricci Flow Jie Gao Stony Brook University Joint work with Rik Sarkar, Xiaotian Yin, Wei Zeng, Feng Luo, Xianfeng David Gu Greedy Routing Assign coordinatesto
More informationJie Gao Computer Science Department Stony Brook University
Localization of Sensor Networks II Jie Gao Computer Science Department Stony Brook University 1 Rigidity theory Given a set of rigid bars connected by hinges, rigidity theory studies whether you can move
More informationMa/CS 6b Class 26: Art Galleries and Politicians
Ma/CS 6b Class 26: Art Galleries and Politicians By Adam Sheffer The Art Gallery Problem Problem. We wish to place security cameras at a gallery, such that they cover it completely. Every camera can cover
More informationLandmark-based routing
Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004. Using
More informationA Solution to the Papadimitriou-Ratajczak Conjecture. Ankur Moitra
A Solution to the Papadimitriou-Ratajczak Conjecture by Ankur Moitra Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree
More information[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations
Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer
More informationSome Results on Greedy Embeddings in Metric Spaces
Some Results on Greedy Embeddings in Metric Spaces Tom Leighton Massachusetts Institute of Technology Math Department and CSAIL Cambridge, MA 02139 ftl@math.mit.edu Ankur Moitra Massachusetts Institute
More informationFixed-Parameter Algorithms, IA166
Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer
More informationGeographic Routing in Simulation: GPSR
Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops
More informationMap: Medial axis based geometric routing in sensor networks
DOI.7/s11276-6-9857-z Map: Medial axis based geometric routing in sensor networks Jehoshua Bruck Jie Gao Anxiao (Andrew) Jiang Published online: 23 October 6 C Science + Business Media, LLC 6 Abstract
More informationNavigating in a graph by aid of its spanning tree
Navigating in a graph by aid of its spanning tree Feodor Dragan Kent State University, USA. Martín Matamala Universidad de Chile, Chile. Navigating in a graph Rules to advance in a graph from a given vertex
More informationOn Greedy Geographic Routing Algorithms in Sensing-Covered Networks
On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,
More informationTutte s Theorem: How to draw a graph
Spectral Graph Theory Lecture 15 Tutte s Theorem: How to draw a graph Daniel A. Spielman October 22, 2018 15.1 Overview We prove Tutte s theorem [Tut63], which shows how to use spring embeddings to obtain
More informationMa/CS 6b Class 11: Kuratowski and Coloring
Ma/CS 6b Class 11: Kuratowski and Coloring By Adam Sheffer Kuratowski's Theorem Theorem. A graph is planar if and only if it does not have K 5 and K 3,3 as topological minors. We know that if a graph contains
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationTopology Control in Wireless Networks 4/24/06
Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:
More informationChallenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast
More informationRouting v.s. Spanners
Routing v.s. Spanners Spanner et routage compact : similarités et différences Cyril Gavoille Université de Bordeaux AlgoTel 09 - Carry-Le-Rouet June 16-19, 2009 Outline Spanners Routing The Question and
More informationApproximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006
Approximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006 Outline Reducing the constant from O ( ɛ d) to O ( ɛ (d 1)/2) in uery time Need to know ɛ ahead of time Preprocessing time and
More informationRubber bands. Chapter Rubber band representation
Chapter 1 Rubber bands In the previous chapter, we already used the idea of looking at the graph geometrically, by placing its nodes on the line and replacing the edges by rubber bands. Since, however,
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationPlanar Graphs. 1 Graphs and maps. 1.1 Planarity and duality
Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter
More information274 Curves on Surfaces, Lecture 5
274 Curves on Surfaces, Lecture 5 Dylan Thurston Notes by Qiaochu Yuan Fall 2012 5 Ideal polygons Previously we discussed three models of the hyperbolic plane: the Poincaré disk, the upper half-plane,
More informationNetworks: A Deterministic Approach with Constant Overhead
Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette
More informationGeo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer
Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance
More informationGeometric Spanners for Routing in Mobile Networks
1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile
More informationLecture 8: The Traveling Salesman Problem
Lecture 8: The Traveling Salesman Problem Let G = (V, E) be an undirected graph. A Hamiltonian cycle of G is a cycle that visits every vertex v V exactly once. Instead of Hamiltonian cycle, we sometimes
More informationRandomized incremental construction. Trapezoidal decomposition: Special sampling idea: Sample all except one item
Randomized incremental construction Special sampling idea: Sample all except one item hope final addition makes small or no change Method: process items in order average case analysis randomize order to
More informationBroadcast: Befo re 1
Broadcast: Before 1 After 2 Spanning Tree ffl assume fixed spanning tree ffl asynchronous model 3 Processor State parent terminated children 4 Broadcast: Step One parent terminated children 5 Broadcast:Step
More informationTo enhance Routing in ZigBee Wireless Networks
To enhance Routing in ZigBee Wireless Networks P.Chanthiya Assistant Professor Department of Computer Science & Engineering, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, India Abstract The
More informationGEM: Graph EMbedding for Routing and Data-Centric Storage in Sensor Networks Without Geographic Information
GEM: Graph EMbedding for Routing and Data-Centric Storage in Sensor Networks Without Geographic Information James Newsome Dawn Song March 2003 CMU-CS-03-112 School of Computer Science Carnegie Mellon University
More informationAN AD HOC network consists of a collection of mobile
174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,
More informationNetworking Sensors, I
Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement
More informationGeographic and Diversity Routing in Mesh Networks
Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationIn what follows, we will focus on Voronoi diagrams in Euclidean space. Later, we will generalize to other distance spaces.
Voronoi Diagrams 4 A city builds a set of post offices, and now needs to determine which houses will be served by which office. It would be wasteful for a postman to go out of their way to make a delivery
More informationAdvanced routing topics. Tuomas Launiainen
Advanced routing topics Tuomas Launiainen Suboptimal routing Routing trees Measurement of routing trees Adaptive routing Problems Fault-tolerant tables Point-of-failure rerouting Point-of-failure shortest
More informationTrapezoidal decomposition:
Trapezoidal decomposition: Motivation: manipulate/analayze a collection of segments e.g. detect segment intersections e.g., point location data structure Definition. Draw verticals at all points binary
More informationAd hoc and Sensor Networks Chapter 10: Topology control
Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity
More informationRouting. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1
Routing Chapter 11 Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Application of the Week: Games / Art Uncountable possibilities, below, e.g., a beer coaster that can interact with other coasters [sentilla]
More informationScalable Routing for Networks of Dynamic Substrates. Boris Drazic
Scalable Routing for Networks of Dynamic Substrates by Boris Drazic A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department of Electrical
More informationDiversity Coloring for Distributed Storage in Mobile Networks
Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring
More informationCrossing bridges. Crossing bridges Great Ideas in Theoretical Computer Science. Lecture 12: Graphs I: The Basics. Königsberg (Prussia)
15-251 Great Ideas in Theoretical Computer Science Lecture 12: Graphs I: The Basics February 22nd, 2018 Crossing bridges Königsberg (Prussia) Now Kaliningrad (Russia) Is there a way to walk through the
More informationAnalysis of Algorithms
Analysis of Algorithms Concept Exam Code: 16 All questions are weighted equally. Assume worst case behavior and sufficiently large input sizes unless otherwise specified. Strong induction Consider this
More informationMidpoint Routing algorithms for Delaunay Triangulations
Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical
More informationSorting Based Data Centric Storage
Sorting Based Data Centric Storage Fenghui Zhang, Anxiao(Andrew) Jiang, and Jianer Chen Dept. of Computer Science, Texas A&M Univ. College Station, TX 77843. {fhzhang, ajiang, chen}@cs.tamu.edu. Abstract
More informationFace Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan
Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department
More informationLocalization of Sensor Networks II
Localization of Sensor Networks II Jie Gao Computer Science Department Stony Brook University 2/3/09 Jie Gao CSE595-spring09 1 Rigidity theory Given a set of rigid bars connected by hinges, rigidity theory
More informationLecture 11 Combinatorial Planning: In the Plane
CS 460/560 Introduction to Computational Robotics Fall 2017, Rutgers University Lecture 11 Combinatorial Planning: In the Plane Instructor: Jingjin Yu Outline Convex shapes, revisited Combinatorial planning
More informationMath 443/543 Graph Theory Notes 5: Planar graphs and coloring
Math 443/543 Graph Theory Notes 5: Planar graphs and coloring David Glickenstein October 10, 2014 1 Planar graphs The Three Houses and Three Utilities Problem: Given three houses and three utilities, can
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 2: Global properties of Euclidean Steiner Trees and GeoSteiner Marcus Brazil
More informationApproximate Algorithms for Touring a Sequence of Polygons
Approximate Algorithms for Touring a Sequence of Polygons Fajie Li 1 and Reinhard Klette 2 1 Institute for Mathematics and Computing Science, University of Groningen P.O. Box 800, 9700 AV Groningen, The
More informationRealizing Planar Graphs as Convex Polytopes. Günter Rote Freie Universität Berlin
Realizing Planar Graphs as Convex Polytopes Günter Rote Freie Universität Berlin General Problem Statement GIVEN: a combinatorial type of 3-dimensional polytope (a 3-connected planar graph) [ + additional
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationDifferential Geometry: Circle Packings. [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson]
Differential Geometry: Circle Packings [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson] Conformal Maps Recall: Given a domain Ω R 2, the map F:Ω R 2 is conformal if it
More informationData-Centric Query in Sensor Networks
Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed
More informationDelaunay Triangulation Overlays
HighPerf or mance Swi tchi ng and Routi ng Tele com Cent erw orksh op: Sept 4, 1 97. Delaunay Triangulation Overlays Jörg Liebeherr 2003 1 HyperCast Project HyperCast is a set of protocols for large-scale
More informationFall CS598CC: Approximation Algorithms. Chandra Chekuri
Fall 2006 CS598CC: Approximation Algorithms Chandra Chekuri Administrivia http://www.cs.uiuc.edu/homes/chekuri/teaching/fall2006/approx.htm Grading: 4 home works (60-70%), 1 take home final (30-40%) Mailing
More informationData Communication. Guaranteed Delivery Based on Memorization
Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy
More information3D Wireless Sensor Networks: Challenges and Solutions
3D Wireless Sensor Networks: Challenges and Solutions Hongyi Wu Old Dominion University Ph.D., CSE, UB, 2002 This work is partially supported by NSF CNS-1018306 and CNS-1320931. 2D PLANE, 3D VOLUME, AND
More informationSmart Routing with Learning-
Smart Routing with Learning- based QoS-aware Meta-strategies Ying Zhang Markus Fromherz Lukas Kuhn (Ludwig Maximilian University) October 2004 Outline Message-initiated Constraint-based Routing Learning-based
More informationChapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1
Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationOutline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility
Outline CS38 Introduction to Algorithms Lecture 18 May 29, 2014 coping with intractibility approximation algorithms set cover TSP center selection randomness in algorithms May 29, 2014 CS38 Lecture 18
More informationExploration of Path Space using Sensor Network Geometry
Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban Computer Science Stony Brook University {jiang,xban}@cs.sunysb.edu Mayank Goswami Applied Math & Statistics Stony Brook
More informationOn the Scalability of Hierarchical Ad Hoc Wireless Networks
On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical
More informationGeographical Quadtree Routing
Geographical Quadtree Routing Chen Avin, Yaniv Dvory, Ran Giladi Department of Communication Systems Engineering Ben Gurion University of the Negev Beer Sheva 84105, Israel Email: avin@cse.bgu.ac.il, dvory@bgu.ac.il,
More informationADHOC SYSTEMSS ABSTRACT. the system. The diagnosis strategy. is an initiator of. can in the hierarchy. paper include. this. than.
Journal of Theoretical and Applied Information Technology 2005-2007 JATIT. All rights reserved. www.jatit.org A HIERARCHICAL APPROACH TO FAULT DIAGNOSIS IN LARGE S CALE SELF-DIAGNOSABLE WIRELESS ADHOC
More informationAd Hoc Networks 9 (2011) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:
Ad Hoc Networks 9 (2) 34 354 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc : Geometric STAteless Routing for 3-D wireless sensor networks Min-Te
More informationAn efficient implementation of the greedy forwarding strategy
An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at
More informationIntegral Geometry and the Polynomial Hirsch Conjecture
Integral Geometry and the Polynomial Hirsch Conjecture Jonathan Kelner, MIT Partially based on joint work with Daniel Spielman Introduction n A lot of recent work on Polynomial Hirsch Conjecture has focused
More informationChapter 8. Voronoi Diagrams. 8.1 Post Oce Problem
Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest
More informationEfficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas
Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationCS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29
CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 29 CS 473: Algorithms, Spring 2018 Simplex and LP Duality Lecture 19 March 29, 2018
More informationReferences. Forwarding. Introduction...
References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor
More informationChapter 11 Chapter 6
Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor
More informationEnergy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013
Energy aware geographic routing in wireless sensor networks with anchor nodes Mircea Cretu Stancu Utrecht University Computing Science May 2013 Overview Introduction Current paradigm EAGR preliminaries
More informationROUTING is an important issue that affects wireless
1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,
More informationNetworking Sensors, II
Networking Sensors, II Sensing Networking Leonidas Guibas Stanford University Computation CS321 ZG Book, Ch. 3 1 Class Administration Paper presentation preferences due today, by class time Project info
More informationCollision Detection. Jane Li Assistant Professor Mechanical Engineering & Robotics Engineering
RBE 550 MOTION PLANNING BASED ON DR. DMITRY BERENSON S RBE 550 Collision Detection Jane Li Assistant Professor Mechanical Engineering & Robotics Engineering http://users.wpi.edu/~zli11 Euler Angle RBE
More informationEfficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas
Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract
More informationMany-to-Many Communications in HyperCast
Many-to-Many Communications in HyperCast Jorg Liebeherr University of Virginia Jörg Liebeherr, 2001 HyperCast Project HyperCast is a set of protocols for large-scale overlay multicasting and peer-to-peer
More informationLecture 4: Trees and Art Galleries
Math 7H: Honors Seminar Professor: Padraic Bartlett Lecture 4: Trees and Art Galleries Week 2 UCSB 2014 1 Prelude: Graph Theory In this talk, we re going to refer frequently to things called graphs and
More informationSTRAIGHT LINE ORTHOGONAL DRAWINGS OF COMPLETE TERNERY TREES SPUR FINAL PAPER, SUMMER July 29, 2015
STRIGHT LINE ORTHOGONL DRWINGS OF COMPLETE TERNERY TREES SPUR FINL PPER, SUMMER 2015 SR LI MENTOR: SYLVIN CRPENTIER PROJECT SUGGESTED Y LRRY GUTH July 29, 2015 bstract. In this paper we study embeddings
More informationarxiv: v2 [cs.dc] 28 Feb 2018
Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationMath 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem
Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem David Glickenstein November 26, 2008 1 Graph minors Let s revisit some de nitions. Let G = (V; E) be a graph. De nition 1 Removing
More information1 The Traveling Salesperson Problem (TSP)
CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation
More information