We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?

Size: px
Start display at page:

Download "We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?"

Transcription

1 Geographical routing in practice We noticed that the trouble is due to face routing. Is greedy routing robust to localization noise? Can we ignore the real coordinates and use virtual coordinates for routing? 1

2 Approach I: Rubber band representation 2

3 Rubber band drawing of a graph All edges are rubber bands. Nail down some nodes S in the plane, let the graph go. Theorem: the algorithm converges to a unique state rubber band representation extending S. Peterson graph with one pentagon nailed down. 3

4 Rubber band drawing of a graph The rubber band algorithm minimizes the total energy: Claim: E(x) is convex. When any x i goes to infinity, E(x) goes to infinity. So we have a unique global minimum. Peterson graph with one pentagon nailed down. 4

5 Rubber band drawing of a graph How does the rubber band representation look like? E(x)/ x i =0. neighbors The rubber band connecting i and j pulls i with force x j - x i. The total force acting on x i is 0. The graph is at equilibrium. Peterson graph with one pentagon nailed down. 5

6 Rubber band drawing of a graph 1. Every free node is at the center of gravity of its neighbors. 2. no reflex vertices. Peterson graph with one pentagon nailed down. 6

7 More examples 7

8 Rubber band algorithm Recall the mass-spring model. First we assume nodes on the boundary know their location. Fix the nodes on the outer boundary. Iterative algorithm: Every node moves to the center of gravity of its neighbors. Until no node moves more than distance δ. 8

9 A network with 3200 nodes Greedy routing success rate: 0.989, avg path length

10 Perimeter nodes are known (10 iterations) 10

11 Perimeter nodes are known (100 iterations) 11

12 Perimeter nodes are known (1000 iterations) Greedy routing success rate: 0.993, avg path length

13 Resiliency of the rubber band approach Greedy routing success rate: 0.981, avg path length

14 Resiliency of the rubber band approach Greedy routing success rate: 0.99, avg path length

15 How to fix perimeter nodes? Need nodes on the perimeter to stretch out the net. First assume we know nodes on the perimeter, but not the locations. 1. Each perimeter sends hello messages. 2. All the nodes record hop counts to each perimeter node. 3. The hop count between every pair of perimeter node is broadcast to all perimeter nodes. (quite expensive) 4. Embed perimeter nodes in the plane, say by any localization algorithm. 15

16 Perimeter nodes 1. The embedding only gives relative positions: include 2 bootstrapping beacons in the embedding of perimeters. Use the center of gravity as origin. 1 st bootstrap node defines the positive x-axis. 2 nd bootstrap node defines the positive y-axis. 2. Non-perimeter nodes actually have the distances to all perimeter nodes, and embed themselves. Gives good initial positions for the rubber band algorithm. 16

17 How to find perimeter nodes? The bootstrapping nodes send hello messages to everyone. The node which is the farthest among all its 2-hop neighbors will identify itself as a perimeter node. 17

18 Success rate of greedy routing Success rate on virtual coordinates is comparable with true coordinates, when the sensors are dense and uniform. 18

19 Weird Shapes 19

20 Obstacles Success rate on virtual coordinates degrades when there are a lot of obstacles, but better than true coordinates. 20

21 Conclusions Geographical forwarding is quite robust to localization errors, or reasonable virtual coordinates. Geographical forwarding can easily scale to tens of thousands of nodes with acceptable overhead. For dense uniform sensor layout, we can eliminate the need for face routing altogether. Rubber band virtual coordinates respect the connectivity better than the true coordinates. 21

22 Next Rubber band approach is kind of ad-hoc. Next: In-depth study of routing around holes. Greedy embedding? 22

23 Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 23

24 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there is a neighbor of s closer to t than s itself. t s 24

25 Questions to ask We want to find a virtual coordinates such that greedy routing always works. Does there exist such a greedy embedding in R 2? in R 3? in Euclidean metric? Hyperbolic space? If it exists, how to compute? 25

26 Greedy embedding does not always exist K 1,6 does not have a greedy embedding in R 2 26

27 A lemma Lemma: each node t must have an edge to its closest (in terms of Euclidean distance) node u. Otherwise, u has no neighbor that is closer to t than itself. 27

28 Proof K 1,6 does not have a greedy embedding in R 2 Proof: 1. One of the angles is less than π/3. 2. One of ab 2 and ab 3, say, ab 2, is longer than b 2 b Then b 2 does not have edge with its closest point b 3. 28

29 A conjecture Corollary: K k, 5k+1 does not have a greedy embedding in R 2. Conjecture: Any planar 3-connected graph has a greedy embedding R 2. Hint: this is tight. K 2,11 is planar but not 3-connected. K 3.16 is 3-connected but not planar. (it has K 3.3 minor). Planar 3-connected graph has a greedy embedding in R 3 29

30 Polyhedral routing Theorem: Any 3-connected planar graph has a greedy embedding e in R 3, where the distance function is defined as d(u, v) = - e(u) e(v). Proof: 1. Any 3-connected planar graph is the edge graph of a 3D convex polytope, with edges tangent to a sphere. [Steinitz 1922]. 2. Each vertex has a supporting hyperplane with the normal being the 3D coordinate of the vertex. 30

31 Polyhedral routing Proof: For any s, t, there is a neighbor v of s, d(v,t)<d(s,t). 1. d(s,t)-d(v,t)=[e(v)-e(s)] e(t)>0. 2. Now suppose such neighbor v does not exist, then s is a reflex vertex, with all the neighbors pointing away from t. v 3. This contradicts with the convexity of the polytope. t s 31

32 Discussions Papadimitriou s conjecture: Any planar 3-connected graph has a greedy embedding R 2. has been proved! The theorem only gives a sufficient condition, not necessary. K 3.3 has a greedy embedding. A graph with a Hamiltonian cycle has a greedy embedding on a line. Given a graph, can we tell whether it has a greedy embedding in R 2? Is this problem hard? (Recall that many such embedding problems are hard ) More understanding of greedy embedding in R 2, R 3 32

33 Follow-up work Dhandapani proved that any triangulation admits a greedy embedding (SODA 08). Leighton and Moitra proved the conjecture (FOCS 08). Independently, Angelini et al. also proved it (Graph Drawing 08). Goodrich and D. Strash improved the coordinates to be of size O(log n) (under submission). We briefly introduce the main idea. 33

34 Leighton and Moitra All 3-connected planar graph contain a spanning Christmas Cactus graph. All Christmas Cactus graphs admit a greedy embedding in the plane. 34

35 Leighton and Moitra A cactus graph is connected, each edge is in at most one simple cycle. A Christmas Cactus graph is a cactus graph for which the removal of any node disconnects into at most 2 pieces. 35

36 A Christmas Cactus 36

37 Example 37

38 Connection to graph labeling Given a graph, find a labeling of the nodes such that one can compute the (approximate) shortest path distance between any two vertices from their labels only. Tradeoff between approximation ratio and the label size. For shortest path distance, the maximum label size is Θ(n) for general graph, O(n 1/2 ) (Ω(n 1/3 )) for planar graphs, and Θ(log 2 n) for trees. General graph: a scheme with label size O(kn 1/k ) and approximation ratio 2k-1. Google distance labeling for the literature. 38

39 Approach II: Embed a spanning tree in polar coordinate system 39

40 Embed a tree in polar coordinate system Start from any node as root, flood to find the shortest path tree. Assign polar ranges to each node in the tree. The range of a node is divided among its children. The size of the range is proportional to the size of its subtree. Order the subtrees that align with the sensor connectivity. 40

41 Embed a tree in polar coordinate system Order the subtrees that align with the sensor connectivity. Three reference nodes flood the network. Each node knows the hop count to each reference. Each node embed itself with respect to the references. (trilateration with hop counts) A node s position is defined as the center of mass of all the nodes in its subtree. This will provide an angular ordering of all the children. 41

42 Routing on a tree Route to the common ancestor of the source and destination. Check whether the destination range is included in the range of the current node. If not, go to the parent. Otherwise go to the corresponding child. Root is the bottleneck. Path may be long. 42

43 Routing on a tree Be a little smarter: store a local routing table that keeps the ranges of up to k-hop neighbors. find shortcuts. Virtual Polar Coordinate Routing: check the neighborhood, find the node that is closer to the destination. greedy forwarding in polar coordinates. If the upper/lower bound is closer to the destination. 43

44 Load balancing Root is still the bottleneck even for smart routing. Shortest path routing, still not the most load balanced routing 44

45 Routing on spanning trees in theory and in practice For any graph G there is a spanning tree T, s.t. the average stretch of the shortest paths on T, compared with G, is O((lognloglogn) 2 ). 45

46 General framework Find a substructure such that we can define virtual coordinates. The virtual coordinates guarantee delivery. Greedy routing in the connectivity graph. 46

47 Virtual ring routing Some slides from 47

48 VRR: the virtual ring topology-independent node identifiers, e.g., MAC address 910 8F6 90E 8F0 8E2 FFF 0 each node maintains a virtual neighbor set (vset) nodes organized into virtual ring by increasing identifier value 48

49 VRR: routing paths 8F6 8F6 physical network topology nodes only maintain paths to virtual neighbors: vset-paths are typically multi-hop vset-paths are maintained proactively 49

50 VRR: forwarding table 14A endpointa endpointb nexta nextb pathid 8F6 90E ME F F6 10E ME 10 14A 140 F42 10E 2 8F6 F42 ME F42 FF forwarding table for node 8F6 F42 8F6 10E vset-paths recorded in forwarding tables along path forwarding table contains 140 vset-paths between node and vset members vset-paths between other nodes that go through node paths to physical neighbors 50

51 VRR: forwarding forward message destined to x by picking endpoint e numerically closest to x forwarding message to next hop towards e deliver message to node with id closest to x how does this work? can find x because nodes are connected in a ring low stretch because of additional forwarding state many alternate paths to route around failures 51

52 VRR: example routing physical network Topology 52

53 VRR: example routing there may be some stretch physical network Topology 53

54 Node joining broadcast hellos to find physical neighbors send setup request to 16E (itself) through proxy (19A) A 8F6 Network Topology 16E 54

55 Node joining 16E sends setup requests to nodes in received vset 164 sends setup to 16E with its vset 16E adds node to vset when it receives setup A 8F6 171 Network Topology 16E 55

56 Size of routing table Assume the nodes are randomly placed, each vpath 56

57 Simulation experiments in ns-2 ran experiments with b MAC varied network size, mobility, session lifetime compared with DSDV, DSR, and AODV VRR performed well in all experiments high delivery ratios even with fast movement significantly lower delays with route instability 57

58 Delivery ratio: fast movement Delivery ra atio DSDV DSR AODV VRR Number of nodes 58

59 Delay: fast movement Delay (sec conds) DSDV DSR AODV VRR Number of nodes 59

60 Sensor network sensor network testbed 67 mica2dot motes in UCB building comparison with BVR delivery ratio with mote failures 60

61 Sensor network: mote failures Number of nodes Number of nodes VRR delivery ratio BVR delivery ratio Time (mins) Percentage of pac ckets delivered 61

62 Wireless office testbed 30 machines running windows communicate using a throughput comparison with LQSR using ttcp 62

63 Wireless office testbed: throughput Bandwidth (Mbps) MR-LQSR VRR Machine 63

64 Why a virtual ring? Alternatively, use an Euler tour to define coordinates on the sensor nodes. An Euler tour is a cycle that visits every vertex. Can be constructed by a depth-first tour on a spanning tree. Also use shortcuts for greedy routing. 64

Given a graph, find an embedding s.t. greedy routing works

Given a graph, find an embedding s.t. greedy routing works Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there

More information

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic

More information

Greedy Routing in Wireless Networks. Jie Gao Stony Brook University

Greedy Routing in Wireless Networks. Jie Gao Stony Brook University Greedy Routing in Wireless Networks Jie Gao Stony Brook University A generic sensor node CPU. On-board flash memory or external memory Sensors: thermometer, camera, motion, light sensor, etc. Wireless

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

Geometry in Wireless Sensor Networks

Geometry in Wireless Sensor Networks How cancomputational Geometry help Mobile Networks: Geometry in Wireless Sensor Networks Jie Gao Stony Brook University CG Week 2012 Algorithms in the Field Workshop 2013/6/21 1 A generic sensor node CPU.

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Greedy Routing with Guaranteed Delivery Using Ricci Flow

Greedy Routing with Guaranteed Delivery Using Ricci Flow Greedy Routing with Guaranteed Delivery Using Ricci Flow Jie Gao Stony Brook University Joint work with Rik Sarkar, Xiaotian Yin, Wei Zeng, Feng Luo, Xianfeng David Gu Greedy Routing Assign coordinatesto

More information

Jie Gao Computer Science Department Stony Brook University

Jie Gao Computer Science Department Stony Brook University Localization of Sensor Networks II Jie Gao Computer Science Department Stony Brook University 1 Rigidity theory Given a set of rigid bars connected by hinges, rigidity theory studies whether you can move

More information

Ma/CS 6b Class 26: Art Galleries and Politicians

Ma/CS 6b Class 26: Art Galleries and Politicians Ma/CS 6b Class 26: Art Galleries and Politicians By Adam Sheffer The Art Gallery Problem Problem. We wish to place security cameras at a gallery, such that they cover it completely. Every camera can cover

More information

Landmark-based routing

Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004. Using

More information

A Solution to the Papadimitriou-Ratajczak Conjecture. Ankur Moitra

A Solution to the Papadimitriou-Ratajczak Conjecture. Ankur Moitra A Solution to the Papadimitriou-Ratajczak Conjecture by Ankur Moitra Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree

More information

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer

More information

Some Results on Greedy Embeddings in Metric Spaces

Some Results on Greedy Embeddings in Metric Spaces Some Results on Greedy Embeddings in Metric Spaces Tom Leighton Massachusetts Institute of Technology Math Department and CSAIL Cambridge, MA 02139 ftl@math.mit.edu Ankur Moitra Massachusetts Institute

More information

Fixed-Parameter Algorithms, IA166

Fixed-Parameter Algorithms, IA166 Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

Map: Medial axis based geometric routing in sensor networks

Map: Medial axis based geometric routing in sensor networks DOI.7/s11276-6-9857-z Map: Medial axis based geometric routing in sensor networks Jehoshua Bruck Jie Gao Anxiao (Andrew) Jiang Published online: 23 October 6 C Science + Business Media, LLC 6 Abstract

More information

Navigating in a graph by aid of its spanning tree

Navigating in a graph by aid of its spanning tree Navigating in a graph by aid of its spanning tree Feodor Dragan Kent State University, USA. Martín Matamala Universidad de Chile, Chile. Navigating in a graph Rules to advance in a graph from a given vertex

More information

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

Tutte s Theorem: How to draw a graph

Tutte s Theorem: How to draw a graph Spectral Graph Theory Lecture 15 Tutte s Theorem: How to draw a graph Daniel A. Spielman October 22, 2018 15.1 Overview We prove Tutte s theorem [Tut63], which shows how to use spring embeddings to obtain

More information

Ma/CS 6b Class 11: Kuratowski and Coloring

Ma/CS 6b Class 11: Kuratowski and Coloring Ma/CS 6b Class 11: Kuratowski and Coloring By Adam Sheffer Kuratowski's Theorem Theorem. A graph is planar if and only if it does not have K 5 and K 3,3 as topological minors. We know that if a graph contains

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Topology Control in Wireless Networks 4/24/06

Topology Control in Wireless Networks 4/24/06 Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Routing v.s. Spanners

Routing v.s. Spanners Routing v.s. Spanners Spanner et routage compact : similarités et différences Cyril Gavoille Université de Bordeaux AlgoTel 09 - Carry-Le-Rouet June 16-19, 2009 Outline Spanners Routing The Question and

More information

Approximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006

Approximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006 Approximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006 Outline Reducing the constant from O ( ɛ d) to O ( ɛ (d 1)/2) in uery time Need to know ɛ ahead of time Preprocessing time and

More information

Rubber bands. Chapter Rubber band representation

Rubber bands. Chapter Rubber band representation Chapter 1 Rubber bands In the previous chapter, we already used the idea of looking at the graph geometrically, by placing its nodes on the line and replacing the edges by rubber bands. Since, however,

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

274 Curves on Surfaces, Lecture 5

274 Curves on Surfaces, Lecture 5 274 Curves on Surfaces, Lecture 5 Dylan Thurston Notes by Qiaochu Yuan Fall 2012 5 Ideal polygons Previously we discussed three models of the hyperbolic plane: the Poincaré disk, the upper half-plane,

More information

Networks: A Deterministic Approach with Constant Overhead

Networks: A Deterministic Approach with Constant Overhead Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

Geometric Spanners for Routing in Mobile Networks

Geometric Spanners for Routing in Mobile Networks 1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile

More information

Lecture 8: The Traveling Salesman Problem

Lecture 8: The Traveling Salesman Problem Lecture 8: The Traveling Salesman Problem Let G = (V, E) be an undirected graph. A Hamiltonian cycle of G is a cycle that visits every vertex v V exactly once. Instead of Hamiltonian cycle, we sometimes

More information

Randomized incremental construction. Trapezoidal decomposition: Special sampling idea: Sample all except one item

Randomized incremental construction. Trapezoidal decomposition: Special sampling idea: Sample all except one item Randomized incremental construction Special sampling idea: Sample all except one item hope final addition makes small or no change Method: process items in order average case analysis randomize order to

More information

Broadcast: Befo re 1

Broadcast: Befo re 1 Broadcast: Before 1 After 2 Spanning Tree ffl assume fixed spanning tree ffl asynchronous model 3 Processor State parent terminated children 4 Broadcast: Step One parent terminated children 5 Broadcast:Step

More information

To enhance Routing in ZigBee Wireless Networks

To enhance Routing in ZigBee Wireless Networks To enhance Routing in ZigBee Wireless Networks P.Chanthiya Assistant Professor Department of Computer Science & Engineering, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, India Abstract The

More information

GEM: Graph EMbedding for Routing and Data-Centric Storage in Sensor Networks Without Geographic Information

GEM: Graph EMbedding for Routing and Data-Centric Storage in Sensor Networks Without Geographic Information GEM: Graph EMbedding for Routing and Data-Centric Storage in Sensor Networks Without Geographic Information James Newsome Dawn Song March 2003 CMU-CS-03-112 School of Computer Science Carnegie Mellon University

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

Geographic and Diversity Routing in Mesh Networks

Geographic and Diversity Routing in Mesh Networks Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

In what follows, we will focus on Voronoi diagrams in Euclidean space. Later, we will generalize to other distance spaces.

In what follows, we will focus on Voronoi diagrams in Euclidean space. Later, we will generalize to other distance spaces. Voronoi Diagrams 4 A city builds a set of post offices, and now needs to determine which houses will be served by which office. It would be wasteful for a postman to go out of their way to make a delivery

More information

Advanced routing topics. Tuomas Launiainen

Advanced routing topics. Tuomas Launiainen Advanced routing topics Tuomas Launiainen Suboptimal routing Routing trees Measurement of routing trees Adaptive routing Problems Fault-tolerant tables Point-of-failure rerouting Point-of-failure shortest

More information

Trapezoidal decomposition:

Trapezoidal decomposition: Trapezoidal decomposition: Motivation: manipulate/analayze a collection of segments e.g. detect segment intersections e.g., point location data structure Definition. Draw verticals at all points binary

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

Routing. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1

Routing. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Routing Chapter 11 Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Application of the Week: Games / Art Uncountable possibilities, below, e.g., a beer coaster that can interact with other coasters [sentilla]

More information

Scalable Routing for Networks of Dynamic Substrates. Boris Drazic

Scalable Routing for Networks of Dynamic Substrates. Boris Drazic Scalable Routing for Networks of Dynamic Substrates by Boris Drazic A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department of Electrical

More information

Diversity Coloring for Distributed Storage in Mobile Networks

Diversity Coloring for Distributed Storage in Mobile Networks Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring

More information

Crossing bridges. Crossing bridges Great Ideas in Theoretical Computer Science. Lecture 12: Graphs I: The Basics. Königsberg (Prussia)

Crossing bridges. Crossing bridges Great Ideas in Theoretical Computer Science. Lecture 12: Graphs I: The Basics. Königsberg (Prussia) 15-251 Great Ideas in Theoretical Computer Science Lecture 12: Graphs I: The Basics February 22nd, 2018 Crossing bridges Königsberg (Prussia) Now Kaliningrad (Russia) Is there a way to walk through the

More information

Analysis of Algorithms

Analysis of Algorithms Analysis of Algorithms Concept Exam Code: 16 All questions are weighted equally. Assume worst case behavior and sufficiently large input sizes unless otherwise specified. Strong induction Consider this

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

Sorting Based Data Centric Storage

Sorting Based Data Centric Storage Sorting Based Data Centric Storage Fenghui Zhang, Anxiao(Andrew) Jiang, and Jianer Chen Dept. of Computer Science, Texas A&M Univ. College Station, TX 77843. {fhzhang, ajiang, chen}@cs.tamu.edu. Abstract

More information

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

Localization of Sensor Networks II

Localization of Sensor Networks II Localization of Sensor Networks II Jie Gao Computer Science Department Stony Brook University 2/3/09 Jie Gao CSE595-spring09 1 Rigidity theory Given a set of rigid bars connected by hinges, rigidity theory

More information

Lecture 11 Combinatorial Planning: In the Plane

Lecture 11 Combinatorial Planning: In the Plane CS 460/560 Introduction to Computational Robotics Fall 2017, Rutgers University Lecture 11 Combinatorial Planning: In the Plane Instructor: Jingjin Yu Outline Convex shapes, revisited Combinatorial planning

More information

Math 443/543 Graph Theory Notes 5: Planar graphs and coloring

Math 443/543 Graph Theory Notes 5: Planar graphs and coloring Math 443/543 Graph Theory Notes 5: Planar graphs and coloring David Glickenstein October 10, 2014 1 Planar graphs The Three Houses and Three Utilities Problem: Given three houses and three utilities, can

More information

Geometric Steiner Trees

Geometric Steiner Trees Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 2: Global properties of Euclidean Steiner Trees and GeoSteiner Marcus Brazil

More information

Approximate Algorithms for Touring a Sequence of Polygons

Approximate Algorithms for Touring a Sequence of Polygons Approximate Algorithms for Touring a Sequence of Polygons Fajie Li 1 and Reinhard Klette 2 1 Institute for Mathematics and Computing Science, University of Groningen P.O. Box 800, 9700 AV Groningen, The

More information

Realizing Planar Graphs as Convex Polytopes. Günter Rote Freie Universität Berlin

Realizing Planar Graphs as Convex Polytopes. Günter Rote Freie Universität Berlin Realizing Planar Graphs as Convex Polytopes Günter Rote Freie Universität Berlin General Problem Statement GIVEN: a combinatorial type of 3-dimensional polytope (a 3-connected planar graph) [ + additional

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Differential Geometry: Circle Packings. [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson]

Differential Geometry: Circle Packings. [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson] Differential Geometry: Circle Packings [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson] Conformal Maps Recall: Given a domain Ω R 2, the map F:Ω R 2 is conformal if it

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Delaunay Triangulation Overlays

Delaunay Triangulation Overlays HighPerf or mance Swi tchi ng and Routi ng Tele com Cent erw orksh op: Sept 4, 1 97. Delaunay Triangulation Overlays Jörg Liebeherr 2003 1 HyperCast Project HyperCast is a set of protocols for large-scale

More information

Fall CS598CC: Approximation Algorithms. Chandra Chekuri

Fall CS598CC: Approximation Algorithms. Chandra Chekuri Fall 2006 CS598CC: Approximation Algorithms Chandra Chekuri Administrivia http://www.cs.uiuc.edu/homes/chekuri/teaching/fall2006/approx.htm Grading: 4 home works (60-70%), 1 take home final (30-40%) Mailing

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

3D Wireless Sensor Networks: Challenges and Solutions

3D Wireless Sensor Networks: Challenges and Solutions 3D Wireless Sensor Networks: Challenges and Solutions Hongyi Wu Old Dominion University Ph.D., CSE, UB, 2002 This work is partially supported by NSF CNS-1018306 and CNS-1320931. 2D PLANE, 3D VOLUME, AND

More information

Smart Routing with Learning-

Smart Routing with Learning- Smart Routing with Learning- based QoS-aware Meta-strategies Ying Zhang Markus Fromherz Lukas Kuhn (Ludwig Maximilian University) October 2004 Outline Message-initiated Constraint-based Routing Learning-based

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility Outline CS38 Introduction to Algorithms Lecture 18 May 29, 2014 coping with intractibility approximation algorithms set cover TSP center selection randomness in algorithms May 29, 2014 CS38 Lecture 18

More information

Exploration of Path Space using Sensor Network Geometry

Exploration of Path Space using Sensor Network Geometry Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban Computer Science Stony Brook University {jiang,xban}@cs.sunysb.edu Mayank Goswami Applied Math & Statistics Stony Brook

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

Geographical Quadtree Routing

Geographical Quadtree Routing Geographical Quadtree Routing Chen Avin, Yaniv Dvory, Ran Giladi Department of Communication Systems Engineering Ben Gurion University of the Negev Beer Sheva 84105, Israel Email: avin@cse.bgu.ac.il, dvory@bgu.ac.il,

More information

ADHOC SYSTEMSS ABSTRACT. the system. The diagnosis strategy. is an initiator of. can in the hierarchy. paper include. this. than.

ADHOC SYSTEMSS ABSTRACT. the system. The diagnosis strategy. is an initiator of. can in the hierarchy. paper include. this. than. Journal of Theoretical and Applied Information Technology 2005-2007 JATIT. All rights reserved. www.jatit.org A HIERARCHICAL APPROACH TO FAULT DIAGNOSIS IN LARGE S CALE SELF-DIAGNOSABLE WIRELESS ADHOC

More information

Ad Hoc Networks 9 (2011) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:

Ad Hoc Networks 9 (2011) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage: Ad Hoc Networks 9 (2) 34 354 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc : Geometric STAteless Routing for 3-D wireless sensor networks Min-Te

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Integral Geometry and the Polynomial Hirsch Conjecture

Integral Geometry and the Polynomial Hirsch Conjecture Integral Geometry and the Polynomial Hirsch Conjecture Jonathan Kelner, MIT Partially based on joint work with Daniel Spielman Introduction n A lot of recent work on Polynomial Hirsch Conjecture has focused

More information

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29 CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 29 CS 473: Algorithms, Spring 2018 Simplex and LP Duality Lecture 19 March 29, 2018

More information

References. Forwarding. Introduction...

References. Forwarding. Introduction... References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Chapter 11 Chapter 6

Chapter 11 Chapter 6 Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013 Energy aware geographic routing in wireless sensor networks with anchor nodes Mircea Cretu Stancu Utrecht University Computing Science May 2013 Overview Introduction Current paradigm EAGR preliminaries

More information

ROUTING is an important issue that affects wireless

ROUTING is an important issue that affects wireless 1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,

More information

Networking Sensors, II

Networking Sensors, II Networking Sensors, II Sensing Networking Leonidas Guibas Stanford University Computation CS321 ZG Book, Ch. 3 1 Class Administration Paper presentation preferences due today, by class time Project info

More information

Collision Detection. Jane Li Assistant Professor Mechanical Engineering & Robotics Engineering

Collision Detection. Jane Li Assistant Professor Mechanical Engineering & Robotics Engineering RBE 550 MOTION PLANNING BASED ON DR. DMITRY BERENSON S RBE 550 Collision Detection Jane Li Assistant Professor Mechanical Engineering & Robotics Engineering http://users.wpi.edu/~zli11 Euler Angle RBE

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

Many-to-Many Communications in HyperCast

Many-to-Many Communications in HyperCast Many-to-Many Communications in HyperCast Jorg Liebeherr University of Virginia Jörg Liebeherr, 2001 HyperCast Project HyperCast is a set of protocols for large-scale overlay multicasting and peer-to-peer

More information

Lecture 4: Trees and Art Galleries

Lecture 4: Trees and Art Galleries Math 7H: Honors Seminar Professor: Padraic Bartlett Lecture 4: Trees and Art Galleries Week 2 UCSB 2014 1 Prelude: Graph Theory In this talk, we re going to refer frequently to things called graphs and

More information

STRAIGHT LINE ORTHOGONAL DRAWINGS OF COMPLETE TERNERY TREES SPUR FINAL PAPER, SUMMER July 29, 2015

STRAIGHT LINE ORTHOGONAL DRAWINGS OF COMPLETE TERNERY TREES SPUR FINAL PAPER, SUMMER July 29, 2015 STRIGHT LINE ORTHOGONL DRWINGS OF COMPLETE TERNERY TREES SPUR FINL PPER, SUMMER 2015 SR LI MENTOR: SYLVIN CRPENTIER PROJECT SUGGESTED Y LRRY GUTH July 29, 2015 bstract. In this paper we study embeddings

More information

arxiv: v2 [cs.dc] 28 Feb 2018

arxiv: v2 [cs.dc] 28 Feb 2018 Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem

Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem David Glickenstein November 26, 2008 1 Graph minors Let s revisit some de nitions. Let G = (V; E) be a graph. De nition 1 Removing

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information