landmark landmark based routing based routing landmark
play

Landmark Landmark-based routing based routing Landmark - PowerPoint PPT Presentation

Landmark Landmark-based routing based routing Landmark Landmark-based routing based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of


  1. Landmark Landmark-based routing based routing

  2. Landmark Landmark-based routing based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004. Using the distances to landmarks and triangle inequality, one can approximate the distance for most of pairs. [Fang05a] Qing Fang, Jie Gao, Leonidas Guibas, Vin de Silva, Li Zhang, GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks , Proc. of the 24th Conference of the IEEE Communication Networks , Proc. of the 24th Conference of the IEEE Communication Society (INFOCOM'05), March, 2005. Route around holes. Use combinatorial Delaunay graph to capture the global topology. [Fonseca05] Rodrigo Fonseca, Sylvia Ratnasamy, Jerry Zhao, Cheng Tien Ee and David Culler, Scott Shenker, Ion Stoica, Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets , NSDI'05. Landmark-based routing scheme. [Mao07] Yun Mao, Feng Wang, Lili Qiu, Simon S. Lam, Jonathan M. Smith, S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks , NSDI’07. Landmark-based routing with constant stretch, and \sqrt{n} routing table size.

  3. Landmark Landmark-based schemes based schemes • k nodes are selected as landmarks (beacons) that flood the network. Each node records hop distances to these landmarks. – estimate pair-wise distances, – point-to-point routing. – point-to-point routing. • Pros: – simplicity, – location-free, – independent of dimensionality (works for 3D networks). – No unit disk graph assumption

  4. Use landmarks to estimate pair Use landmarks to estimate pair-wise wise distances distances • Triangulation: estimate via triangle inequality – (u,v), beacon b : |d(u,b)-d(v,b)| � d(u,v) � d(u,b)+d(v,b) – lower bound: d - (u, v) = max beacons b |d(u,b)-d(v,b)| – upper bound: d + (u,v) = min beacons b d(u,b)+d(v,b) – Internet setting, IDMaps [Francis+ ’01], etc • magic: relative error <1 on 90% node pairs – 900 random nodes, 15 beacons – relative error(x,y) = |x-y| / min(x,y)

  5. A simple case A simple case • With O(1) random landmarks, d + (u,v) � 3d(u,v) for all but � fraction of pairs with prob 1- � . – At least one beacon inside B(u). – For any point v outside B(u), – d(v,b) � d(u,b)+d(u,v) � 2d(u,v) – d + (u,v) � d(u,b)+d(v,b) � 3d(u,v) b v u B(u): ball with εn nodes inside.

  6. Sensor networks, doubling metric Sensor networks, doubling metric • A metric space has doubling dimension s if any ball of radius r can be covered by s balls of radius r/2. – Geometric growth. – Binary trees do not have constant doubling dimension. – Euclidean space has constant doubling dimension – Many practical networks fit in this model: Internet delay distance, sensor network (not too fragmented), VSLI layout, etc.

  7. Improved bound on triangulation Improved bound on triangulation • With O(1) random landmarks, d + (u,v) � (1+ � ) d + (u,v) for all but � fraction of pairs with prob 1- � .

  8. Landmark Landmark-based embedding based embedding ���������������������������������������������� • ����������������������� �������! – "���������"����������������������� • ��������������#����$"���������%��� • ��������������#����$"���������%��� – ����������������� – ���������#�������������&���� • �����'�(�)������%�����������������������������*�� ������+,- – (���������������.�/-��������.�0����������� – ����1��������,

  9. Discussion Discussion • With distances estimation, potentially we can do “greedy routing”. • Next: different ways to implement Next: different ways to implement landmark-based routing schemes. – Beacon Vector Routing – GLIDER – S4: compact routing

  10. Beacon Vector Routing (BVR) Beacon Vector Routing (BVR) • A heuristic landmark-based routing. • Every node remembers hop counts to a total of r landmarks. – Move towards a beacon when the destination is Move towards a beacon when the destination is closer to the beacon than the current node – Move away from a beacon when the destination is further from the beacon than the current node 2/27/09 Jie Gao, CSE595-spring09 10

  11. Beacon Vector Routing (BVR) Beacon Vector Routing (BVR) • A heuristic landmark-based routing. • Every node remembers hop counts to a total of r landmarks. • Routing metric: • Routing metric: – Pulling landmarks (those closer to destination). Dist from d to landmark i. Dist from p to landmark i. – Pushing landmarks (further to destination) 2/27/09 Jie Gao, CSE595-spring09 11

  12. Beacon Vector Routing (BVR) Beacon Vector Routing (BVR) • Routing metric: Choose a neighbor that minimizes Dist from d to landmark i. Dist from p to landmark i. • No theoretical understanding of the performance. 2/27/09 Jie Gao, CSE595-spring09 12

  13. Fall back mode Fall back mode • If greedy routing with the routing metric gets stuck, then send to the closest beacon. • The closest beacon does a scoped • The closest beacon does a scoped flooding.

  14. Simulations Simulations • Assumptions for high level simulation – Fixed circular radio range – Ignore the network capacity and congestion – Ignore packet losses • Place nodes uniformly at random in a square • Place nodes uniformly at random in a square planner region – 3200 nodes uniformly distributed in a 200 * 200 unit area – Radio range is 8 units – Average node degree is 16 • Vary #total beacons and #routing beacons

  15. Greedy success rate Greedy success rate

  16. Greedy routing with Greedy routing with 10 10 beacons beacons

  17. Obstacles Obstacles

  18. Routing around holes Routing around holes • Real-world deployment is not uniform, has holes (due to buildings, landscape variation). • Face routing is too “Short-sighted” and greedy. • Boundary nodes get overloaded. 2/27/09 Jie Gao, CSE595-spring09 18

  19. GLIDER GLIDER • 2-level infrastructure • Top-level: capture the global topology. – Where the holes are (e.g., CS building, Javitz center, etc). center, etc). – General routing guidance (e.g., get around the Javitz center, go straight to SAC). • Bottom-level: capture the local connectivity. – Gradient descent to realize the routing path. 2/27/09 Jie Gao, CSE595-spring09 19

  20. 2-level infrastructure level infrastructure • Why this makes sense? – Global topology is stable (the position of buildings are unlikely to change often). – Global topology is compact (a small number – Global topology is compact (a small number of buildings) • From each node’s point of view: – A rough guidance. – Local greedy rule. 2/27/09 Jie Gao, CSE595-spring09 20

  21. Combinatorial Delaunay graph Combinatorial Delaunay graph • Given a communication graph on sensor nodes, with path length in shortest path hop counts • Select a set of landmarks • Landmarks flood the network. Each node learns the hop count to each landmark. • Construct Landmark Voronoi Complex (LVC) 2/27/09 Jie Gao, CSE595-spring09 21

  22. Combinatorial Delaunay graph Combinatorial Delaunay graph • Construct Landmark Voronoi Complex (LVC) • Each sensor identifies its closest landmark. • • A sensor is on the boundary if A sensor is on the boundary if it has 2 closest landmarks. • If flooding are synchronized, then restricted flooding up to the boundary nodes is enough. 2/27/09 Jie Gao, CSE595-spring09 22

  23. Combinatorial Delaunay graph Combinatorial Delaunay graph • Construct Combinatorial Delaunay Triangulation (CDT) on landmarks • If there is at least one boundary node between boundary node between landmark i and j, then there is an edge ij in CDT. • Holes in the sensor field map to holes in CDT. • CDT is broadcast to the whole network. 2/27/09 Jie Gao, CSE595-spring09 23

  24. Virtual coordinates Virtual coordinates Each node stores virtual coordinates (d 1 , d 2 , d 3 , … d k ), d k = hop count to the kth reference landmark (home+neighboring landmarks) home landmark (think about post-office) (think about post-office) resident tile p reference landmarks Boundary nodes 2/27/09 Jie Gao, CSE595-spring09 24

  25. Combinatorial Delaunay graph Combinatorial Delaunay graph Theorem : If G is connected, then the Combinatorial Delaunay graph D(L) for any subset of landmarks is also connected. 1. Compact and stable 2. Abstract the connectivity 2. Abstract the connectivity graph: Each edge can be mapped to a path that uses only the nodes in the two corresponding Voronoi tiles; Each path in G can be “lifted” to a path in D(L) 2/27/09 Jie Gao, CSE595-spring09 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend