Simulations of the quadrilateral-based localization

Similar documents
Geographical routing 1

Chapter 7 TOPOLOGY CONTROL

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Geometric Spanners for Routing in Mobile Networks

Jie Gao Computer Science Department Stony Brook University

AN AD HOC network consists of a collection of mobile

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Networking Sensors, I

Data Communication. Guaranteed Delivery Based on Memorization

Geographic Routing in Simulation: GPSR

Geometric Routing: Of Theory and Practice

Localization of Sensor Networks II

Ad hoc and Sensor Networks Topology control

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Ad hoc and Sensor Networks Chapter 10: Topology control

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger

Survey on Position-Based Routing 1

Void Traversal for Guaranteed Delivery in Geometric Routing

An efficient implementation of the greedy forwarding strategy

Theory and Practice of Geographic Routing

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

arxiv: v2 [cs.dc] 28 Feb 2018

Midpoint Routing algorithms for Delaunay Triangulations

Chapter 8 DOMINATING SETS

Yao Spanners for Wireless Ad Hoc Networks

Chapter 8 DOMINATING SETS

Data-Centric Query in Sensor Networks

Computational Geometry

3. Voronoi Diagrams. 3.1 Definitions & Basic Properties. Examples :

Chapter 6 DOMINATING SETS

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in Wireless Networks 4/24/06

6. Concluding Remarks

Naming and Routing Using Global Topology Discovery

Week 8 Voronoi Diagrams

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

Landmark-based routing

Voronoi Diagrams in the Plane. Chapter 5 of O Rourke text Chapter 7 and 9 of course text

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs

Routing on Overlay Graphs in Mobile Ad Hoc Networks

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks

Delaunay Triangulations

WE consider a wireless ad hoc network (or sensor

GEOGRAPHIC routing (also known as location-based or

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department

Voronoi Diagrams and Delaunay Triangulations. O Rourke, Chapter 5

arxiv: v1 [cs.ni] 28 Apr 2015

Locating and Bypassing Holes in Sensor Networks

Introduction to Voronoi Diagrams and Delaunay Triangulations

Geographical Quadtree Routing

Delaunay Triangulations. Presented by Glenn Eguchi Computational Geometry October 11, 2001

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?

Networks: A Deterministic Approach with Constant Overhead

Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs

Guaranteed-delivery Geographic Routing under Uncertain Node Locations

Lokale Netzstrukturen Exercise 5. Juli 19, 2017

Delaunay Triangulation Overlays

Other Voronoi/Delaunay Structures

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger

Computational Geometry

Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch

Distributed Construction of an Underlay in Wireless Networks

Routing in Sensor Networks

Locating and Bypassing Holes in Sensor Networks

Boundary Recognition in Sensor Networks by Topological Methods

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013

BGR: Blind Geographic Routing for Sensor Networks

408 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 14, NO. 4, APRIL Geometric Spanners for Wireless Ad Hoc Networks

Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs

Geometry in Wireless Sensor Networks

Distributed Voronoi diagram computation in wireless sensor networks

Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch

Routing with Guaranteed Delivery on Virtual Coordinates

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan

Voronoi Diagrams. A Voronoi diagram records everything one would ever want to know about proximity to a set of points

References. Forwarding. Introduction...

Chapter 11 Chapter 6

A Review on 3-Dimention in Wireless Networks

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Robust Position-based Routing for Wireless Ad Hoc Networks

Computational Geometry Lecture Delaunay Triangulation

Map: Medial axis based geometric routing in sensor networks

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks

Exploration of Path Space using Sensor Network Geometry

Routing and Traversal via Location Awareness in Ad-Hoc Networks

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control

Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here)

Approximating geometric bottleneck shortest paths

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks

Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks

Wolfgang Mulzer Institut für Informatik. Planar Delaunay Triangulations and Proximity Structures

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks

Location Awareness in Ad Hoc Wireless Mobile Neworks

Internal node and shortcut based routing with guaranteed delivery in wireless networks

Given a graph, find an embedding s.t. greedy routing works

Chapter 4 Routing in Wireless Sensor Networks

THE rapid adoption of the Internet and mobile wireless

Transcription:

Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1

Random deployment Poisson distribution does not look uniform. ~400 nodes, average degree is about 5. 9/15/05 Jie Gao CSE590-fall05 2

Random deployment Poisson distribution does not look uniform. ~800 nodes, average degree is about 10. 9/15/05 Jie Gao CSE590-fall05 3

What you can do & what you can not do by using angles 9/15/05 Jie Gao CSE590-fall05 4

Localization by distance information Flipping causes the trouble, especially for sparse graph. Intuition: angle information helps to eliminate incorrect flips. 9/15/05 Jie Gao CSE590-fall05 5

What does angle information buy us? Lemma: By local angles of a unit-disk graph, we can determine all pairs of crossing edges in a valid embedding. If AB crosses CD in UDG, then by the crossing lemma, one of them, say B, has edges to the other three nodes. 9/15/05 Jie Gao CSE590-fall05 6

Local angle information Using local angle information only can not solve the localization problem in the worst case UDG embedding is NP-hard with only local angle info. Preliminary experiments show the effectiveness of using angle information in sparse graphs. More to be explored as to what one can do with angle information. 9/15/05 Jie Gao CSE590-fall05 7

NP-hard Local angle info UDG embedding 9/15/05 Jie Gao CSE590-fall05 8

Yet a different ambiguity Consider a unit-disk graph, where the two teeth do not cross: l 2l 3 2l 3 2l 3 2l 3 11 6 l 9/15/05 Jie Gao CSE590-fall05 9

9/15/05 Jie Gao CSE590-fall05 10 Two valid embeddings Two valid embeddings Consider a unit-disk graph, where the two teeth do not cross: Case 1: Case 2: l l 6 11 l 3 2 l 3 2 l 3 2 l 3 2 l l 6 11 l 3 2 l 3 2 l 3 2 l 3 2

UDG embedding with angle info is NP- hard Reduction from 3SAT problem: represent the 3SAT graph by a UDG. 9/15/05 Jie Gao CSE590-fall05 11

Represent a binary variable by the ambiguity Consider a unit-disk graph, where the two teeth do not cross: Case 1: Case 2: 1l 2 2l l 3 3 2 x 1 =1 x 0 1 = 1 = 0 1 l 2 x x 1 1 = l 2l 3 2l 3 2l 3 2l 3 l 2l 3 2l 3 2l 3 2l 3 11 6 l 9/15/05 Jie Gao CSE590-fall05 12 11 6 l

Some basic building blocks A chain of 2l+1 nodes has length at most 2l and at least l. A triangle with fixed aspect ratio between its edges. 9/15/05 Jie Gao CSE590-fall05 13

0/1 block the true realization by UDG x =1 x = 0 1 1 Case 1: Case 2: 0 x x = 1 1 1 = Use triangles to enforce that the teeth are large enough. 9/15/05 Jie Gao CSE590-fall05 14

Formulate the 3SAT problem as a graph 3SAT instance: 3SAT graph: 9/15/05 Jie Gao CSE590-fall05 15

Realize a 3SAT clause by a UDG 3SAT clause: x 1 x 2 x 3 v, 1 v, 2 v : 3 1 2 l or l 3 2 9/15/05 Jie Gao CSE590-fall05 16

NP-hardness What we have shown: finding an embedding without incorrect crossings is NP-hard. Thus, finding a valid embedding is NP-hard. Lemma: a 2 -approx. embedding has no incorrect crossings. 2 -approximate embedding is also NP-hard. The hardness results use degenerate configurations that do not happen often in practice. 9/15/05 Jie Gao CSE590-fall05 17

A localization algorithm with angle information 9/15/05 Jie Gao CSE590-fall05 18

Embedding by angle information We formulate an optimization problem: Variables: lengths of edges,. Fix a node as the origin. All angles are measured against x-axis. Each node s position (x, y) is a linear function of the variables. 9/15/05 Jie Gao CSE590-fall05 19

Embedding by angle information We formulate an optimization problem: Variables: lengths of edges,. Constraints: 1. Edge length constraint 2. Cycle constraint: for a cycle with edges 3. Unit disk graph property. For two nodes u, v without an edge, uv >1. Non-convex. So we can t solve it. 9/15/05 Jie Gao CSE590-fall05 20

An embedding method by LP We formulate a linear programming problem: Variables: lengths of edges,. Relax the constraints: use as many linear constraints as possible: 1. Edge length constraint 2. Cycle constraint: for a cycle with edges 9/15/05 Jie Gao CSE590-fall05 21

An embedding method by LP We formulate a linear programming problem: Variables: lengths of edges,. Linear Constraints: 3. edges AB, BC, and no AC A B C 4. Crossing edge constraint: α for quasi-udg 9/15/05 Jie Gao CSE590-fall05 22

Practical embedding using local angles The LP doesn t necessarily produces a valid embedding, but it works well in practice. True Network (600 nodes) Embedding 9/15/05 Jie Gao CSE590-fall05 23

Practical embedding using local angles The LP doesn t necessarily produces a valid embedding, but it works well in practice. True Network (600 nodes) Embedding 9/15/05 Jie Gao CSE590-fall05 24

Performance evaluation Largest connected component 9/15/05 Jie Gao CSE590-fall05 25

Noisy angle measurements and Quasi- UDG α=0.8, angle can err 12 from the real value. True Network (225 nodes) Embedding 9/15/05 Jie Gao CSE590-fall05 26

Further work on using local information Linear programming is centralized. We seek a distributed localization algorithm with angle information that works well for sparse graphs. 9/15/05 Jie Gao CSE590-fall05 27

Algorithm challenges Noisy measurements Optimization Insufficient connectivity, continuous deformation Rigidity theory Angle information Hardness of embedding 9/15/05 Jie Gao CSE590-fall05 28

System challenges Physical layer imposes measurement challenges Multipath, shadowing, sensor imperfections, changes in propagation properties and more Extensive computation aspects Many formulations of localization problems, how do you solve the optimization problem? How do you solve the problem in a distributed manner, under computation and storage constraints? Networking and coordination issues Nodes have to collaborate and communicate to solve the problem If you are using it for routing, it means you don t have routing support to solve the problem! How do you do it? System Integration issues How do you build a whole system for localization? How do you integrate location services with other applications? Different implementation for each setup, sensor, integration issue 9/15/05 Jie Gao CSE590-fall05 29

Location-based Routing in Sensor Networks Jie Gao Computer Science Department Stony Brook University 9/15/05 Jie Gao CSE590-fall05 30

Papers [Bose01] P. Bose, P. Morin, I. Stojmenovic and J. Urrutia, Routing with guaranteed delivery in ad hoc wireless networks, Wireless Networks, 7(6), 609-616, 2001. [Karp00] Karp, B. and Kung, H.T., Greedy Perimeter Stateless Routing for Wireless Networks, in MobiCom 2000. 9/15/05 Jie Gao CSE590-fall05 31

Routing in ad hoc networks Routing protocols in communication networks obtain route information between pairs of nodes wishing to communicate. Proactive protocols: the protocol maintains routing tables at each node that is updated as changes in the network topology are detected. Reactive protocols: routes are constructed on demand. No global routing table is maintained. Due to the high rate of topology changes, reactive protocols are more appropriate for ad hoc networks. Ad hoc on demand distance vector routing (AODV) Dynamic source routing (DSR) However, both depend on flooding for route discovery. 9/15/05 Jie Gao CSE590-fall05 32

Geographical routing Data-centric routing: routing is frequently based on a nodes attributes and sensed data, rather than on pre-assigned network address. Geographical routing uses a node s location to discover path to that route. Assumptions: Nodes know their geographical location Nodes know their 1-hop neighbors Routing destinations are specified geographically (a location, or a geographical region) Each packet can hold a small amount (O(1)) of routing information. The connectivity graph is modeled as a unit disk graph. 9/15/05 Jie Gao CSE590-fall05 33

Geographical routing The information that the source node has The location of the destination node; The location of itself and its 1-hop neighbors. Geographical forwarding: send the packet to the 1- hop neighbor that makes most progress towards the destination. No flooding is involved. Many ways to measure progress. The one closest to the destination in Euclidean distance. The one with smallest angle towards the destination: compass routing. Etc. 9/15/05 Jie Gao CSE590-fall05 34

Greedy progress 9/15/05 Jie Gao CSE590-fall05 35

Geographical routing may get stuck Geographical routing may stuck at a node whose neighbors are all further away from the destination than itself. t t s s? Send packets to the neighbor closest to the destination 9/15/05 Jie Gao CSE590-fall05 36

Compass routing may get in loops Compass routing may get in a loop. Send packets to the neighbor with smallest angle towards the destination 9/15/05 Jie Gao CSE590-fall05 37

How to get around local minima? Use a planar subgraph: a straight line graph with no crossing edges. It subdivides the plane into connected regions called faces. 9/15/05 Jie Gao CSE590-fall05 38

Face Routing Keep left hand on the wall, walk until hit the straight line connecting source to destination. Then switch to the next face. s t 9/15/05 Jie Gao CSE590-fall05 39

Face Routing s t 9/15/05 Jie Gao CSE590-fall05 40

Face Routing s t 9/15/05 Jie Gao CSE590-fall05 41

Face Routing s t 9/15/05 Jie Gao CSE590-fall05 42

Face Routing s t 9/15/05 Jie Gao CSE590-fall05 43

Face Routing s t 9/15/05 Jie Gao CSE590-fall05 44

Face Routing s t 9/15/05 Jie Gao CSE590-fall05 45

Face Routing s t 9/15/05 Jie Gao CSE590-fall05 46

All necessary information is stored in the message Source and destination positions The node when it enters the perimeter mode. The first edge on the current face. Completely local: Face Routing Properties Knowledge about direct neighbors positions is sufficient Faces are implicit. Only local neighbor ordering around each node is needed Right Hand Rule 9/15/05 Jie Gao CSE590-fall05 47

What if the destination is disconnected? The perimeter routing will get back to where it enters the perimeter mode. Failed no way to the destination. Guaranteed delivery of a message if there is a path. 9/15/05 Jie Gao CSE590-fall05 48

Planar Graph Subtraction Compute a planar subgraph of the unit disk graph. Preserves connectivity. Distributed computation. 9/15/05 Jie Gao CSE590-fall05 49

A little detour on Delaunay triangulation 9/15/05 Jie Gao CSE590-fall05 50

Delaunay triangulation First proposed by B. Delaunay in 1934. Numerous applications since then. 9/15/05 Jie Gao CSE590-fall05 51

Voronoi diagram Partition the plane into cells such that all the points inside a cell have the same closest point. Voronoi cell Voronoi vertex Voronoi edge 9/15/05 Jie Gao CSE590-fall05 52

Delaunay triangulation Dual of Voronoi diagram: Connect an edge if their Voronoi cells are adjacent. Triangulation of the convex hull. 9/15/05 Jie Gao CSE590-fall05 53

Delaunay triangulation Empty-circle property : the circumcircle of a Delaunay triangle is empty of other points. The converse is also true: if all the triangles in a triangulation are locally Delaunay, then the triangulation is a Delaunay triangulation. 9/15/05 Jie Gao CSE590-fall05 54

Greedy routing on Delaunay triangulation Claim: Greedy routing on DT never gets stuck. 9/15/05 Jie Gao CSE590-fall05 55

Delaunay triangulation For an arbitrary point set, the Delaunay triangulation may contain long edges. Centralized construction. If the nodes are uniformly placed inside a unit disk, the longest Delaunay edge is O((logn/n) 1/3 ). [Kozma et.al. PODC 04] Next: 2 planar subgraphs that can be constructed in a distributed way: relative neighborhood graph and the Gabriel graph. 9/15/05 Jie Gao CSE590-fall05 56

Relative Neighborhood Graph and Gabriel Graph Relative Neighborhood Graph (RNG) contains an edge uv if the lune is empty of other points. Gabriel Graph (GG) contains an edge uv if the disk with uv as diameter is empty of other points. Both can be constructed in a distributed way. 9/15/05 Jie Gao CSE590-fall05 57

Relative Neighborhood Graph and Gabriel Graph Claim: MST RNG GG Delaunay Thus, RNG and GG are planar (Delaunay is planar) and keep the connectivity (MST has the same connectivity of UDG). 9/15/05 Jie Gao CSE590-fall05 58

MST RNG GG Delaunay 1. RNG GG: if the lune is empty, then the disk with uv as diameter is also empty. 2. GG Delaunay: the disk with uv as diameter is empty, then uv is a Delaunay edge. 9/15/05 Jie Gao CSE590-fall05 59

MST RNG GG Delaunay 3. MST RNG: Assume uv in MST is not in RNG, there is a point w inside the lune. uv > uw, uv > vw. Now we delete uv and partition the MST into two subtrees. Say w is in the same component with u, then we can replace uv by wv and get a lighter tree. contradiction. RNG and GG are planar (Delaunay is planar) and keep the connectivity (MST has the same connectivity of UDG). 9/15/05 Jie Gao CSE590-fall05 60

An example of UDG 200 nodes randomly deployed in a 2000 2000 meters region. Radio range =250meters 9/15/05 Jie Gao CSE590-fall05 61

An example of GG and RNG GG RNG 9/15/05 Jie Gao CSE590-fall05 62

Two problems remain A subgraph G of G is a α-spanner if the shortest path in G is bounded by a constant α times the shortest path length in G. Both RNG and GG are not spanners a short path may not exist! Even if the planar subgraph contains a short path, can greedy routing and face routing find a short one? 9/15/05 Jie Gao CSE590-fall05 63