connectivity and coverage problems in emerging networks
play

Connectivity and Coverage Problems in Emerging Networks Arun Sen - PowerPoint PPT Presentation

Connectivity and Coverage Problems in Emerging Networks Arun Sen Computer Science & Engineering Program School of Computing, Informatics and Decision Systems Engineering Arizona State University Joint Aerial Layer Network Efforts are


  1. Rectangle Coverage with Circles - Strategy 2 • Largest rectangle ( a × b ) with aspect ratio L ac W ac from the disc ! "# of radius r c ( a b = L ac W ac ) • Use rectangles to cover the $ "# rectangular region L ac × W ac . √ L 2 ac + W 2 • m � � × = ac 4 r o cos π √ n L 2 ac + W 2 � � ac 4 r o cos π n � L 2 ac + W 2 � 2 × n ac minimize mn = � (1) 4 r o cos π n � r 2 s − r 2 o ≥ H ac subject to : h c = (2) Region-based faults – p. 3/3

  2. Effect of variation of r s on r o and n #$$ '$ ! "# $%$&''($) "# $%$&*'($+ "# $%$&' ! "# $%$&''($) "# $%$*'($+ "# $%$&' )*'+*,-./#/012,3*45, *+(,+-./0#0123-4+56- )*'+*,-./!/012,3*45, *+(,+-./0!0123-4+56- "$ !"$ ' 6 ( 7 8 7 &$ !$$ %$ #$ "$ !$ $ $ !" #$ #" %$ %" &$ ( ) !" #$ #" %$ %" &$ ' ( ($ ! "# $%$&''($) "# $%$&''($* "# $%$&' +,-./012. ) 3 '$ 4 &$ #$ $ !" #$ #" %$ %" &$ ) * Region-based faults – p. 6/19

  3. Effect of variation of H ac on r o and n (# $!# , *+ -.-"##/-0 *+ -.-1#/-2 3 -.-$# ) '( *+*"##,*- '( *+*".#,*/ 0 *+*$# 452*5678-$-9:;6+5<=6 $## 12/'2345*$*6783(29:3 '# 452*5678-"-9:;6+5<=6 2 > 12/'2345*"*6783(29:3 "!# ? / ; &# < "## $# !# # # ! "# "! $# $! %# %! ! "# "! $# $! %# %! ) *+ & '( "$# , *+ -.-"##/-0 *+ -.-"##/-1 2 -.-$# "## -5678+9:;8 (# 1 3 4 '# &# $# # ! "# "! $# $! %# %! ) *+ Region-based faults – p. 7/19

  4. Observation 1 • Increase in r s results in increase in r o and decrease in mn for both the strategies. • Intuitive - as the radius of the coverage sphere increases, the radius of the circular orbit of the ANPs will increase and the total number of ANPs needed to cover the entire air corridor will decrease. • When r s is too small compared to H ac , there may not be a feasible solution. Region-based faults – p. 2/5

  5. Observation 2 • Increase in H ac results in decrease in r o and increase in mn for both the strategies. • Intuitive - as the height of the air corridor increases, the radius of the circular orbit of the ANPs has to decrease. • Consequently, the total number of ANPs needed to cover the entire air corridor must increase. Region-based faults – p. 3/5

  6. Observation 3 • Number of ANPs in an orbit remains a constant ( n = 5 ) irrespective of changes in L ac , W ac , H ac and r s . • This is because the factor n/cos 2 ( π n ) , present in the objective function, reaches its minimum at n = 5 . !' !& ()*+,- ! . ! *(/ %' %& ' ! " # $ %& %! %" %# %$ !& ( Region-based faults – p. 4/5

  7. Observation 4 • The cost of the solution (i.e., the number of ANPs needed to provide complete coverage of the air corridor) using strategy 1 is less than that of strategy 2 • Explanation - by comparison of the objective functions of the strategies. Region-based faults – p. 5/5

  8. ! Architecture and Algorithms for an Airborne Network � � How to solve the Connected Coverage Problem? � � A two phase approach � � Phase 1: Find out the minimum number of ANPs required to provide radio coverage in the air corridor at all times. � � Phase 2: Find out the minimum transmission range required by the ANPs to form a backbone network that remains connected at all times.

  9. Robust Network Design - Connectivity and Beyond Consider n nodes (SSying platforms) in an m -dimensional space � m (for AN scenario m = 3 ) x i ( t ) ∈ � m denotes the coordinates of the node i at time t , where by convention x i is considered an m × 1 column vector, and by n ( t )] T , the mn vector resulting from stacking the x ( t ) = [ x T 1 ( t ) , . . . , x T coordinates of the nodes in a single vector The dynamics of node i (for all i ∈ { 1 , 2 , . . . , n } ), is given by x i ( t ) = u i ( t ) , where u i ( t ) is the control vector taking values in some ˙ set U ⊆ � m Region-based faults – p. 2/5

  10. Robust Network Design - Connectivity and Beyond In vector notation, the system dynamics become x ( t ) = u ( t ) ˙ n u ( t )] T are n ( t )] T , u ( t ) = [ u T x T x T 1 ( t ) , . . . , u T where ˙ x ( t ) = [ ˙ 1 ( t ) , . . . , ˙ mn × 1 vectors, respectively. The network of flying platforms described by the system dynamics, gives rise to a dynamic graph G ( x ( t )) G ( x ( t )) = ( V , E ( x ( t ))) is a dynamic graph consisting of • a set of nodes V = { 1 , . . . , n } indexed by the set of flying platforms, and • a set of edges E ( x ( t )) = { ( i, j ) | d ij ( x ( t )) < δ } with d ij ( x ( t )) = � x i ( t ) − x j ( t ) � as the Euclidean distance between the platforms i and j and δ > 0 is a constant. Region-based faults – p. 3/5

  11. Robust Network Design - Connectivity and Beyond Can we control the motion of the ANPs so that G ( x ( t )) retains graph-theoretic properties of interest P for all time t > 0 ? Often times the property P will correspond to the requirement that the graph G remains connected at all times. Formally the problem can be stated as follows: Given C n,P , the set of all graphs on n nodes with property P , is it possible to � nd a control law u ( t ) such that if G ( x (0)) ∈ C n,P then G ( x ( t )) ∈ C n,P for all t ≥ 0 ? Alternately, given the movement pattern of the platforms (location, SSight path, velocity), we may want to know the minimum transmission range of the on-board transceivers so that the resulting network is always connected. Region-based faults – p. 4/5

  12. Robust Network Design - Connectivity and Beyond Mobility Pattern for Connected Dynamic Graph (MPCDG): This problem has five controlling parameters: (i) a set of points { p 1 , p 2 , . . . , p n } on a two dimensional space (representing the centers of circular flight paths of the platforms), (ii) a set of radii { r 1 , r 2 , . . . , r n } representing the radii of circular flight paths, (iii) a set of points { l 1 , l 2 , . . . , l n } representing the initial locations (i.e., locations at time t = 0 ) of the platforms on the circular flight paths, (iv) a set of velocities { v 1 , v 2 , . . . , v n } representing the speeds of the platforms, and (v) transmission range T r of the transceivers on the airborne platforms. Region-based faults – p. 5/5

  13. Robust Network Design - Connectivity and Beyond y c i • r i ( t ) � • c j s ij ( t ) � i • � r j ( t ) � R i ( t ) r c i � r c j � • j θ i ( t ) � R j ( t ) α c i θ j ( t ) α c j x O Region-based faults – p. 2/2

  14. y c i • � r i ( t ) • c j s ij ( t ) � i • � r j ( t ) � R i ( t ) r c i � r c j � • j θ i ( t ) � R j ( t ) α c i θ j ( t ) α c j x O R j ( t )) 2 = R 2 ij ( t ) = ( � R i ( t ) − � j ( t ) − 2 � R i ( t ) · � s 2 i ( t ) + R 2 R j ( t ) Region-based faults – p. 16/19

  15. y i (0) • β i � c i • R i (0) r c i � θ i (0) α c i x O R i (0) cos θ i (0) − r ci cos α ci tan β i = R i (0) sin θ i (0) − r ci sin α ci Region-based faults – p. 17/19

  16. • Condition for having a link between nodes i and j s ij ( t ) ≤ D Region-based faults – p. 18/19

  17. • Condition for having a link between nodes i and j s ij ( t ) ≤ D • Expression for s ij ( t ) s 2 ij ( t ) = r 2 c i + r 2 i + 2 r c i r i cos( β i + ω i t ) + r 2 c j + r 2 j + 2 r c j r j cos( β j + ω j t ) + r c i r c j cos α c i c j + r i r j cos( β ij + ( ω i − ω j ) t ) + r c i r j cos( α c i − β j − ω j t ) + r c j r i cos( α c j − β i − ω i t ) (4) Region-based faults – p. 18/19

  18. Distance between i and j as a function of time - links being active and inactive 25 Edge exists between i and j No edge between i and j 25 Distance Between Nodes i and j D = 24 20 Distance between nodes i and j 20 D = 18 15 15 10 10 5 5 D = 4 0 0 0 50 100 150 200 250 300 350 400 450 500 0 50 100 150 200 250 300 350 400 450 500 Time Time • For D = 4 : the link i − j never exists • For D = 24 : the link i − j always existss Region-based faults – p. 19/19

  19. !"#$%&'#&("')*+,)!-./"%&$01)2/")*+)!%"3/"+')4'&5/"6 ) � � )) 7$'#6%+.)2/")#/++'#89%&:)/2)&$'),:+*0%#) ))))))."*;$)2/"0',)3:)&$')!%"3/"+')4'&5/"6%+.) ))))))<-*=/"01>)5$'+)&$':)*"')0/9%+.)*&)*)1;'#%?',) ))))))1;'',@) � � ))A%2'80')/2)*)-%+6)#*+)3');"'#%1'-:)#/0;(&',)) ))))))(1%+.)&$')&'#$+%B(')1;'#%?',)'*"-%'"@) � � ))C"/0)-%2'80')/2)'*#$)-%+6>)#/++'#89%&:)/2)&$') )))))),:+*0%#)."*;$)#*+)3')#/0;(&',@)

  20. !"#$%&'#&("')*+,)!-./"%&$01)2/")*+)!%"3/"+')4'&5/"6 ) Links Alive Links Dead Link 1: Link 2: Link 3: Timeline 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

  21. $ Architecture and Algorithms for an Airborne Netw !"# Visualization of Flight Paths of Airborne Networking Platforms and its relationship with Topology Change of the Dynamic Graph formed by an Airborne Network

  22. Mobile Network of Airborne Platforms � � Mobility Models � � Predictable Well-structured Flight Paths � � Predictable Ill-structured Flight Paths � � Unpredictable Flight Paths

  23. Airline Route Maps Route Map – Continental United States Route Map – North and South Americas Transatlantic Route Map

  24. Airline Route Maps Route Map – North and South Americas

  25. Airborne Network Route Map – North and South Americas

  26. A Day in the Life of Air Traffic over the United States

  27. Predictable Ill Structured Flight Path

  28. Unpredictable Flight Path

  29. Network without Infrastructure - Unpredictable Flight Path Initial Distribution: The ANPs are distributed uniformly over the deployment region. Relationship between transmission range ( c n ) and number of nodes ( n ) can be calculated using theoretical results in the literature. Let us consider a random graph G n ( x ) , which is constructed on independent random points U 1 , . . . , U n distributed uniformly on [0 , 1] d , d ≥ 1 , in which two distinct such points are joined by an edge if the l ∞ distance between them is at most some prescribed value 0 < x < 1 . Region-based faults – p. 1/5

  30. Appel and Russo’s Result Proposition: For each n and x , { c n ≤ x } = { G n ( x ) is connected } Theorem: n � � c d lim = 1 , if d = 1 n log n n →∞ 1 = 2 d, if d ≥ 2 Region-based faults – p. 2/5

  31. Unpredictable Flight Path - Mo- bility Model Mobility Model: • Modified Random Way Point model. • Time domain is divided into equal intervals. • Select randomly a value within a specified range for displacement along x -axis and y -axis. • For each node randomly select the directions for both dimensions, i.e. East/West for x dimension and North/South for y dimension. • If the corresponding destination falls outside the deployment region for either dimension, bounce back with the excess amount. • Reach destination at the end of the time interval. Region-based faults – p. 3/5

  32. Unpredictable Flight Path - Dis- tribution after Movements How does the mobility of the nodes effect the distribution? X 1 , X 2 - random variables representing the x and y co-ordinates of a point over a unit square before movement (uniform distribution). Y 1 , Y 2 - random variables representing the x and y co-ordinates of a point over a unit square after movement. It can be derived that: F Y 1 Y 2 ( y 1 , y 2 ) = y 1 y 2 ∂ 2 � � f Y 1 Y 2 ( y 1 , y 2 ) = F Y 1 Y 2 ( y 1 , y 2 ) = 1 ∂ y 1 ∂ y 2 Therefore, distribution of nodes remain uniform and results derived for uniformly distributed static nodes can be used for the mobile airborne networks as well. Region-based faults – p. 4/5

  33. ! Architecture and Algorithms for an Airborne Network Path Switching and Routing Problem � � Flying ANPs result in change in the backbone network topology � � A path established between a source-destination node pair may not last for the entire duration of communication � � In order to complete communication, paths may have to be switched

  34. ! Architecture and Algorithms for an Airborne Network Path Switching and Routing Problem � � Path switching has associated overhead and is undesirable � � Communication has to complete with as few path switching as possible � � Minimum Path Switch Routing Algorithm

  35. ! Architecture and Algorithms for an Airborne Network Path (Channel) Diversity � � Quality of links may depend on various factors (mobility, atmospheric condition, jamming) � � Multi-channel communication � � Two channel (high and low) communication model � � Possibilities � � High and Low quality channels exists on a link � � Low quality channel exists on a link � � No

  36. ! Architecture and Algorithms for an Airborne Network Routing performance in diverse networking conditions

  37. ! Architecture and Algorithms for an Airborne Network Routing performance in diverse networking conditions Option 1: P 2 � P 1 � P 2 � P 3 � P 4 � P 5 Option 2: P 5 � P 6 � P 4 � P 5 � P 6

  38. 5"164)+7$)8".9+:$4(/#+;+!"##$%&'()*+,#-+<$*"#- ! • � =$).(%+>".+?,62)@)"2$.,#%$+;+!"##$%&'()*+">+)A$+/.,BA+(4+ 646,22*+),9$#+,4+)A$+3$).(%+">+>,62)@)"2$.,#%$C+D>+)A$+ %"##$%&'()*+">+)A$+/.,BA+(4+9EFG+)A$#+()+%,#+)"2$.,)$+9+ >,62)4C+ • � H(3(),&"#+">+!"##$%&'()*+,4+,+3$).(%+>".+>,62)+)"2$.,#%$+ – � ?,(24+)"+%,B)6.$+,#*+#"&"#+">+2"%,2()*+">+>,62)4+ – � 0,.&%62,.2*+(3B".),#)+(#+4"3$+4%$#,.("4+8A$.$+>,62)4+ ,.$+9#"8#+)"+1$+2"%,2(I$-+J1,K2$L$2-G+'(.64+ B."B,/,&"#G+4"%(,2+%"A$4('$#$44M+

  39. 5"164)+7$)8".9+:$4(/#+;+!"##$%&'()*+,#-+<$*"#- + N(#/2$+5$/("#+?,62)+="-$2+J45?=M+ =62&B2$+5$/("#+?,62)+="-$2+35?=M+ 0."1,1(2(4&%+?,62)+="-$2O+0."1,1(2()*+ ">+>,(26.$+(4+(#'$.4$2*+B."B".&"#,2+ )"+)A$+-(4),#%$+>."3+)A$+$B(%$#)$.++ ,K,%9C+

  40. 5$/("#@1,4$-+!"##$%&'()*+(#+45?= ! • � PA,)+(4+,+5$/("#Q+ • � =,#*+B"44(12$+-$L#(&"#4+">+,+5$/("#+ – � R"B"2"/(%,2+-$L#(&"#+ • � S+461@/.,BA+">+-(,3$)$.+-+ – � T$"3$).(%,2+-$L#(&"#+ • � S+%(.%2$+">+-(,3$)$.+-+ • � 5$/("#@1,4$-+%"##$%&'()*+ ! " J # M+J8()A+ .$4B$%)+)"+)A$+2,*"6)+">+,+/.,BA+TM+ – � U $ % &'&$ ( V+(4+)A$+4$)+">+,22+B"44(12$+%(.%62,.+.$/("#4+ – � ) W * X+(#-(%,)$4+)A$+3(#(363+#631$.+">+#"-$4+(#+ 5$/("#+ $ * G+8A"4$+>,(26.$+8(22+-(4%"##$%)+T+ – �

  41. :(Y$.$#%$+1$)8$$#+!"##$%&'()*+,#-++ 5$/("#@1,4$-+!"##$%&'()* !

  42. 0"8$.+N,'(#/+8()A+5$/("#@1,4$-+!"##$%&'()* ! 6+ '+ @+:$4(/#+.$Z6(.$3$#)O++R"2$.,)$+>,(26.$+">+6B+)"+[+#"-$4+++++++++++++++++++++++++++++ @ � +\#"82$-/$O++?,62)4+,.$+%"#L#$-+)"+,+%(.%62,.+.$/("#+8()A+-(,3$)$.+]3++++++ @ � +N"26&"#O++N$)+)A$+).,#43(44("#+.,#/$+)"+F^3C+S2)A"6/A+)A(4+.$462)4+(#+,+ #$)8".9+8()A+%"##$%&'()*+[+J>,(26.$+">+6+,#-+'+%,#+-(4%"##$%)+)A$+ #$)8".9MG+()+(4+46_%($#)+)"+.$,2(I$+)A$+-$4(/#+/",24 + ,4+)A$+-(4)J6G'M+`+]3G+ )A$*+%,##")+>,(2+4(362),#$"642*C+

  43. 0"8$.+N,'(#/+8()A+5$/("#@1,4$-+!"##$%&'()* ! 6+ '+ @ � 0"8$.+N,'(#/O++RA$+%"#'$#&"#,2+4"26&"#+)"+)"2$.,)$+[+>,62)4G+(4+)"+-$4(/#+ ,+#$)8".9+8()A+%"##$%&'()*+aC++?".+)A$+#$)8".9+)"+A,'$+%"##$%&'()*+aG+ ).,#43(44("#+>."3+)A$+#"-$+1+364)+.$,%A+)A$+#"-$+AC+D#+)A(4+%,4$G+)A$+ ).,#43(44("#+.,#/$+364)+1$+FbCa+3$)$.4+(#4)$,-+">+F^+3$)$.4C++N(#%$+ B"8$.+%"#463B&"#+(4+,BB."c(3,)$2*+B."B".&"#,2+)"+)A$+4Z6,.$+">+)A$+ ).,#43(44("#+.,#/$G+)A$+B"8$.+%"#463B&"#+8(22+(#%.$,4$+1*+#$,.2*+[^^dC+ @ � +RA$+(#%.$,4$-+B"8$.+%"#463B&"#+-"$4+#")+$#A,#%$+)A$+>,62)@)"2$.,#%$+ %,B,1(2()*+">+)A$+#$)8".9C++

  44. 0"8$.+N,'(#/+8()A+5$/("#@1,4$-+!"##$%&'()* ! • � e6$4&"#O+D4+4614),#&,2+B"8$.+4,'(#/+B"44(12$+"#2*+(#+ B,)A"2"/(%,2+%,4$4G+,4+)A$+"#$+4A"8#+$,.2($.G+".+()+(4+).6$+(#+ 3".$+/$#$.,2+%,4$4Q+ • � S#48$.O+P$+6#-$.)""9+$c)$#4('$+4(362,&"#+)"+L#-+,#+ ,#48$.+)"+)A,)+Z6$4&"#C+N(362,&"#+.$462)4+4A"8$-+)A,)+(#+ ,22+%,4$4G+-$4(/#+8()A+)A$+.$/("#@1,4$-+%"##$%&'()*+3$).(%+ (4+,28,*4+1$K$.+)A,#+".+,)+2$,4)+,4+/""-+,4+)A$+-$4(/#+8()A+ )A$+%"##$%&'()*+3$).(%+6#-$.+)A$+.$/("#@1,4$-+>,62)+ 3"-$2C+ • � f14$.',&"#O+S2)A"6/A+)A$+%"4)+$Y$%&'$#$44+">+>,62)@ )"2$.,#)++#$)8".9+-$4(/#+8()A+.$/("#@1,4$-+%"##$%&'()*+(4+ 4A"8#+(#+,+8(.$2$44+#$)8".9G+4(3(2,.+,./63$#)4+A"2-+>".+ 8(.$-+#$)8".94+,4+8$22C++

  45. N(362,&"#+gcB$.(3$#)4 ! • � !"3B,.$+)A$+).,#43(44("#+.,#/$+.$Z6(.$-+)"+ $#46.$+)A$+-$4(.$-+%"##$%&'()*+8()A+)A$+ ).,#43(44("#+.,#/$+.$Z6(.$-+)"+$#46.$+)A$+ -$4(.$-+.$/("#@1,4$-+%"##$%&'()*+(#+ -(Y$.$#)+$cB$.(3$#),2+4$h#/+ – � i,.*(#/+)A$+#631$.+">+#"-$4+#+ – � i,.*(#/+)A$+.$/("#+-(,3$)$.+-+ – � i,.*(#/+)A$+-$4(.$-+%"##$%&'()*+".+.$/("#@1,4$-+ %"##$%&'()*+9 +

  46. N(362,&"#+5$462)4+;+',.*(#/+9 ! #+j+F^^G+-+j+Fk^+ #+j+F^^G+-+j+F^^+

  47. 5$/("#@1,4$-+!"##$%&'()*+(#+35?=++ ! • � 5$/("#@1,4$-+%"##$%&'()*+(4+)A$+3(#(363+#631$.+">+ .$/("#4+8A"4$+.$3"',2+-(4%"##$%)4+)A$+/.,BAC++ • � 5$/("#@!6)+1$)8$$#+#"-$4+4+,#-+)O+=(#(363+#631$.+ ">+.$/("#4+8A"4$+.$3"',2+-(4%"##$%)4+)A$+#"-$4+4+ ,#-+)C+ • � 5$/("#@-(4l"(#)+0,)A4O+R8"+B,)A4+0 F +,#-+0 [ +%"##$%&#/+ #"-$4+4+,#-+)+,.$+4,(-+)"+1$+.$/("#@-(4l"(#)+(>+)A$+ .$/("#4+,44"%(,)$-+8()A+)A$+(#)$.3$-(,)$+#"-$4+">+0 F + ,#-+)A$+.$/("#4+,44"%(,)$-+8()A+)A$+(#)$.3$-(,)$+ #"-$4+">+0 [ ++,.$+-(4&#%)C+

  48. 5$/("#@1,4$-+!"##$%&'()*+(#+35?=+ ! =$#/$.m4+RA$".$3+JFn[bMO++RA$++ 3(#(363+#631$.+">+#"-$4+ 8A"4$+.$3"',2+-(4%"##$%)4++ )A$+#"-$4+4+,#-+)+(4+$Z6,2+)"++ )A$+3,c(363+#631$.+">++ #"-$@-(4l"(#)+B,)A4+1$)8$$#++ )A$+#"-$4+4+,#-+)C+ D3B".),#)oD#)$.$4&#/+e6$4&"#O+:"$4+=$#/$.m4+RA$".$3+ +A"2-+>".+.$/("#@-(4l"(#)+B,)A4Q+ D#+")A$.+8".-4O++D4+)A$+3(#(363+#631$.+">+.$/("#4+8A"4$+ +.$3"',2+-(4%"##$%)4++)A$+#"-$4+4+,#-+)G+$Z6,2+)"+)A$++ 3,c(363+#631$.+">+.$/("#@-(4l"(#)+B,)A4+1$)8$$#+)A$++ #"-$4+4+,#-+)Q+

  49. 5$/("#@1,4$-+!"##$%&'()*+(#+35?=+ ! S#48$.+8()A+R"B"2"/(%,2+:$L#(&"#O+7"+ gc,3B2$O+5$/("#+(4+,+461/.,BA+">++ :(,3$)$.+FC+ 5$/("#+!6)+1$)8$$#+)A$+#"-$4+4+,#-+)+j+[+ 5$/("#@-(4l"(#)+B,)A4+1$)8$$#+4+,#-+)+j+F+ S#48$.+8()A+T$"3$).(%+:$L#(&"#O+7"+ gc,3B2$O+5$/("#+(4+,+%(.%62,.+,.$,+">++ -(,3$)$.++k+3(2$4C+ 5$/("#+!6)+1$)8$$#+)A$+#"-$4+4+,#-+)+j+[+ 5$/("#@-(4l"(#)+B,)A4+1$)8$$#+4+,#-+)+j+F+

  50. + 5"164)+7$)8".9+:$4(/#+;+!"##$%&'()*+,#-+<$*"#- Further limitations of Connectivity as the metric of fault-tolerance � � It does not capture the number or the size of the connected components in which the network disintegrates when the number of failed nodes exceeds the connectivity of the network . Connectivity is 1 for both the graphs. However, in one case, after failure of one node, one large connected component is guaranteed to exist. No such guarantee can be given in the other case. � � Our solution: Region-based Component Decomposition Number

  51. + 5"164)+7$)8".9+:$4(/#+;+!"##$%&'()*+,#-+<$*"#- Objectives of our study � � How to design a network that will be k region-based fault tolerant under single/multi-region fault model? � � How to design a network whose RBCDN is at most k? � � How to design a network whose RBSCS (or RBLCS) is at least k? � � How to design a network that ensures that the key nodes retains a specified structural property (large connectivity, small diameter) under single/multi-region fault model? � � How to design a multi-layer network so that impact of failures in one layer i (say, layer 1) can be mitigated by resources in layer j?

  52. Visualization of Airborne Networks Visualization of Airborne Networks ANPs in Reality Region-based faults – p. 2/2

  53. Specification of ANPs • The STS-111 is an unmanned Mid Altitude Long Endurance UAV and is designed to carry crucial communications technology, provide persistent surveillance capabilities and work in tandem with other UAVs. • Multi-layered communications software package that enables multi-vehicle IP-based messaging (TCP/IP , UDP) over line-of-sight (LOS) or beyond-line-of-sight (BLOS*) communication channels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egion-based faults – p. 2/2

  54. Backbone Network Design in Presence of Faults • Earlier, we presented algorithms to compute the minimum transmission range of the airborne transceivers so that the backbone network remains connected at all times. • This transmission range ensures a time-invariant property (connectivity) of a time-varying network topology. • Our earlier results did not consider impact of an attack on an airborne network. • Our current results provide an algorithm to compute the minimum transmission range of the airborne transceivers so that the backbone network remains connected at all times in spite of failure of several airborne nodes due to an attack. Region-based faults – p. 2/2

  55. Visualization of Airborne Network with Fault Region-based faults – p. 2/2

  56. Previous Result • We considered a similar scenario in an Infocom 2006 paper where the nodes are stationary • We extended these results to fit in a Airborne Network scenario where nodes are mobile • Mobility of the nodes increases the complexity of the problem significantly. Region-based faults – p. 2/16

  57. Previous Result (cont’d) • Infinite number of points can potentially be centers of fault regions. • However, it is sufficient to consider only O ( n 2 ) points as centers of fault regions (Sen et al. - Infocom 2006). & %#$ ( # $ !"$ !"# ' %#$ Vulnerability Zone ( V Z i ): Circular area of radius R centered at node i I-points: The intersections of two vulnerability zones of two different nodes. If VZ of one node does not intersect with any other VZ, then the location of the node is considered as an I-point. Region-based faults – p. 3/16

  58. Previous Result (cont’d) Computation of Region-Based Connectivity *%&&"*+",'*%-)%&"&+'. *%&&"*+",'*%-)%&"&+'/ !"#$%&'() *%&&"*+",'*%-)%&"&+'0 • Algorithm computes, for each region, the minimum number of nodes inside the region whose removal will disconnect the graph • The objective is to find the minimum transmission range so that graph remains connected even after the failure of all the nodes in any of the regions. • Required information: 1. Time-varying network topology without faults in every time slot (interval) 2. Nodes within each fault region in every time slot (interval) Region-based faults – p. 4/16

  59. Computation of time-varying network topology without faults in every time slot (interval) Region-based faults – p. 5/16

  60. Time-varying Distance Between a Pair of Nodes y c i • r i ( t ) � • c j s ij ( t ) � i • � r j ( t ) � R i ( t ) r c i � r c j � • j θ i ( t ) � R j ( t ) α c i θ j ( t ) α c j x O R j ( t )) 2 = R 2 ij ( t ) = ( � R i ( t ) − � j ( t ) − 2 � R i ( t ) · � s 2 i ( t ) + R 2 R j ( t ) Condition for having a link between nodes i and j : s ij ( t ) ≤ D Region-based faults – p. 6/16

  61. Link Lifetime Distance between i and j as a function of time - links being active and inactive 25 Edge exists between i and j No edge between i and j 25 Distance Between Nodes i and j D = 24 20 Distance between nodes i and j 20 D = 18 15 15 10 10 5 5 D = 4 0 0 0 50 100 150 200 250 300 350 400 450 500 0 50 100 150 200 250 300 350 400 450 500 Time Time • For D = 4 : the link i − j never exists • For D = 24 : the link i − j always exists Region-based faults – p. 7/16

  62. Link Active/Inactive Time Intervals !"#$5%678"9, !"#$5%:,;< !"#$%&' !"#$%(' !"#$%)' *"+,-"#, & ( ) . / 0 1 2 3 &4 &( &) &. &/ &0 &1 && • Check for the graph-connectivity in each of these intervals between time t = t 1 and t = t 2 (time of operation) • Binary search over the range [0 , T max ] to find the minimum transmission range to make the graph connected Region-based faults – p. 8/16

  63. Computation of nodes within each fault region in every time slot (interval) Region-based faults – p. 9/16

  64. Vulnerability Zone for an ANP • Vulnerability Zone of an ANP moves along with the ANP • At time t , it is denoted by V Z i ( t ) • For a pair of ANPs, ANP i and ANP j , the I-points are denoted as I 1 ij ( t ) and I 2 ij ( t ) &'()#*+,-.,#*%/-!"#-0*1-!"$- 1)-*)+-#*+/2,/%+3 *+,#- & # %#$ ( !"$ )$ !"# %$ $ )./-.+0*10*+,#- )# # %# ' $ !"# %#$ !"$ I-points when VZs intersect I-points when VZs do not intersect Region-based faults – p. 10/16

  65. Lifetime of I-points • Distance s ij between ANP i and ANP j at time t is given as: R j ( t )) 2 = R 2 ij ( t ) = ( � R i ( t ) − � j ( t ) − 2 � R i ( t ) · � s 2 i ( t ) + R 2 R j ( t ) • The existence of the I-points ( I 1 ij ( t ) and I 2 ij ( t ) ) at time t , is denoted by indicator variables II 1 ij ( t ) and II 2 ij ( t ) defined as follows:  1 , if s ij < 2 R  II 1 ij ( t ) = 0 , otherwise  $%&'+,+!!"# (%&'+,- $%&'+,+!!"# (%&'+,$ !!"# !!"# & %#$ # !"#$%$&' (%&' !"#$%$&' !"$ !"# !"# %$ $ # %# $%&' !"# $ ' !"# %#$ &")* !"$ vvehvuberviue II 1 ij = II 2 II 1 ij = II 2 ij = 1 ij = 0 Region-based faults – p. 11/16

  66. Nodes within Fault Region • F = { f 1 , f 2 , . . . , f l } : the set of regions centered at I-points, where l = n ( n − 1) + n • D pk ( t ) = distance between center of region f p and ANP k at time t • For every region f p and every node ANP k , if at time t the distance D pk ( t ) ≤ R , then ANP k is within the fault region f p 2345+6"!7"0+%&+-+8(9/90: 2345+6"!7"0+%&+-+8(9/: )!*+,-. '&0 1 1 1 '&/ )!*+,-. '&()!*+,-. %& !"#$ Region-based faults – p. 12/16

  67. Putting it Altogether • Step 1: Computation of time-varying network topology without faults in every time slot (interval) • Step 2: Computation of nodes within each fault region in every time slot (interval) Combining Step 1 and Step 2: • Step 3: Division of the time intervals computed in step 1 into sub-intervals, to identify the set of vulnerable nodes in each one of them, due to occurrence of an attack (fault) Region-based faults – p. 13/16

  68. Computation of the Minimum Transmission Range to keep the Residual Graph Connected when Some or All Nodes in a Fault Region f p have Failed ;6;6; :(6< :( :) :0 %"&'( ( + %"&', %"&'+ %"&') %"&'* ) * %"&'* %"&') %"&'( =!6!(6>6126&?!6@A@"%@B%$ ) * + !( ( , - . !) !* / 0 !"#$ :(4!)56<6 :(4!*56<6 4!56789 32+ %"&'( ( %"&'( 32* 4!56789 ( + %"&') + %"&') 32) 4!56789 ) 32( 4!56789 * ) %"&'* %"&'* 12 * !"#$ • From link lifetime information, the graph G i corresponding to time interval i is computed • From the fault region ( f p ) information, we compute the subintervals, during which a subset of nodes of G i is vulnerable due to fault f p Region-based faults – p. 14/16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend