An efficient implementation of the greedy forwarding strategy

Similar documents
Void Traversal for Guaranteed Delivery in Geometric Routing

CMPS 3130/6130 Computational Geometry Spring Voronoi Diagrams. Carola Wenk. Based on: Computational Geometry: Algorithms and Applications

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Simulations of the quadrilateral-based localization

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

CS 532: 3D Computer Vision 14 th Set of Notes

6.854J / J Advanced Algorithms Fall 2008

Week 8 Voronoi Diagrams

CS133 Computational Geometry

CS S Lecture February 13, 2017

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

arxiv:cs/ v1 [cs.dc] 22 Nov 2006

Computational Geometry

Flavor of Computational Geometry. Voronoi Diagrams. Shireen Y. Elhabian Aly A. Farag University of Louisville

Geographic Routing in Simulation: GPSR

Geometric Routing: Of Theory and Practice

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lecture 16: Voronoi Diagrams and Fortune s Algorithm

BGR: Blind Geographic Routing for Sensor Networks

CAD & Computational Geometry Course plan

AN AD HOC network consists of a collection of mobile

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem

Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here)

Voronoi diagram and Delaunay triangulation

Distributed Voronoi diagram computation in wireless sensor networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

6. Concluding Remarks

Geometric Spanners for Routing in Mobile Networks

Geographical routing 1

arxiv: v1 [cs.ni] 28 Apr 2015

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs

Data-Centric Query in Sensor Networks

Estimating the Free Region of a Sensor Node

Distributed Construction of an Underlay in Wireless Networks

Optimal k-support Coverage Paths in Wireless Sensor Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Networking Sensors, II

Data Communication. Guaranteed Delivery Based on Memorization

Replacing Failed Sensor Nodes by Mobile Robots

QoS-Enabled Video Streaming in Wireless Sensor Networks

PROJECT REPORT VIRTUAL COORDINATE GENERATOR AND ROUTING SIMULATION TOOL FOR WIRELESS SENSOR NETWORKS IN 2 AND 3-DIMENSIONAL NETWORK SPACE

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks

A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks

Planar Point Location

Computational Geometry

Efficient minimum spanning tree construction without Delaunay triangulation

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

arxiv: v1 [cs.cg] 8 Jan 2018

Notes in Computational Geometry Voronoi Diagrams

Preferred directions for resolving the non-uniqueness of Delaunay triangulations

Chapter 7 TOPOLOGY CONTROL

Discrete geometry. Lecture 2. Alexander & Michael Bronstein tosca.cs.technion.ac.il/book

ROUTING is an important issue that affects wireless

Naming and Routing Using Global Topology Discovery

Minimum Spanning Tree Verification under Uncertainty

Computational Geometry Lecture Duality of Points and Lines

A Simpler Linear-Time Algorithm for Intersecting Two Convex Polyhedra in Three Dimensions

The Farthest Point Delaunay Triangulation Minimizes Angles

Voronoi Diagrams in the Plane. Chapter 5 of O Rourke text Chapter 7 and 9 of course text

Monotone Paths in Geometric Triangulations

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Yao Spanners for Wireless Ad Hoc Networks

Midpoint Routing algorithms for Delaunay Triangulations

Testing Bipartiteness of Geometric Intersection Graphs David Eppstein

Connected Components of Underlying Graphs of Halving Lines

Packing Two Disks into a Polygonal Environment

Lecture 11 Combinatorial Planning: In the Plane

Capturing an Evader in a Polygonal Environment with Obstacles

Decentralized Boundary Detection without Location Information in Wireless Sensor Networks

Fuzzy Voronoi Diagram

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

3D Wireless Sensor Networks: Challenges and Solutions

7 Voronoi Diagrams. The Post Office Problem

Voronoi Diagrams. A Voronoi diagram records everything one would ever want to know about proximity to a set of points

Context-aware Geographic Routing for Sensor Networks with Routing Holes

Efficient and Robust Geocasting Protocols for Sensor Networks

Geographical Quadtree Routing

Cutting out polygons with a circular saw

Routing on Overlay Graphs in Mobile Ad Hoc Networks

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

Aspect-Ratio Voronoi Diagram with Applications

2 Delaunay Triangulations

Art Gallery, Triangulation, and Voronoi Regions

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

A Novel Geometric Diagram and Its Applications in Wireless Networks

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Line segment intersection. Family of intersection problems

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM

Smallest Intersecting Circle for a Set of Polygons

PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS

Voronoi Diagrams for a Moderate-Sized Point-Set in a Simple Polygon

ARCS: A SIMULATOR FOR DISTRIBUTED SENSOR NETWORKS

The Capacity of Wireless Networks

Polygon decomposition. Motivation: Art gallery problem

An Energy-Efficient and Distributed Cooperation Mechanism For k-coverage Hole Detection And Healing in WSNs

Transcription:

An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at Abstract: A wireless sensor network needs a suitable multihop routing protocol to facilitate the communication between arbitrary sensor nodes. Position-based routing protocols are attractive for large-scale sensor networks due to their location awareness and scalability. A large number of position-based routing protocols use the greedy forwarding strategy. This paper presents an efficient implementation of the greedy forwarding algorithm. The nodes of the sensor network are viewed as points in the plane. Each node uses a Voronoi Diagram to generate a subdivision of the plane, which is solely based upon its local neighborhood. Every node forwards incoming messages to that Voronoi Cell the destination node belongs to, according to its position information. The complexity of our solution is O(n log n) for computing the Voronoi Diagram, which is typically done only once, but only O(log n) for finding the nexthop node. Interestingly, n is not the total number of nodes in the network here, but only the number of single hop neighbors. 1 Introduction Wireless sensor networks are currently an active field of research both in industry and academia. A sensor network is composed of a large number of nodes that are randomly dispersed over some area of interest. Not all nodes in a wireless network can communicate directly, so a multihop routing protocol is needed. Most routing protocols for wireless networks have been designed for networks of just a few hundreds of nodes and do not scale to networks with thousands of nodes. This is not the case for position-based routing protocols. They assume the existence of a position service which provides network participants with their location. The Global Position Service (GPS) is undoubtedly the most well known position service in use today. A survey of position services can be found in [HB01]. In sensor networks, the position is in fact more important than a specific node ID. For example, tracking applications are more interested in where the target is located than in the ID of the reporting node. This research has been supported by the Austrian START programme Y41-MAT 365

Many position-based routing protocols use variants of the greedy forwarding approach which is a localized approach: The routing decision at a node in the network is only based on its own position, the position of its single hop neighbor nodes and the position of the destination node. Greedy routing does not require the establishment or maintenance of routes: The nodes neither have to store routing tables nor do they transmit messages to keep the routing tables up-to-date, and no global information about the topology of the network is needed. When an intermediate node receives a message for a specific destination node, it forwards the message to the neighbor node which is closest to the destination node among all its neighbors. The question of how to find the closest neighbor node is usually not addressed, however. Our implementation uses a Voronoi Diagram to determine the neighbor node that is closest to the destination node. For a set of sites in the plane, the Voronoi Diagram partitions the plane into convex polygon cells that contain all points which are closer to the site of this cell than to any other site. The closest site to a given query point can be found by a point location algorithm. The time complexity of computing a Voronoi Diagram for n sites in the plane is O(n log n), and the point location algorithm needs only O(log n) time, where the Voronoi Diagram has to be computed only once. Note that n is not the total number of nodes in the network but only the number of nodes in the local neighborhood, which is independent of the network size. We concentrate in this paper only on an efficient method for determining the closest neighbor node with respect to a specific destination node. Additionally, we show that each message eventually reaches its destination if the spatial density of network nodes is high in relation to the transmission range. The problem of recovery in sparse networks (because of void regions or ineffective nodes) is not considered in our work. The remainder of our paper is organized as follows: The following Section 2 gives a short overview of some publications that are related to our work. In Section 3 we provide some preliminaries and the basic principles of Voronoi Diagrams. A description of our algorithm is presented in Section 4. Finally, Section 5 concludes the paper. 2 Related Work Routing in ad hoc wireless (sensor) networks has been studied extensively in the last years. A survey and comparison of position-based approaches can be found in [GSB03]. A large number of position-based routing protocols use the greedy forwarding strategy proposed by [Fi87], where only neighbors with a position closer to the destination are considered (e.g, [KK00, FGG04]). 3 Preliminaries and Assumptions 3.1 Network Model We assume that the nodes have negligible difference in altitude, so they can be considered roughly in a plane. 366

A wireless network can be modeled as an undirected communication graph G(S, E) in the plane, with a set of sites S and a set of edges E. Each site s i of the set S := {s 0,...,s N 1 } represents a node of our wireless sensor network. The total number of sites is N = S. An edge (s i,s j ) E, s i,s j S, represents a wireless link of the ad hoc network in G(S, E). An edge (s i,s j ) is present in G(S, E) if and only if (s i,s j ) is less than the common communication range R, where (s i,s j ) denotes the Euclidean distance between s i and s j. The neighborhood of s S, denoted by N (s), is the set of nodes within s s communication range R and the node s itself. Any node s i N(s) is called visible to s, and we assume N (s) n, s S. Note that the number of nodes in the neighborhood is many times smaller than the overall number of nodes in the network: Sensor networks typically have some thousand+ nodes, but the number of neighbors of a specific node is only in the range of ten. 3.2 Basic Principles of Voronoi Diagram Voronoi Diagrams belong to most important structures of computational geometry. Parts of the following definitions are adopted form the work of Aurenhammer [Au91]. Definition 1 (Voronoi Diagram) Set N (s) includes the single-hop neighbors of s and s itself. Let N (s) = n, n n. The Voronoi Diagram of N (s) is the subdivision of the plane into n Voronoi Cells, one for each site s i N(s). A point p lies in the cell corresponding to a site s i,if (p, s i ) < (p, s j ), for all s i,s j N(s),j i. Properties of Voronoi Diagrams: Voronoi Edge: A point p lies on a Voronoi Edge between sites s i and s j iff the largest empty circle centered at p touches only s i and s j. A Voronoi Edge is a subset of locus of points equidistant from s i and s j. Voronoi Vertex: A point p is a Voronoi Vertex iff the largest empty circle centered at p touches at least 3 sites. A Voronoi Vertex is an intersection of three or more Voronoi Edges, each equidistant from a pair of sites. Voronoi Cell: A Voronoi Cell is a (possibly unbounded) convex polygon. The boundary of a Voronoi Cell consists of Voronoi Edges and Voronoi Vertices. The worst-case complexity of computing a Voronoi Diagram for n sites in two dimensions is O(n log n) and the storage requirement is only O(n) [Au91]. An optimal method for the computation of Voronoi Diagrams is Fortune s plane sweep algorithm [Fo87]. One of the most popular problems in the context of Voronoi Diagram is the post-office problem. Given are n sites in the plane (post offices), the problem is to find the site which is closest to a given query point p (the location of a person). Note that there exists a trivial O(n)-time solution by computing all n distances. Voronoi Diagrams offer a more efficient solution for point location: A site s i is closest to p if and only if p falls into the Voronoi Cell of s i. There exist worst-case optimal techniques to perform point location on a Voronoi Diagram, such as the triangulation refinement method due to Kirkpatrick [Ki83], and the bridged chain method due to Edelsbrunner et al. [EGS86]. Point location in a Voronoi Diagram with n regions is possible in O(log n) time and needs O(n) storage. 367

Using any of the optimal Voronoi Diagram algorithms presented above we obtain the following result related to the point location problem. Theorem 1 Given a set of n sites in the plane, one can, within O(n log n) time and linear storage O(n), construct a data structure that supports nearest neighbor queries: For an arbitrary query point p, its nearest neighbor can be found in time O(log n). 4 Greedy forwarding algorithm with Voronoi Diagrams Our algorithm uses Voronoi Diagrams to find the closest neighbor node with regard to a specific destination node. Each node s in our wireless sensor network only knows his own position and the positions of its immediate neighbors s 1...s n 1 N(s). These neighbors are the only nodes with which a node can communicate without using multihop connections. The positions of the neighbors are used to create the local Voronoi Diagram. Figure 1 illustrates the local Voronoi Diagram of node s. The circle with radius R indicates the maximum communication range of s. The local Voronoi Diagram divides the plane into Voronoi Cells and each cell contains all points closer to the site of this cell than to all other sites. When a node wants to forward a message to a destination node, it determines the cell the destination node belongs to (using the point-location algorithm in Section 3.2), and forwards the message to that unique neighbor node that is the site of this cell. If two or more neighbor nodes are equidistant from the destination node, one of the neighbor nodes is either chosen arbitrarily or by some deterministic rule (e.g. node ID). R s Figure 1: Voronoi Diagram of node s 0 In Lemma 1 below, we will show that the greedy routing approach delivers a message reliable to the destination if the network is dense. Definition 2 (Dense Network) A network is called dense if each node s in the network has, for each destination node (that is not a single hop neighbor node), a single hop neighbor which is closer to the destination than node s itself. 368

Lemma 1 In a Dense Network, the greedy forwarding algorithm eventually delivers each message to its destination. Proof: The greedy forwarding algorithm is loop-free in dense networks, because each forwarding step decreases the distance to the destination node: If a node would receive the same message twice, at least one forwarding step had increased the distance to the destination node, which is a contradiction. Hence, each message is eventually delivered to its destination. 5 Conclusion This paper presents a novel implementation of the well known greedy forwarding algorithm. It shows that conjunction of Voronoi Diagrams and the post office problem yield a very efficient solution for position based routing. Further details are provided in [St04], which also shows how to extend this approach for networks that are not dense. References [Au91] Aurenhammer, F.: Voronoi diagrams a survey of a fundamental geometric data structure. ACM Computing Surveys. 23(3):345 405. September 1991. [EGS86] Edelsbrunner, H., Guibas, L. J., und Stolfi, J.: Optimal point location in a monotone subdivision. SIAM Journal on Computing. 15(2):317 340. May 1986. [FGG04] Fang, Q., Gao, J., und Guibas, L. J.: Locating and bypassing routing holes in sensor networks. In: Proceeding of IEEE Infocom. March 2004. [Fi87] Finn, G. G.: Routing and addressing problems in large metropolitan-scale internetworks. Technical Report ISI Research Resport ISI/RR-87-180. Information Sciences Institute, University of Southern California. March 1987. [Fo87] Fortune, S.: A sweepline algorithm for voronoi diagrams. Algorithmica. 2:153 174. 1987. [GSB03] Giordano, S., Stojmenovic, I., und Blazevic, L.: Position based routing algorithms for ad hoc networks: A taxonomy. In: Cheng, X., Huang, X., und Du, D.-Z. (Hrsg.), Ad Hoc Wireless Networking. Kluwer Academic Publisher. 2003. [HB01] Hightower, J. und Borriello, G.: Location systems for ubiquitous computing. IEEE Computer Magazine. 34(8):57 66. August 2001. [Ki83] Kirkpatrick, D. G.: Optimal search in planar subdivisions. SIAM Journal on Computing. 12(1):28 35. February 1983. [KK00] Karp, B. und Kung, H. T.: GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the sixth annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000). S. 243 254. August 2000. [St04] Stratil, H.: Design of a voronoi-aided routing (VAR) protocol for wireless sensor networks. Research Report 15/2004. Technische Universität Wien, Institut für Technische Informatik. Treitlstraße 3, A-1040 Vienna, Austria. 2004. (submitted). 369