Ad hoc and Sensor Networks Topology control

Similar documents
Ad hoc and Sensor Networks Chapter 10: Topology control

Wireless Sensor Networks 22nd Lecture

Ad hoc and Sensor Networks Topology Control

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control

Chapter 7 TOPOLOGY CONTROL

Chapter 8 DOMINATING SETS

Simulations of the quadrilateral-based localization

Chapter 8 DOMINATING SETS

AN AD HOC network consists of a collection of mobile

Chapter 6 DOMINATING SETS

Geographical routing 1

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Geometric Spanners for Routing in Mobile Networks

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Topology Control in Wireless Networks 4/24/06

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Delaunay Triangulation Overlays

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geographic Routing in Simulation: GPSR

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

Localization. References. As the primary function of the wireless sensor networks is to observe the physical world surround

Network monitoring: detecting node failures

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

Outline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties

WSN Routing Protocols

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Networking Sensors, II

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger

TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Connected Dominating Set in Sensor Networks and MANETs

The k-center problem Approximation Algorithms 2009 Petros Potikas

Optimal tour along pubs in the UK

Data Communication. Guaranteed Delivery Based on Memorization

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Prianka.P 1, Thenral 2

Chapter 5 To T pology C o C ntrol

Routing and Topology Control in Ad Hoc & Wireless Sensor Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

Routing in Sensor Networks

6. Concluding Remarks

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Delay Tolerant Networks

Advanced Networking Technologies

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS

A3: A Topology Construction Algorithm for Wireless Sensor Networks

Module 6 NP-Complete Problems and Heuristics

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013

We noticed that the trouble is due to face routing. Can we ignore the real coordinates and use virtual coordinates for routing?

Ad hoc and Sensor Networks Chapter 11: Routing Protocols. Holger Karl

L9: Hierarchical Clustering

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks

An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks

A DISTRIBUTED TOPOLOGY CONTROL ALGORITHM FOR MANETS

Realistic and Efficient Multi-Channel Communications in WSN

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Effects of Optical Network Unit Placement Schemes for Multi-Channel Hybrid Wireless-Optical Broadband-Access Networks

Many-to-Many Communications in HyperCast

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks

Wireless Sensor Networks CS742

Distributed clustering algorithms for data-gathering in wireless mobile sensor networks

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas. Fei Dai, Member, IEEE, and Jie Wu, Senior Member, IEEE

Algorithm 23 works. Instead of a spanning tree, one can use routing.

Multicasting in ad hoc networks: Energy efficient

Module 6 P, NP, NP-Complete Problems and Approximation Algorithms

NETWORK coding is an area that has emerged in 2000 [1],

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Approximation Algorithms

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

Welfare Navigation Using Genetic Algorithm

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Transcription:

Ad hoc and Sensor Networks Topology control

Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling transmission power Deciding which links to use Turning some nodes off Focus is on basic ideas, some algorithms Complexity results are only very superficially covered 2

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity 3

Motivation: Dense networks In a very dense networks, too many nodes might be in range for an efficient operation Too many collisions/too complex operation for a MAC protocol, too many paths to chose from for a routing protocol, Idea: Make topology less complex Topology: Which node is able/allowed to communicate with which other nodes Topology control needs to maintain invariants, e.g., connectivity 4

Options for topology control Topology control Control node activity deliberately turn on/off nodes Control link activity deliberately use/not use certain links Topology control Flat network all nodes have essentially same role Hierarchical network assign different roles to nodes; exploit that to control node/link activity Power control Backbones Clustering 5

Flat networks Main option: Control transmission power Do not always use maximum power Selectively for some links or for a node as a whole Topology looks thinner Less interference, Alternative: Selectively discard some links Usually done by introducing hierarchies 6

Hierarchical networks backbone Construct a backbone network Some nodes control their neighbors they form a (minimal) dominating set Each node should have a controlling neighbor Controlling nodes have to be connected (backbone) Only links within backbone and from backbone to controlled neighbors are used Formally: Given graph G=(V,E), construct D ϵ V such that 7

Hierarchical network clustering Construct clusters Partition nodes into groups ( clusters ) Each node in exactly one group Except for nodes bridging between two or more groups Groups can have clusterheads Typically: all nodes in a cluster are direct neighbors of their clusterhead Clusterheads are also a dominating set, but should be separated from each other they form an independent set Formally: Given graph G=(V,E), construct C ϵ V such that 8

Aspects of topology-control algorithms Connectivity If two nodes connected in G, they have to be connected in G 0 resulting from topology control Stretch factor should be small Hop stretch factor: how much longer are paths in G 0 than in G? Energy stretch factor: how much more energy does the most energy-efficient path need? Throughput removing nodes/links can reduce throughput, by how much? Robustness to mobility Algorithm overhead 9

Average size of the largest component Probability of connectivity Example: Price for maintaining connectivity Maintaining connectivity can be very costly for a power control approach Compare power required for connectivity compared to power required to reach a very big maximum component Maximum component size 5000 Probability of connectivity 1 4000 0,8 3000 0,6 2000 0,4 1000 0,2 0 0 10 15 20 25 30 35 40 Maximum transmission range 10

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity 11

Power control magic numbers? Question: What is a good power level for a node to ensure nice properties of the resulting graph? Idea: Controlling transmission power corresponds to controlling the number of neighbors for a given node Is there an optimal number of neighbors a node should have? Is there a magic number that is good irrespective of the actual graph/network under consideration? Historically, k=6 or k=8 had been suggested as such magic numbers However, they optimize progress per hop they do not guarantee connectivity of the graph!!! Needs deeper analysis 12

Controlling transmission range Assume all nodes have identical transmission range r=r( V ), network covers area A, V nodes, uniformly distr. Fact: Probability of connectivity goes to zero if: Fact: Probability of connectivity goes to 1 for if and only if V! 1 with V Fact (uniform node distribution, density ): 13

Controlling number of neighbors Knowledge about range also tells about number of neighbors Assuming node distribution (and density) is known, e.g., uniform Alternative: directly analyze number of neighbors Assumption: Nodes randomly, uniformly placed, only transmission range is controlled, identical for all nodes, only symmetric links are considered Result: For connected network, required number of neighbors per node is (log V ) It is not a constant, but depends on the number of nodes! For a larger network, nodes need to have more neighbors & larger transmission range! Rather inconvenient Constants can be bounded 14

Some example constructions for power control Basic idea for most of the following methods: Take a graph G=(V,E), produce a graph G 0 =(V,E 0 ) that maintains connectivity with fewer edges Assume, e.g., knowledge about node positions Construction should be local (for distributed implementation) 15

Example 1: Relative Neighborhood Graph (RNG) Edge between nodes u and v if and only if there is no other node w that is closer to either u or v Formally: RNG maintains connectivity of the original graph Easy to compute locally But: Worst-case spanning ratio is ( V ) Average degree is 2.6 This region has to be empty for the two nodes to be connected 16

Example 2: Gabriel graph Gabriel graph (GG) similar to RNG Difference: Smallest circle with nodes u and v on its circumference must only contain node u and v for u and v to be connected Formally: This region has to be empty for the two nodes to be connected Properties: Maintains connectivity, Worst-case spanning ratio ( V 1/2 ), energy stretch O(1) (depending on consumption model!), worst-case degree ( V ) 17

Example 3: Delaunay triangulation Assign, to each node, all points in the plane for which it is the closest node! Voronoi diagram Constructed in O( V log V ) time Connect any two nodes for which the Voronoi regions touch! Delaunay triangulation Problem: Might produce very long links; not well suited for power control Voronoi region for upper left node Edges of Delaunay triangulation 18

Example: Cone-based topology control Assumption: Distance and angle information between nodes is available Two-phase algorithm Phase 1 Every node starts with a small transmission power Increase it until a node has sufficiently many neighbors What is sufficient? When there is at least one neighbor in each cone of angle = 5/6 is necessary and sufficient condition for connectivity! Phase 2 Remove redundant edges: Drop a neighbor w of u if there is a node v of w and u such that sending from u to w directly is less efficient than sending from u via v to w Essentially, a local Gabriel graph construction 19

Example: Cone-based topology control (2) Properties: simple, local construction Extensions for k-connectivity (Yao graph) Little exercise: What happens when < or > 5/6? 20

Centralized power control algorithm Goal: Find topology control algorithm minimizing the maximum power used by any node Ensuring simple or bi-connectivity Assumptions: Locations of all nodes and path loss between all node pairs are known; each node uses an individually set power level to communicate with all its neighbors Idea: Use a centralized, greedy algorithm Initially, all nodes have transmission power 0 Connect those two components with the shortest distance between them (raise transmission power accordingly) Second phase: Remove links (=reduce transmission power) not needed for connectivity Exercise: Relation to Kruskal s MST algorithm? 21

Centralized power control algorithm Topology 1) Connect A-C and B-D 2) Connect A-B E F E F E F 4 4 C 3 1 1 D C 1 1 D C 1 1 D A 2 B A B A 2 B 3) Connect C-D 4) Connect C-E and D-F 5) Remove edge A-B E F E F E F 4 4 4 4 C 3 1 1 D C 3 1 1 D C 3 1 1 D A 2 B A 2 B A B 22

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity 23

Hierarchical networks backbones Idea: Select some nodes from the network/graph to form a backbone A connected, minimal, dominating set (MDS or MCDS) Dominating nodes control their neighbors Protocols like routing are confronted with a simple topology from a simple node, route to the backbone, routing in backbone is simple (few nodes) Problem: MDS is an NP-hard problem Hard to approximate, and even approximations need quite a few messages 24

Backbone by growing a tree Construct the backbone as a tree, grown iteratively 25

Backbone by growing a tree Example 1: 2: 3: 4: 26

Problem: Which gray node to pick? When blindly picking any gray node to turn black, resulting tree can be very bad u u u d......... d......... d......... Solution: Look ahead! One step suffices Lookahead using nodes g and w g v d......... u v d......... u v v=w v 27

Performance of tree growing with look ahead Dominating set obtained by growing a tree with the look ahead heuristic is at most a factor 2(1+ H( )) larger than MDS H( ) harmonic function, H(k) = i=1 k 1/i <= ln k + 1 is maximum degree of the graph It is automatically connected Can be implemented in a distributed fashion as well 28

Start big, make lean Idea: start with some, possibly large, connected dominating set, reduce it by removing unnecessary nodes Initial construction for dominating set All nodes are initially white Mark any node black that has two neighbors that are not neighbors of each other (they might need to be dominated)! Black nodes form a connected dominating set (proof by contradiction); shortest path between ANY two nodes only contains black nodes Needed: Pruning heuristics 29

Pruning heuristics Heuristic 1: Unmark node v if Node v and its neighborhood are included in the neighborhood of some node marked node u (then u will do the domination for v as well) Node v has a smaller unique identifier than u (to break ties) Heuristic 2: Unmark node v if Node v s neighborhood is included in the neighborhood of two marked neighbors u and w Node v has the smallest identifier of the tree nodes Nice and easy, but only linear approximation factor u v w a b c d 30

One more distributed backbone heuristic: Span Construct backbone, but take into account need to carry traffic preserve capacity Means: If two paths could operate without interference in the original graph, they should be present in the reduced graph as well Idea: If the stretch factor (induced by the backbone) becomes too large, more nodes are needed in the backbone Rule: Each node observes traffic around itself If node detects two neighbors that need three hops to communicate with each other, node joins the backbone, shortening the path Contention among potential new backbone nodes handled using random backoff A B C 31

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity 32

Clustering Partition nodes into groups of nodes clusters Many options for details Are there clusterheads? One controller/representative node per cluster May clusterheads be neighbors? If no: clusterheads form an independent set C: Typically: clusterheads form a maximum independent set May clusters overlap? Do they have nodes in common? 33

Clustering Further options How do clusters communicate? Some nodes need to act as gateways between clusters If clusters may not overlap, two nodes need to jointly act as a distributed gateway How many gateways exist between clusters? Are all active, or some standby? What is the maximal diameter of a cluster? If more than 2, then clusterheads are not necessarily a maximum independent set Is there a hierarchy of clusters? 34

Maximum independent set Computing a maximum independent set is NP-complete Can be approximate within ( +3)/5 for small, within O( log log / log ) else; bounded degree Show: A maximum independent set is also a dominating set Maximum independent set not necessarily intuitively desired solution Example: Radial graph, with only (v 0,v i ) 2 E 35

A basic construction idea for independent sets Use some attribute of nodes to break local symmetries Node identifiers, energy reserve, mobility, weighted combinations - matters not for the idea as such (all types of variations have been looked at) Make each node a clusterhead that locally has the largest attribute value Once a node is dominated by a clusterhead, it abstains from local competition, giving other nodes a chance Init: Step 1: Step 2: Step 3: Step 4: 1 2 3 7 6 5 4 1 2 3 7 6 5 4 1 2 3 7 6 5 4 1 2 3 7 6 5 4 1 2 3 7 6 5 4 36

Determining gateways to connect clusters Suppose: Clusterheads have been found How to connect the clusters, how to select gateways? It suffices for each clusterhead to connect to all other clusterheads that are at most three hops Resulting backbone (!) is connected Formally: Steiner tree problem Given: Graph G=(V,E), a subset C ½ V Required: Find another subset T ½ V such that S [ T is connected and S [ T is a cheapest such set Cost metric: number of nodes in T, link cost Here: special case since C are an independent set 37

Rotating clusterheads Serving as a clusterhead can put additional burdens on a node For MAC coordination, routing, Let this duty rotate among various members Periodically reelect useful when energy reserves are used as discriminating attribute LEACH determine an optimal percentage P of nodes to become clusterheads in a network Use 1/P rounds to form a period In each round, np nodes are elected as clusterheads At beginning of round r, node that has not served as clusterhead in this period becomes clusterhead with probability P/(1-p(r mod 1/P)) 38

Multi-hop clusters Clusters with diameters larger than 2 can be useful, e.g., when used for routing protocol support Formally: Extend domination definition to also dominate nodes that are at most d hops away Goal: Find a smallest set D of dominating nodes with this extended definition of dominance Only somewhat complicated heuristics exist Different tilt: Fix the size (not the diameter) of clusters Idea: Use growth budgets amount of nodes that can still be adopted into a cluster, pass this number along with broadcast adoption messages, reduce budget as new nodes are found 39

Passive clustering Constructing a clustering structure brings overheads Not clear whether they can be amortized via improved efficiency Question: Eat cake and have it? Have a clustering structure without any overhead? Maybe not the best structure, and maybe not immediately, but benefits at zero cost are no bad deal! Passive clustering Whenever a broadcast message travels the network, use it to construct clusters on the fly Node to start a broadcast: Initial node Nodes to forward this first packet: Clusterhead Nodes forwarding packets from clusterheads: ordinary/gateway nodes And so on! Clusters will emerge at low overhead 40

Overview Motivation, basics Power control Backbone construction Clustering Adaptive node activity 41

Adaptive node activity Remaining option: Turn some nodes off deliberately Only possible if other nodes remain on that can take over their duties Example duty: Packet forwarding Approach: Geographic Adaptive Fidelity (GAF) Observation: Any two nodes within a square of length r < R/5 1/2 can replace each other with respect to forwarding R radio range Keep only one such node active, let the other sleep r r R 42

Conclusion Various approaches exist to trim the topology of a network to a desired shape Most of them bear some non-negligible overhead At least: Some distributed coordination among neighbors, or they require additional information Constructed structures can turn out to be somewhat brittle overhead might be wasted or even counter-productive Benefits have to be carefully weighted against risks for the particular scenario at hand 43