Ad hoc and Sensor Networks Topology Control

Similar documents
Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control

Wireless Sensor Networks 22nd Lecture

Ad hoc and Sensor Networks Chapter 11: Routing Protocols. Holger Karl

Chapter 11 Chapter 6

References. Forwarding. Introduction...

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Geographical routing 1

Simulations of the quadrilateral-based localization

Location Awareness in Ad Hoc Wireless Mobile Neworks

Routing protocols in WSN

LECTURE 9. Ad hoc Networks and Routing

Ad Hoc Networks: Issues and Routing

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Routing Protocols in MANETs

Routing and Topology Control in Ad Hoc & Wireless Sensor Networks

Principles of Wireless Sensor Networks

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Chapter 8 DOMINATING SETS

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Chapter 8 DOMINATING SETS

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Networking Sensors, II

Introduction to Mobile Ad hoc Networks (MANETs)

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Wireless Networking & Mobile Computing

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

Ad Hoc Routing Protocols and Issues

Routing Protocols in Mobile Ad-Hoc Network

Routing. Chapter 12. Ad Hoc and Sensor Networks Roger Wattenhofer

WSN Routing Protocols

Performance Evaluation of MANET through NS2 Simulation

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Chapter 6 DOMINATING SETS

CS551 Ad-hoc Routing

CS5984 Mobile Computing

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

3. Evaluation of Selected Tree and Mesh based Routing Protocols

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

Performance Analysis and Enhancement of Routing Protocol in Manet

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

Performance Evaluation of Various Routing Protocols in MANET

AN AD HOC network consists of a collection of mobile

Mobile Ad-Hoc Networks & Routing Algorithms

Geographic Routing in Simulation: GPSR

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.

Chapter 7 TOPOLOGY CONTROL

2013, IJARCSSE All Rights Reserved Page 85

Principles of Wireless Sensor Networks

Analysis of Routing Protocols in MANETs

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

Networking Sensors, I

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Multicasting in ad hoc networks: Energy efficient

Information Brokerage

Keywords: AODV, MANET, WRP

The General Analysis of Proactive Protocols DSDV, FSR and WRP

Data Communication. Guaranteed Delivery Based on Memorization

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

Routing. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1

Course Routing Classification Properties Routing Protocols 1/39

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

CHAPTER 2 LITERATURE REVIEW

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Computation of Multiple Node Disjoint Paths

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Chapter 7 Routing Protocols for Ad Hoc Wireless Networks. Jang-Ping Sheu

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Geometric Spanners for Routing in Mobile Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Geographic and Diversity Routing in Mesh Networks

Ad Hoc Wireless Routing CS 218- Fall 2003

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

A Survey - Energy Efficient Routing Protocols in MANET

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

Arvind Krishnamurthy Fall 2003

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Transcription:

Ad hoc and Sensor Networks Topology Control Slides taken from Holger Karl (Protocols and Architectures for Wireless Sensor Networks) Goals Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling transmission power Deciding which links to use Turning some nodes off Focus is on basic ideas, some algorithms Complexity results are only very superficially covered Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 1

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 3 Motivation: Dense Networks In a very dense networks, too many nodes might be in range for an efficient operation Too many collisions/too complex operation for a MAC protocol, too many paths to chose from for a routing protocol, Idea: Make topology less complex Topology: Which node is able/allowed to communicate with which other nodes Topology control needs to maintain invariants, e.g., connectivity Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 4

Options For Topology Control Topology control Control node activity deliberately turn on/off nodes Control link activity deliberately use/not use certain links Topology control Flat network all nodes have essentially same role Hierarchical network assign different roles to nodes; exploit that to control node/link activity Power control Backbones Clustering Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 5 Flat Networks Main option: Control transmission power Do not always use maximum power Selectively for some links or for a node as a whole Topology looks thinner Less interference, Alternative: Selectively discard some links Usually done by introducing hierarchies Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 6 3

Hierarchical Networks Backbone Construct a backbone network Some nodes control their neighbors they form a (minimal) dominating set Each node should have a controlling neighbor Controlling nodes have to be connected (backbone) Only links within backbone and from backbone to controlled neighbors are used Formally: Given graph G=(V,E), construct D ½ V such that Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 7 Hierarchical Network Clustering Construct clusters Partition nodes into groups ( clusters ) Each node in exactly one group Except for nodes bridging between two or more groups Groups can have clusterheads Typically: all nodes in a cluster are direct neighbors of their clusterhead Clusterheads are also a dominating set, but should be separated from each other they form an independent set Formally: Given graph G=(V,E), construct C ½ V such that Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 8 4

Aspects Of Topology-Control Algorithms Connectivity If two nodes connected in G, they have to be connected in G0 resulting from topology control Stretch factor should be small Hop stretch factor: how much longer are paths in G0 than in G? Energy stretch factor: how much more energy does the most energy-efficient path need? Throughput removing nodes/links can reduce throughput, by how much? Robustness to mobility Algorithm overhead Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 9 Example: Price For Maintaining Connectivity Maintaining connectivity can be very costly for a power control approach Compare power required for connectivity compared to power required to reach a very big maximum component Maximum component size 5000 Probability of connectivity 1 Average size of the largest component 4000 3000 000 1000 0,8 0,6 0,4 0, Probability of connectivity 0 0 10 15 0 5 30 35 40 Maximum transmission range Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 10 5

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 11 Power Control Magic Numbers? Question: What is a good power level for a node to ensure nice properties of the resulting graph? Idea: Controlling transmission power corresponds to controlling the number of neighbors for a given node Is there an optimal number of neighbors a node should have? Is there a magic number that is good irrespective of the actual graph/network under consideration? Historically, k=6 or k=8 had been suggested as such magic numbers However, they optimize progress per hop they do not guarantee connectivity of the graph!!! Needs deeper analysis Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 1 6

Controlling Transmission Range Assume all nodes have identical transmission range r=r( V ), network covers area A, V nodes, uniformly distr. Fact: Probability of connectivity goes to zero if: Fact: Probability of connectivity goes to 1 for Fact (uniform node distribution, density r): if and only if r V! 1 with V Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 13 Controlling Number Of Neighbors Knowledge about range also tells about number of neighbors Assuming node distribution (and density) is known, e.g., uniform Alternative: directly analyze number of neighbors Assumption: Nodes randomly, uniformly placed, only transmission range is controlled, identical for all nodes, only symmetric links are considered Result: For connected network, required number of neighbors per node is Q (log V ) It is not a constant, but depends on the number of nodes! For a larger network, nodes need to have more neighbors & larger transmission range! Rather inconvenient Constants can be bounded Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 14 7

Some Example Constructions For Power Control Basic idea for most of the following methods: Take a graph G=(V,E), produce a graph G0=(V,E0) that maintains connectivity with fewer edges Assume, e.g., knowledge about node positions Construction should be local (for distributed implementation) Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 15 Example 1: Relative Neighborhood Graph (RNG) Edge between nodes u and v if and only if there is no other node w that is closer to either u or v Formally: RNG maintains connectivity of the original graph Easy to compute locally But: Worst-case spanning ratio is W ( V ) Average degree is.6 This region has to be empty for the two nodes to be connected Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 16 8

Example : Gabriel Graph Gabriel graph (GG) similar to RNG Difference: Smallest circle with nodes u and v on its circumference must only contain node u and v for u and v to be connected Formally: Properties: Maintains connectivity, Worst-case spanning ratio W( V 1/), energy stretch O(1) (depending on consumption model!), worst-case degree W ( V ) This region has to be empty for the two nodes to be connected Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 17 Example 3: Delaunay Triangulation Assign, to each node, all points in the plane for which it is the closest node! Voronoi diagram Constructed in O( V log V ) time Connect any two nodes for which the Voronoi regions touch! Delaunay triangulation Problem: Might produce very long links; not well suited for power control Voronoi region for upper left node Edges of Delaunay triangulation Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 18 9

Example: Cone-Based Topology Control Assumption: Distance and angle information between nodes is available Two-phase algorithm Phase 1 Every node starts with a small transmission power Increase it until a node has sufficiently many neighbors What is sufficient? When there is at least one neighbor in each cone of angle a a = 5/6 p is necessary and sufficient condition for connectivity! Phase Remove redundant edges: Drop a neighbor w of u if there is a node v of w and u such that sending from u to w directly is less efficient than sending from u via v to w Essentially, a local Gabriel graph construction Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 19 Example: Cone-Based Topology Control () Properties: simple, local construction Extensions for k-connectivity (Yao graph) Little exercise: What happens when a < or > 5/6 p? Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 0 10

Centralized Power Control Algorithm Goal: Find topology control algorithm minimizing the maximum power used by any node Ensuring simple or bi-connectivity Assumptions: Locations of all nodes and path loss between all node pairs are known; each node uses an individually set power level to communicate with all its neighbors Idea: Use a centralized, greedy algorithm Initially, all nodes have transmission power 0 Connect those two components with the shortest distance between them (raise transmission power accordingly) Second phase: Remove links (=reduce transmission power) not needed for connectivity Exercise: Relation to Kruskal s MST algorithm? Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 1 Centralized Power Control Algorithm Topology E 4 4 3 C D 1 1 C A A 3) Connect C-D E B F F 3 D 1 1 B 1) Connect A-C and B-D E F C A D 1 1 B 4) Connect C-E and D-F E F 4 4 3 C 1 1 A B ) Connect A-B E C A F D 1 1 B 5) Remove edge A-B E F 4 4 3 C D 1 1 A B Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 11

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 3 Hierarchical Networks Backbones Idea: Select some nodes from the network/graph to form a backbone A connected, minimal, dominating set (MDS or MCDS) Dominating nodes control their neighbors Protocols like routing are confronted with a simple topology from a simple node, route to the backbone, routing in backbone is simple (few nodes) Problem: MDS is an NP-hard problem Hard to approximate, and even approximations need quite a few messages Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 4 1

Backbone By Growing a Tree Construct the backbone as a tree, grown iteratively Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 5 Backbone By Growing a Tree Example 1: : 3: 4: Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 6 13

Problem: Which Gray Node To Pick? When blindly picking any gray node to turn black, resulting tree can be very bad u u u d......... d......... d......... Solution: v u v u v Look ahead! One step suffices Lookahead using nodes g and w g d......... d......... Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 7 v=w v Performance Of Tree Growing With Look Ahead Dominating set obtained by growing a tree with the look ahead heuristic is at most a factor (1+ H(D)) larger than MDS H( ) harmonic function, H(k) = å i=1k 1/i <= ln k + 1 D is maximum degree of the graph It is automatically connected Can be implemented in a distributed fashion as well Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 8 14

Start Big, Make Lean Idea: start with some, possibly large, connected dominating set, reduce it by removing unnecessary nodes Initial construction for dominating set All nodes are initially white Mark any node black that has two neighbors that are not neighbors of each other (they might need to be dominated)! Black nodes form a connected dominating set (proof by contradiction); shortest path between ANY two nodes only contains black nodes Needed: Pruning heuristics Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 9 Pruning Heuristics Heuristic 1: Unmark node v if Node v and its neighborhood are included in the neighborhood of some node marked node u (then u will do the domination for v as well) Node v has a smaller unique identifier than u (to break ties) Heuristic : Unmark node v if Node v s neighborhood is included in the neighborhood of two u v w marked neighbors u and w Node v has the smallest identifier of the tree nodes Nice and easy, but only linear approximation factor Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 30 a b c d 15

One More Distributed Backbone Heuristic: Span Construct backbone, but take into account need to carry traffic preserve capacity Means: If two paths could operate without interference in the original graph, they should be present in the reduced graph as well Idea: If the stretch factor (induced by the backbone) becomes too large, more nodes are needed in the backbone Rule: Each node observes traffic around itself If node detects two neighbors that need three hops to communicate with each other, node joins the backbone, shortening the path Contention among potential new backbone nodes handled using random backoff A B C Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 31 Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 3 16

Clustering Partition nodes into groups of nodes clusters Many options for details Are there clusterheads? One controller/representative node per cluster May clusterheads be neighbors? If no: clusterheads form an independent set C: Typically: clusterheads form a maximum independent set May clusters overlap? Do they have nodes in common? Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 33 Clustering Further options How do clusters communicate? Some nodes need to act as gateways between clusters If clusters may not overlap, two nodes need to jointly act as a distributed gateway How many gateways exist between clusters? Are all active, or some standby? What is the maximal diameter of a cluster? If more than, then cluster heads are not necessarily a maximum independent set Is there a hierarchy of clusters? Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 34 17

Maximum Independent Set Computing a maximum independent set is NP-complete Can be approximate within (D +3)/5 for small D, within O(D log log D / log D) else; D bounded degree Show: A maximum independent set is also a dominating set Maximum independent set not necessarily intuitively desired solution Example: Radial graph, with only (v0,vi) E Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 35 A Basic Construction Idea For Independent Sets Use some attribute of nodes to break local symmetries Node identifiers, energy reserve, mobility, weighted combinations - matters not for the idea as such (all types of variations have been looked at) Make each node a clusterhead that locally has the largest attribute value Once a node is dominated by a clusterhead, it abstains from local competition, giving other nodes a chance Init: Step 1: Step : Step 3: Step 4: 1 3 7 6 5 4 1 3 7 6 5 4 1 3 7 6 5 4 1 3 7 6 5 4 1 3 7 6 5 4 Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 36 18

Determining Gateways To Connect Clusters Suppose: Cluster heads have been found How to connect the clusters, how to select gateways? It suffices for each clusterhead to connect to all other cluster heads that are at most three hops Resulting backbone (!) is connected Formally: Steiner tree problem Given: Graph G=(V,E), a subset C ½ V Required: Find another subset T ½ V such that S [ T is connected and S [ T is a cheapest such set Cost metric: number of nodes in T, link cost Here: special case since C are an independent set Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 37 Rotating Clusterheads Serving as a clusterhead can put additional burdens on a node For MAC coordination, routing, Let this duty rotate among various members Periodically reelect useful when energy reserves are used as discriminating attribute LEACH determine an optimal percentage P of nodes to become clusterheads in a network Use 1/P rounds to form a period In each round, np nodes are elected as clusterheads At beginning of round r, node that has not served as clusterhead in this period becomes clusterhead with probability P/(1-p(r mod 1/P)) Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 38 19

Multi-Hop Clusters Clusters with diameters larger than can be useful, e.g., when used for routing protocol support Formally: Extend domination definition to also dominate nodes that are at most d hops away Goal: Find a smallest set D of dominating nodes with this extended definition of dominance Only somewhat complicated heuristics exist Different tilt: Fix the size (not the diameter) of clusters Idea: Use growth budgets amount of nodes that can still be adopted into a cluster, pass this number along with broadcast adoption messages, reduce budget as new nodes are found Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 39 Passive Clustering Constructing a clustering structure brings overheads Not clear whether they can be amortized via improved efficiency Question: Eat cake and have it? Have a clustering structure without any overhead? Maybe not the best structure, and maybe not immediately, but benefits at zero cost are no bad deal! Passive clustering Whenever a broadcast message travels the network, use it to construct clusters on the fly Node to start a broadcast: Initial node Nodes to forward this first packet: Clusterhead Nodes forwarding packets from clusterheads: ordinary/gateway nodes And so on! Clusters will emerge at low overhead Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 40 0

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 41 Adaptive Node Activity Remaining option: Turn some nodes off deliberately Only possible if other nodes remain on that can take over their duties Example duty: Packet forwarding Approach: Geographic Adaptive Fidelity (GAF) Observation: Any two nodes within a square of length r < R/5 1/ can replace each other with respect to forwarding R radio range r R Keep only one such node active, let the other sleep Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 4 r 1

Conclusion Various approaches exist to trim the topology of a network to a desired shape Most of them bear some non-negligible overhead At least: Some distributed coordination among neighbors, or they require additional information Constructed structures can turn out to be somewhat brittle overhead might be wasted or even counter-productive Benefits have to be carefully weighted against risks for the particular scenario at hand Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 43 Ad hoc and Sensor Networks Routing protocols Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 44

Goals In any network of diameter > 1, the routing & forwarding problem appears We will discuss mechanisms for constructing routing tables in ad hoc/sensor networks Specifically, when nodes are mobile Specifically, for broadcast/multicast requirements Specifically, with energy efficiency as an optimization metric Specifically, when node position is available Yildiz Technical University - Department of Computer Engineering 45..015 Overview Unicast routing in MANETs Energy efficiency & unicast routing Multi-/broadcast routing Geographical routing Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 46 3

Unicast, Id-Centric Routing Given: a network/a graph Each node has a unique identifier (ID) Goal: Derive a mechanism that allows a packet sent from an arbitrary node to arrive at some arbitrary destination node The routing & forwarding problem Routing: Construct data structures (e.g., tables) that contain information how a given destination can be reached Forwarding: Consult these data structures to forward a given packet to its next hop Challenges Nodes may move around, neighborhood relations change Optimization metrics may be more complicated than smallest hop count e.g., energy efficiency Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 47 Ad-Hoc Routing Protocols Because of challenges, standard routing approaches not really applicable Too big an overhead, too slow in reacting to changes Examples: Dijkstra s link state algorithm; Bellman-Ford distance vector algorithm Simple solution: Flooding Does not need any information (routing tables) simple Packets are usually delivered to destination But: overhead is prohibitive! Usually not acceptable, either! Need specific, ad hoc routing protocols Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 48 4

Ad Hoc Routing Protocols Classification Main question to ask: When does the routing protocol operate? Option 1: Routing protocol always tries to keep its routing data up-to-date Protocol is proactive (active before tables are actually needed) or table-driven Option : Route is only determined when actually needed Protocol operates on demand Option 3: Combine these behaviors Hybrid protocols Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 49 Ad Hoc Routing Protocols Classification Is the network regarded as flat or hierarchical? Compare topology control, traditional routing Which data is used to identify nodes? An arbitrary identifier? The position of a node? Can be used to assist in geographic routing protocols because choice of next hop neighbor can be computed based on destination address Identifiers that are not arbitrary, but carry some structure? As in traditional routing Structure akin to position, on a logical level? Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 50 5

Proactive Protocols Idea: Start from a +/- standard routing protocol, adapt it Adapted distance vector: Destination Sequence Distance Vector (DSDV) Based on distributed Bellman Ford procedure Add aging information to route information propagated by distance vector exchanges; helps to avoid routing loops Periodically send full route updates On topology change, send incremental route updates Unstable route updates are delayed + some smaller changes Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 51 Proactive Protocols OLSR Combine link-state protocol & topology control Optimized Link State Routing (OLSR) Topology control component: Each node selects a minimal dominating set for its two-hop neighborhood Called the multipoint relays Only these nodes are used for packet forwarding Allows for efficient flooding Link-state component: Essentially a standard link-state algorithms on this reduced topology Observation: Key idea is to reduce flooding overhead (here by modifying topology) Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 5 6

Proactive Protocols Combine LS & DS: Fish Eye Fisheye State Routing (FSR) makes basic observation: When destination is far away, details about path are not relevant only in vicinity are details required Look at the graph as if through a fisheye lens Regions of different accuracy of routing information Practically: Each node maintains topology table of network (as in LS) Unlike LS: only distribute link state updates locally More frequent routing updates for nodes with smaller scope Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 53 Reactive Protocols DSR In a reactive protocol, how to forward a packet to destination? Initially, no information about next hop is available at all One (only?) possible recourse: Send packet to all neighbors flood the network Hope: At some point, packet will reach destination and an answer is sent pack use this answer for backward learning the route from destination to source Practically: Dynamic Source Routing (DSR) Use separate route request/route reply packets to discover route Data packets only sent once route has been established Discovery packets smaller than data packets Store routing information in the discovery packets Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 54 7

DSR Route Discovery Procedure Search for route from 1 to 5 [1] 1 [1] 7 5 4 3 6 1 [1,7] 4 6 [1,4] 7 [1,7] 3 5 1 [1,4,6] 4 6 7 3 [1,7,] 5 [1,7,3] 4 1 6 7 3 5 [5,3,7,1] Node 5 uses route information recorded in RREQ to send back, via source routing, a route reply Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 55 DSR Modifications, Extensions Intermediate nodes may send route replies in case they already know a route Problem: stale route caches Promiscuous operation of radio devices nodes can learn about topology by listening to control messages Random delays for generating route replies Many nodes might know an answer reply storms NOT necessary for medium access MAC should take care of it Salvaging/local repair When an error is detected, usually sender times out and constructs entire route anew Instead: try to locally change the source-designated route Cache management mechanisms To remove stale cache entries quickly Fixed or adaptive lifetime, cache removal messages, Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 56 8

Reactive Protocols AODV Ad hoc On Demand Distance Vector routing (AODV) Very popular routing protocol Essentially same basic idea as DSR for discovery procedure Nodes maintain routing tables instead of source routing Sequence numbers added to handle stale caches Nodes remember from where a packet came and populate routing tables with that information Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 57 Reactive Protocols TORA Observation: In hilly terrain, routing to a river s mouth is easy just go downhill Idea: Turn network into hilly terrain Different landscape for each destination Assign heights to nodes such that when going downhill, destination is reached in effect: orient edges between neighbors Necessary: resulting directed graph has to be cycle free Reaction to topology changes When link is removed that was the last outlet of a node, reverse direction of all its other links (increase height!) Reapply continuously, until each node except destination has at least a single outlet will succeed in a connected graph! Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 58 9

Alternative Approach: Gossiping/Rumor Routing Turn routing problem around: Think of an agent wandering through the network, looking for data (events, ) Agent initially perform random walk Leave traces in the network Later agents can use these traces to find data Essentially: works due to high probability of line intersections? Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 59 Overview Unicast routing in MANETs Energy efficiency & unicast routing Multi-/broadcast routing Geographical routing Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 60 30

Energy-Efficient Unicast: Goals Particularly interesting performance metric: Energy efficiency Goals Minimize energy/bit Example: A-B-E-H Maximize network lifetime Time until first node failure, loss of coverage, partitioning Seems trivial use proper link/path metrics (not hop count) and standard routing Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 61 D 3 3 4 H Example: Send data from node A to node H 3 A B E 1 1 1 4 G C 1 F 4 Basic Options For Path Metrics Maximum total available battery capacity Path metric: Sum of battery levels Example: A-C-F-H Minimum battery cost routing Path metric: Sum of reciprocal battery levels Example: A-D-H Conditional max-min battery capacity routing Only take battery level into account when below a given level Minimize variance in power levels Minimum total transmission power Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 6 D 3 3 3 A B E H 1 1 1 4 4 G C 1 F 4 31

A Non-Trivial Path Metric Previous path metrics do not perform particularly well One non-trivial link weight: wij weight for link node i to node j eij required energy, l some constant, ai fraction of battery of node i already used up Path metric: Sum of link weights Use path with smallest metric Properties: Many messages can be send, high network lifetime With admission control, even a competitive ratio logarithmic in network size can be shown Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 63 Multipath Unicast Routing Instead of only a single path, it can be useful to compute multiple paths between a given source/destination pair Disjoint paths Secondary path Multiple paths can be disjoint or braided Used simultaneously, alternatively, randomly, Source Braided paths Primary path Sink Source Primary path Sink Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 64 3

Overview Unicast routing in MANETs Energy efficiency & unicast routing Multi-/broadcast routing Geographical routing Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 65 Broadcast & Multicast (Energy-Efficient) Distribute a packet to all reachable nodes (broadcast) or to a somehow (explicitly) denoted subgroup (multicast) Basic options Source-based tree: Construct a tree (one for each source) to reach all addressees Minimize total cost (= sum of link weights) of the tree Minimize maximum cost to each destination Shared, core-based trees Use only a single tree for all sources Every source sends packets to the tree where they are distributed Mesh Trees are only 1-connected! use meshes to provide higher redundancy and thus robustness in mobile environments Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 66 33

Optimization Goals For Source-Based Trees For each source, minimize total cost This is the Steiner tree problem again For each source, minimize maximum cost to each destination This is obtained by overlapping the individual shortest paths as computed by a normal routing protocol Steiner tree Source Destination 1 Destination 1 Shortest path tree Source Destination 1 Destination 1 Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 67 Summary Of Options (Broadcast/Multicast) Broadcast Multicast One tree per source Shared tree (core-based tree) Mesh Minimize total cost (Steiner tree) Minimize cost to each node (e.g., Dijkstra) Single core Multiple core Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 68 34

Wireless Multicast Advantage Broad-/Multicasting in wireless is unlike broad-/multicasting in a wired medium Wires: locally distributing a packet to n neighbors: n times the cost of a unicast packet Wireless: sending to n neighbors can incur costs As high as sending to a single neighbor if receive costs are neglected completely As high as sending once, receiving n times if receives are tuned to the right moment As high as sending n unicast packets if the MAC protocol does not support local multicast! If local multicast is cheaper than repeated unicasts, then wireless multicast advantage is present Can be assumed realistically Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 69 Steiner Tree Approximations Computing Steiner tree is NP complete A simple approximation Pick some arbitrary order of all destination nodes + source node Successively add these nodes to the tree: For every next node, construct a shortest path to some other node already on the tree Performs reasonably well in practice Takahashi Matsuyama heuristic Similar, but let algorithm decide which is the next node to be added Start with source node, add that destination node to the tree which has shortest path Iterate, picking that destination node which has the shortest path to some node already on the tree Problem: Wireless multicast advantage not exploited! And does not really fit to the Steiner tree formulation Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 70 35

Broadcast Incremental Power (BIP) How to broadcast, using the wireless multicast advantage? Goal: use as little transmission power as possible Idea: Use a minimum-spanning-tree-type construction (Prim s algorithm) But: Once a node transmits at a given power level & reaches some neighbors, it becomes cheaper to reach additional neighbors From BIP to multicast incremental power (MIP): Start with broadcast tree construction, then prune unnecessary edges out of the tree Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 71 BIP Algorithm Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 7 36

BIP Example Round 1: A Round : A Round 3: A S 10 D 1 5 3 1 B 3 C 7 Round 4: A S (3) 7 D 3 B 6 C (1) S (1) 9 D 1 4 3 B 7 C Round 5: A S (5) 10 D C (1) S (3) 7 D 1 3 B 7 3 B 7 C Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 73 Example For Mesh-Based Multicast Two-tier data dissemination Overlay a mesh, route along mesh intersections Broadcast within the quadrant where the destination is Event (assumed to be) located Sin k Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 74 37

Overview Unicast routing in MANETs Energy efficiency & unicast routing Multi-/broadcast routing Geographical routing Position-based routing Geocasting Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 75 Geographic Routing Routing tables contain information to which next hop a packet should be forwarded Explicitly constructed Alternative: Implicitly infer this information from physical placement of nodes Position of current node, current neighbors, destination known send to a neighbor in the right direction as next hop Geographic routing Options Send to any node in a given area geocasting Use position information to aid in routing position-based routing Might need a location service to map node ID to node position Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 76 38

Basics Of Position-Based Routing Most forward within range r strategy Send to that neighbor that realizes the most forward progress towards destination NOT: farthest away from sender! Nearest node with (any) progress Idea: Minimize transmission power Directional routing Choose next hop that is angularly closest to destination Choose next hop that is closest to the connecting line to destination Problem: Might result in loops! Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 77 Problem: Dead Ends Simple strategies might send a packet into a dead end Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 78 39

Right Hand Rule To Leave Dead Ends GPSR Basic idea to get out of a dead end: Put right hand to the wall, follow the wall Does not work if on some inner wall will walk in circles Need some additional rules to detect such circles Geometric Perimeter State Routing (GPSR) Earlier versions: Compass Routing II, face- routing Use greedy, most forward routing as long as possible If no progress possible: Switch to face routing Face: largest possible region of the plane that is not cut by any edge of the graph; can be exterior or interior Send packet around the face using right-hand rule Use position where face was entered and destination position to determine when face can be left again, switch back to greedy routing Requires: planar graph! (topology control can ensure that) Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 79 GPSR Example Route packet from node A to node Z Leave face routing B E F H I K A D Z Enter face J routing L G C Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliği Bölümü 80 40

Geographic Routing Without Positions GEM Apparent contradiction: geographic, but no position? Construct virtual coordinates that preserve enough neighborhood information to be useful in geographic routing but do not require actual position determination Use polar coordinates from a center point Assign virtual angle range to neighbors of a node, bigger radius Angles are recursively redistributed to children nodes Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 81 GeRaF How to combine position knowledge with nodes turning on/off? Goal: Transmit message over multiple hops to destination node; deal with topology constantly changing because of on/off node Idea: Receiver-initiated forwarding Forwarding node S simply broadcasts a packet, without specifying next hop node Some node T will pick it up (ideally, closest to the source) and forward it Problem: How to deal with multiple forwarders? Position-informed randomization: The closer to the destination a forwarding node is, the shorter does it hesitate to forward packet Use several annuli to make problem easier, group nodes according to distance (collisions can still occur) Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 8 41

GeRaF Example A 4 A 3 A A 1 1 D-1 D Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliği Bölümü 83 Overview Unicast routing in MANETs Energy efficiency & unicast routing Multi-/broadcast routing Geographical routing Position-based routing Geocasting Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 84 4

Location-Based Multicast (LBM) Geocasting by geographically restricted flooding Define a forwarding zone nodes in this zone will forward the packet to make it reach the destination zone Forwarding zone specified in packet or recomputed along the way Static zone smallest rectangle containing original source and destination zone Adaptive zone smallest rectangle containing forwarding node and destination zone Possible dead ends again Adaptive distances packet is forwarded by node u if node u is closer to destination zone s center than predecessor node v (packet has made progress) Packet is always forwarded by nodes within the destination zone itself Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 85 Determining Next Hops Based On Voronoi Diagrams Goal: Use that neighbor to forward packet that is closest to destination among all the neighbors Use Voronoi diagram B C computed for the set of neighbors of the node currently holding the packet A S D Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 86 43

Geocasting Using Ad Hoc Routing GeoTORA Recall TORA protocol: Nodes compute a DAG with destination as the only sink Observation: Forwarding along the DAG still works if multiple nodes are destination (graph has multiple sinks) GeoTORA: All nodes in the destination region act as sinks Forwarding along DAG; all sinks also locally broadcast the packet in the destination region Remark: This also works for anycasting where destination nodes need not necessarily be neighbors Packet is then delivered to some (not even necessarily closest) member of the group Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 87 Trajectory-Based Forwarding (TBF) Think in terms of an agent : Should travel around the network, e.g., collecting measurements Random forwarding may take a long time Idea: Provide the agent with a certain trajectory along which to travel Described, e.g., by a simple curve Forward to node closest to this trajectory Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliğ i Bölümü 88 44

11/8/18 Mobile Nodes, Mobile Sinks Source Mobile nodes cause some additional problems E.g., multicast tree to distribute readings has to be adapted Sink moves downward Source Source Sink moves upward Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliği Bölümü 89 Conclusion Routing exploit various sources of information to find destination of a packet Explicitly constructed routing tables Implicit topology/neighborhood information via positions Routing can make some difference for network lifetime However, in some scenarios (streaming data to a single sink), there is only so much that can be done Energy efficiency does not equal lifetime, holds for routing as well Non-standard routing tasks (multicasting, geocasting) require adapted protocols Yıldız Teknik Üniversitesi - Bilgisayar Mühendisliği Bölümü 90 45