a random walk based clustering with local re computations
play

A random walk based clustering with local re-computations for mobile - PowerPoint PPT Presentation

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives A random walk based clustering with local re-computations for mobile ad hoc networks Kudireti ABDURUSUL Alain BUI


  1. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives A random walk based clustering with local re-computations for mobile ad hoc networks Kudireti ABDURUSUL ⋆ Alain BUI † Devan SOHIER † ⋆ SysCom, CReSTIC Université de Reims Champagne-Ardenne, France † PRiSM (UMR CNRS 8144) Université de Versailles St-Quentin-en-Yvelines Kudireti Abdurusul (CReSTIC) RWCMA 1 / 23

  2. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Plan Introduction 1 Algorithm 2 Example execution of the algorithm 3 Properties 4 Simulation results 5 Conclusion and perspectives 6 Kudireti Abdurusul (CReSTIC) RWCMA 2 / 23

  3. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Context and Related Works MANETs Decentralized wireless networks. Arbitrary Movement . Motivation Large computer networks : dividing them into several disjoint connected parts. Managed separately and be coordinated. Kudireti Abdurusul (CReSTIC) RWCMA 3 / 23

  4. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Context and Related Works Related Works 1-hop : each node in the network is the neighbor of its clusterhead . ( eg. LCA (LCA2), DMAC, GDMAC). K-hop : any node in any cluster is at most k hops away from its clusterhead ( eg. Max-min D-hop-cluster , hierarchical clustering) Model and hypotheses Model : an asynchronous message-passing model Hypotheses Connected network Unique identifier Link bidirectional Detection of Link failure Kudireti Abdurusul (CReSTIC) RWCMA 4 / 23

  5. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Context and Related Works Random walk based distributed Random walks scheme algorithm An algorithm involving a particular message, the token , that circulates according to a random walk scheme 1/3 At each step, a node possesses the 1/3 token 1/3 Transmission: choose one neighbor at random, and send the token to it Properties of random walks: Hitting Meeting Kudireti Abdurusul (CReSTIC) RWCMA 5 / 23

  6. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Context and Related Works Random walk based distributed Random walks scheme algorithm An algorithm involving a particular 1/4 1/4 message, the token , that circulates 1/4 1/4 according to a random walk scheme At each step, a node possesses the token Transmission: choose one neighbor at random, and send the token to it Properties of random walks: Hitting Meeting Kudireti Abdurusul (CReSTIC) RWCMA 5 / 23

  7. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Context and Related Works Random walk based distributed Random walks scheme algorithm An algorithm involving a particular message, the token , that circulates according to a random walk scheme At each step, a node possesses the token 1/3 1/3 Transmission: choose one neighbor at random, and send the 1/3 token to it Properties of random walks: Hitting Meeting Kudireti Abdurusul (CReSTIC) RWCMA 5 / 23

  8. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Principle Our cluster A distributed clustering algorithm based on random walks Core Construction Cluster core Ordinary nodes Core neighbors MaxCoreSize Complete cluster and Incomplete cluster Kudireti Abdurusul (CReSTIC) RWCMA 6 / 23

  9. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Algorithm and Messages Token message On reception of Token message Join procedure Transmit the token 1 3 2 Send the Token back 4 Delete message Kudireti Abdurusul (CReSTIC) RWCMA 7 / 23

  10. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Algorithm and Messages Token message On reception of Token message Join procedure Transmit the token IDdes = 2 1 3 2 Send the Token back 4 Delete message Kudireti Abdurusul (CReSTIC) RWCMA 7 / 23

  11. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Algorithm and Messages Token message On reception of Token message Join procedure Transmit the token 1 3 2 Send the Token back Node 1 timer expired send out the token 4 Delete message Kudireti Abdurusul (CReSTIC) RWCMA 7 / 23

  12. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Algorithm and Messages Token message On reception of Token message Join procedure Transmit the token 1 3 2 Send the Token back Pgreen < Pblue 4 Delete message Kudireti Abdurusul (CReSTIC) RWCMA 7 / 23

  13. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Algorithm and Messages Token message Delete message On reception of Delete message if P r = P e then Broadcast Delete ( P r , O r ) 1 3 2 message, isCore = false , reset timer 4 Kudireti Abdurusul (CReSTIC) RWCMA 8 / 23

  14. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Algorithm and Messages Token message Delete message On reception of Delete message if P r = P e then Broadcast Delete ( P r , O r ) 1 3 2 message, isCore = false , reset timer 4 Kudireti Abdurusul (CReSTIC) RWCMA 8 / 23

  15. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Algorithm and Messages Link failure On detecting a link ( i , j ) ∈ E failure on node i if ( i , j ) ∈ Core ∧ isCore i = true then 1 3 2 Delete procedure 4 re-initialization if isCore i = false re-initialization Kudireti Abdurusul (CReSTIC) RWCMA 9 / 23

  16. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Algorithm and Messages Link failure On detecting a link ( i , j ) ∈ E failure on node i if ( i , j ) ∈ Core ∧ isCore i = true then 1 3 2 Delete procedure 4 re-initialization if isCore i = false re-initialization Kudireti Abdurusul (CReSTIC) RWCMA 9 / 23

  17. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Example execution of the algorithm Ad-hoc network with 11 nodes 3 1 4 9 5 7 8 11 6 2 10 Kudireti Abdurusul (CReSTIC) RWCMA 10 / 23

  18. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Example execution of the algorithm The modeling of this ad hoc network of ( MaxCoreSize = 3) 3 1 4 9 5 7 8 11 6 2 10 Kudireti Abdurusul (CReSTIC) RWCMA 10 / 23

  19. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Example execution of the algorithm Second state Timer Expiration 3 P=1, K=1 1 4 Core nodes 9 Timer Expiration P=7, K=1 5 7 Ordinary nodes 8 11 Token to Destination node 6 2 Delete message 10 Kudireti Abdurusul (CReSTIC) RWCMA 11 / 23

  20. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Example execution of the algorithm Second state 3 P=1, K=2 1 4 Core nodes 9 P=7, K=2 5 7 Ordinary nodes 8 11 Token to Destination node 6 2 Delete message 10 Kudireti Abdurusul (CReSTIC) RWCMA 11 / 23

  21. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Example execution of the algorithm Third state 3 1 4 Core nodes 9 P=1 < P=7 Delete Procedure in the red cluster 5 7 Ordinary nodes 8 11 Token to Destination node 6 2 Delete message 10 Kudireti Abdurusul (CReSTIC) RWCMA 12 / 23

  22. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Example execution of the algorithm Fourth state 3 1 4 Core nodes 9 Detecting Link Failure 5 7 Ordinary nodes 8 11 Token to Destination node 6 Timer Expiration 2 Delete message 10 Kudireti Abdurusul (CReSTIC) RWCMA 13 / 23

  23. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Example execution of the algorithm Fifth state 3 1 4 Core nodes 9 Delete Procedure in the green cluster 5 7 Ordinary nodes 8 11 Token to Destination node 6 2 Delete message 10 Kudireti Abdurusul (CReSTIC) RWCMA 14 / 23

  24. Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives Example execution of the algorithm Steady state 3 1 Local Re−clustering 4 Core nodes 9 Ordinary nodes 5 7 8 11 Token to Destination node 6 2 Delete message 10 Result 2 clusters with MaxCoreSize = 3 Kudireti Abdurusul (CReSTIC) RWCMA 15 / 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend