Location- -based Routing in based Routing in Location Sensor - - PowerPoint PPT Presentation

location based routing in based routing in location
SMART_READER_LITE
LIVE PREVIEW

Location- -based Routing in based Routing in Location Sensor - - PowerPoint PPT Presentation

Location- -based Routing in based Routing in Location Sensor Networks Sensor Networks Jie Gao Computer Science Department Stony Brook University 9/22/05 Jie Gao, CSE590-fall05 1 Location- -based routing based routing Location


slide-1
SLIDE 1

9/22/05 Jie Gao, CSE590-fall05 1

Location Location-

  • based Routing in

based Routing in Sensor Networks Sensor Networks

Jie Gao

Computer Science Department Stony Brook University

slide-2
SLIDE 2

9/22/05 Jie Gao, CSE590-fall05 2

Location Location-

  • based routing

based routing

  • Greedy forwarding: send the packet to the neighbor

closest to the destination.

  • Face routing on a planar subgraph.

t s

slide-3
SLIDE 3

9/22/05 Jie Gao, CSE590-fall05 3

Two problems remain Two problems remain

  • A subgraph G’ of G is a α-spanner if the shortest

path in G’ is bounded by a constant α times the shortest path length in G.

  • Both RNG and GG are not spanners a short

path may not exist!

  • Even if the planar subgraph contains a short path,

can greedy routing and face routing find a short

  • ne?
slide-4
SLIDE 4

9/22/05 Jie Gao, CSE590-fall05 4

Tackle problem I: Tackle problem I: Find a planar spanner Find a planar spanner

slide-5
SLIDE 5

9/22/05 Jie Gao, CSE590-fall05 5

Find a good Find a good subgraph subgraph

  • Goal: a planar spanner such that the shortest path

is at most α times the shortest path in the unit disk graph.

– Euclidean spanner: The shortest path length is measured in total Euclidean length. – Hop spanner: The shortest path length is measured in hop count.

  • α: spanning ratio.

– Euclidean spanning ratio ≥ – Hop spanning ratio ≥ 2.

  • Let’s first focus on Euclidean spanner.

2

slide-6
SLIDE 6

9/22/05 Jie Gao, CSE590-fall05 6

Delaunay Delaunay triangulation is an Euclidean triangulation is an Euclidean spanner spanner

  • DT is a 2.42-spanner of the Euclidean distance.
  • For any two nodes uv, the Euclidean length of the

shortest path in DT is at most 2.42 times |uv|.

slide-7
SLIDE 7

9/22/05 Jie Gao, CSE590-fall05 7

Restricted Restricted Delaunay Delaunay graph graph

  • Keep all the Delaunay edges no longer than 1.
  • Claim: RDG is a 2.42-spanner (in total Euclidean length) of

the UDG.

  • Proof sketch: If an edge in UDG is deleted in RDG, then it’s

replaced by a path with length at most 2.42 longer.

slide-8
SLIDE 8

9/22/05 Jie Gao, CSE590-fall05 8

Construction of RDG Construction of RDG

  • Easy to compute a superset of

RDG: Each node computes a local Delaunay of its 1-hop neighbors.

– A global Delaunay edge is always a local Delaunay edge, due to the empty-circle property. – A local Delaunay may not be a global Delaunay edges.

  • What if the superset have

crossing edges?

slide-9
SLIDE 9

9/22/05 Jie Gao, CSE590-fall05 9

Detect crossings between local Detect crossings between local delaunay delaunay edges edges

  • By the crossing Lemma: if two edges cross in a

UDG, one of them has 3 nodes in its neighborhood and can tell which one is not Delaunay.

  • Neighbors exchange their local DTs to resolve

inconsistency.

  • A node tells its 1-hop neighbors the non-Delaunay edges

in its local graph.

  • A node receiving a “forbidden” edge will delete it from its

local graph.

  • Completely distributed and local.
slide-10
SLIDE 10

9/22/05 Jie Gao, CSE590-fall05 10

Restricted Restricted Delaunay Delaunay graph graph

  • 1-hop information exchange is sufficient.

– Planar graph; – All the short Delaunay edges are included. – We may have some planar non-Delaunay edges but that does not hurt spanning property.

a b

slide-11
SLIDE 11

9/22/05 Jie Gao, CSE590-fall05 11

Restricted Restricted Delaunay Delaunay graph graph

  • RDG can be constructed without the full location

information.

  • Only local angle information suffices.
  • Key operation: If two edges in the unit-disk graph

cross, remove the one that is not in the Delaunay triangulation.

  • How to tell that an edge is not in the Delaunay

triangulation?

slide-12
SLIDE 12

9/22/05 Jie Gao, CSE590-fall05 12

Removing non Removing non-

  • Delaunay

Delaunay edges edges

If two edges AB, CD cross, there are only three cases:

slide-13
SLIDE 13

9/22/05 Jie Gao, CSE590-fall05 13

If two edges AB, CD cross, there are only three cases:

The shape is fixed! Node C can tell which edge is not Delaunay.

Removing non Removing non-

  • Delaunay

Delaunay edges edges

slide-14
SLIDE 14

9/22/05 Jie Gao, CSE590-fall05 14

Case (i) : Use the “empty-circle” test of Delaunay triangulation Conclusion: The edge AB is not a Delaunay edge.

Removing non Removing non-

  • Delaunay

Delaunay edges edges

|AC| > 1 ≥ |CD| |BC| > 1 ≥ |CD|

slide-15
SLIDE 15

9/22/05 Jie Gao, CSE590-fall05 15

Find a hop spanner Find a hop spanner

  • Restricted delaunay graph is not a hop spanner.
  • Take n nodes, each pair is within distance 1. The hop

count can be as large as n.

  • Reduce the density of the sensors.
  • Use clustering to reduce density.
  • Compute RDG on the subset to get a hop spanner.
  • Clustering also reduce interference and enables efficient

resource reuse such as bandwidth.

slide-16
SLIDE 16

9/22/05 Jie Gao, CSE590-fall05 16

Reduce node density Reduce node density

  • Find a subset of nodes, called clusterheads

– Each node is directly connected to at least 1 clusterhead. – No two clusterheads are connected.

  • Use a greedy algorithm. Pick a node as a

clusterhead, remove all the 1-hop neighbors, continue.

  • Constant density: ≤ 6 clusterheads in any unit disk.

– The angle spanned by two clusterheads is at least π/6. π/3

slide-17
SLIDE 17

9/22/05 Jie Gao, CSE590-fall05 17

Connect Connect clusterheads clusterheads by gateways by gateways

  • For two clusterheads, if

their clients have an edge, then we pick one pair as gateway nodes.

  • Notice that clusterheads x,

y are within 3 hops to have a pair of gateways.

  • There are constant

clusterheads and gateways inside any unit disk.

slide-18
SLIDE 18

9/22/05 Jie Gao, CSE590-fall05 18

Path on Path on clusterheads clusterheads and gateways and gateways

  • For two nodes u, v that are k hops away, there is a path through

clusterheads and gateways with at most 3k+2 hops.

  • Construct RDG on clusterheads and gateways, which have

constant bounded density. 3k clusterheads

Shortest path

slide-19
SLIDE 19

9/22/05 Jie Gao, CSE590-fall05 19

A Routing Graph Sample A Routing Graph Sample

slide-20
SLIDE 20

9/22/05 Jie Gao, CSE590-fall05 20

Restricted Restricted Delaunay Delaunay graph graph

  • Claim: (RDG on clusterheads and gateways + edges from

clients to clusterheads) is a constant hop spanner of the

  • riginal UDG.
  • Proof sketch:

– The shortest path P in the unit disk graph has k hops. – Though clusterheads and gateways ∃ a path Q with ≤ 3k+2 hops. – Q’s total Euclidean length is ≤ 3k+2. – The shortest path on the RDG, H, has Euclidean length ≤ 2.42×(3k+2). – By constant density property a region with width 1 and length 2.42×(3k+2) has O(k) nodes inside. So # hops of H is O(k). – This concludes the hop spanner property.

P H unit disk graph clusterheads and gateways

slide-21
SLIDE 21

9/22/05 Jie Gao, CSE590-fall05 21

Restricted Restricted Delaunay Delaunay graph graph

RNG RDG

slide-22
SLIDE 22

9/22/05 Jie Gao, CSE590-fall05 22

Restricted Restricted Delaunay Delaunay graph graph

RNG RDG

slide-23
SLIDE 23

9/22/05 Jie Gao, CSE590-fall05 23

Tackle problem II: Tackle problem II: Improve face routing to find a short Improve face routing to find a short path path

slide-24
SLIDE 24

9/22/05 Jie Gao, CSE590-fall05 24

Lower bound of localized routing Lower bound of localized routing

  • Any deterministic or

randomized localized routing algorithm takes a path of length Ω(k2), if the

  • ptimal path has length k.
  • The adversary decides

where the chain wt is. Since we store no information on nodes, in the worst case we have to visit about Ω(k) chains and pay a cost of Ω(k2). t s

slide-25
SLIDE 25

9/22/05 Jie Gao, CSE590-fall05 25

Performance of greedy routing Performance of greedy routing

  • If greedy routing gets to the

destination, then the path length is at most O(k2), if the

  • ptimal path has length k.
  • |uv| is at most k. On the

greedy path, every other node is not visible, so they are of distance at least 1 away. By a packing lemma, there are at most O(k2) nodes inside a disk of radius k.

slide-26
SLIDE 26

9/22/05 Jie Gao, CSE590-fall05 26

Variations of face routing Variations of face routing

A number of papers on various face routing:

  • [Bose, et.al 99] Routing with guaranteed delivery in ad hoc wireless

networks.

  • [Karp and Kung 00] GPSR: Greedy Perimeter Stateless Routing for

Wireless Networks.

  • [Kuhn, et.al 02] Asymptotically optimal geometric mobile ad hoc

routing.

  • [Kuhn, et.al 03a] Worst-case optimal and average-case efficient

geometric ad hoc routing.

  • [Kuhn, et.al 03b] Geometric ad hoc routing: of theory and practice.
  • [Kim, et.al 05b] Geographic Routing Made Practical.
  • [Kim, et.al 05a] On the Pitfalls of Geographic Face Routing.
slide-27
SLIDE 27

9/22/05 Jie Gao, CSE590-fall05 27

Face transition Face transition

  • In literature there are 4 ways of switching faces:

1. Best intersection (AFR) 2. First intersection (GPSR, GFG) 3. Closest node other face routing (GOAFR+) 4. Closest point other face routing

t s

slide-28
SLIDE 28

9/22/05 Jie Gao, CSE590-fall05 28

Face transition Face transition

  • Simple first intersection may fail.
  • Correct rule: at an intersection p, only change to a

face that intersects pt at p’s neighborhood.

slide-29
SLIDE 29

9/22/05 Jie Gao, CSE590-fall05 29

Face transition Face transition

  • Closest node other face routing fails in practice.
slide-30
SLIDE 30

9/22/05 Jie Gao, CSE590-fall05 30

Face transition Face transition

  • Best intersection face routing always makes progress

towards the destination in a planar graph.

  • The distance from the best intersection to the destination

always decreases.

t s

slide-31
SLIDE 31

9/22/05 Jie Gao, CSE590-fall05 31

Performance of face routing Performance of face routing

  • What if we choose the wrong side?
slide-32
SLIDE 32

9/22/05 Jie Gao, CSE590-fall05 32

Adaptive face routing Adaptive face routing

  • Suppose the shortest path on the planar graph is bounded by

L hops.

  • Bound the search area by an ellipsoid {x | |xs|+|xt|≤L}

never walk outside the ellipsoid.

  • Follow one direction, if we hit the ellipsoid; turn back.
  • If we find an intersection p of the face with line st, change to

the face containing pt.

  • In the worst case, visit every node inside the ellipsoid (about

L2 by the bounded density property).

t s

slide-33
SLIDE 33

9/22/05 Jie Gao, CSE590-fall05 33

Adaptive face routing Adaptive face routing

  • How to guess the upper bound L?
  • Start from a small value say |st|; if we fail to find a path, then

we double L and re-run adaptive face routing.

  • By the time we succeed, L is at most twice the shortest path

length k. The number of phases is O(logk).

  • Total cost = O( Σi (k/2i)2 )=O(k2).

t s

slide-34
SLIDE 34

9/22/05 Jie Gao, CSE590-fall05 34

A simple worst A simple worst-

  • case optimal routing

case optimal routing alg alg

  • It’s easy to get a worst-case O(k2) bound.
  • Do adaptive restricted flooding.
  • Start with a small threshold t. Flood all the nodes

within distance t from the source.

  • If the destination is not reached, double the radius

and retry.

  • On a network with bounded density, the total cost is

O(k2) if the shortest path has length k.

slide-35
SLIDE 35

9/22/05 Jie Gao, CSE590-fall05 35

Fall back to greedy Fall back to greedy

  • When a node visits a node closer to the destination

than that at which it enters the face routing mode, it returns to greedy mode.

  • Other fall-back schemes are proposed. E.g.,

GOAFR+ considers falling back to greedy mode when considering a face change and when there are sufficient nodes closer to the destination than the local minimum.

slide-36
SLIDE 36

9/22/05 Jie Gao, CSE590-fall05 36

Beyond point Beyond point-

  • to

to-

  • point routing

point routing

  • Multicast to a geographical region.

– Use geographical forwarding to reach the destination region. – Restricted flooding inside the region.

slide-37
SLIDE 37

9/22/05 Jie Gao, CSE590-fall05 37

Routing on a curve Routing on a curve

  • Follow a parametric

curve <x(t), y(t)>.

  • Greedily select the

nodes near the curve.

slide-38
SLIDE 38

9/22/05 Jie Gao, CSE590-fall05 38

Geographical routing in practice Geographical routing in practice

slide-39
SLIDE 39

9/22/05 Jie Gao, CSE590-fall05 39

Revisit the assumptions of GPSR Revisit the assumptions of GPSR

  • Nodes know their accurate locations.
  • The network topology follows the unit disk graph

model.

  • These are 2 BIG assumptions.
  • Localization is hard, both in theory and in practice.
  • Unit disk graph model is simply not correct in

practice.

slide-40
SLIDE 40

9/22/05 Jie Gao, CSE590-fall05 40

Sensor communication model Sensor communication model

  • Contour of probability of packet reception from a

central node at two different transmit power settings.

Does not look like a disk to me.

Source: Ganesan, et.al

slide-41
SLIDE 41

9/22/05 Jie Gao, CSE590-fall05 41

Sensor communication model Sensor communication model

  • Each point represents a pair of nodes.

Source: Mark Paskin

Asymmetric

slide-42
SLIDE 42

9/22/05 Jie Gao, CSE590-fall05 42

Sensor communication model Sensor communication model

  • How in-bound link quality varies with distance.

Source: Mark Paskin

Large variance even at short distances

slide-43
SLIDE 43

9/22/05 Jie Gao, CSE590-fall05 43

Sensor communication model Sensor communication model

  • Link quality varies with time.

Source: Mark Paskin

slide-44
SLIDE 44

9/22/05 Jie Gao, CSE590-fall05 44

Sensor communication model Sensor communication model

  • Experiments show that

– Irregular transmission range: stable long links exist, links between two close by nodes might not exist. – Links are asymmetric (A talks to B, B can’t talk to A). – Localization errors.

  • This makes the planar graph construction fail.
slide-45
SLIDE 45

9/22/05 Jie Gao, CSE590-fall05 45

Planar graph subtraction fails on irregular Planar graph subtraction fails on irregular radio range radio range

  • Network is partitioned.
  • Crossing links.

Edge AB is removed. No crossing of line SD closer than point p.

slide-46
SLIDE 46

9/22/05 Jie Gao, CSE590-fall05 46

Testing GPSR in a real Testing GPSR in a real testbed testbed

  • GPSR only succeeds on 68.2% directed node

pairs. A 50-node testbed at Intel Berkeley Lab

slide-47
SLIDE 47

9/22/05 Jie Gao, CSE590-fall05 47

Planrization Planrization partitions the network partitions the network

  • Planar graph subtraction disconnects the network.

Gabriel Graph Crossing links! A 50-node testbed at Berkeley Soda Hall

slide-48
SLIDE 48

9/22/05 Jie Gao, CSE590-fall05 48

A small fix on the asymmetric links A small fix on the asymmetric links

  • The irregular radio range fails the planar graph

construction.

  • A small fix by using mutual witness:
  • The link AB is removed only if there is witness that

is seen by both A and B.

slide-49
SLIDE 49

9/22/05 Jie Gao, CSE590-fall05 49

A small fix on the asymmetric links A small fix on the asymmetric links

  • Leaves more crossing links.
  • Only improves the success rate of GPSR to 87.8%.
slide-50
SLIDE 50

9/22/05 Jie Gao, CSE590-fall05 50

Cross Link Detection Protocol Cross Link Detection Protocol

  • Try to do face routing on a non-planar network.
  • Eliminate not-OK crossings and keep the graph

connected.

  • Each node probes each of its link to see if it’s

crossed by other links.

  • How to probe? Record the link to be probed in

packet, do face routing and mark all crossings.

slide-51
SLIDE 51

9/22/05 Jie Gao, CSE590-fall05 51

Cross Link Detection Protocol Cross Link Detection Protocol

  • Start from D and do face routing.

Remove either AD or BC Can’t remove BC Can’t remove AD Can’t remove either Observation: a not-OK crossing is traversed twice, once in each direction.

slide-52
SLIDE 52

9/22/05 Jie Gao, CSE590-fall05 52

Cross Link Detection Protocol Cross Link Detection Protocol

  • A link is not removable, if it’s

traversed twice.

  • A crossing L and L’: remove the

removable one. If none of them is removable, do nothing.

  • Protocol: do the probing

sequentially.

  • For different probing sequences,
  • ne can get different graphs.
slide-53
SLIDE 53

9/22/05 Jie Gao, CSE590-fall05 53

Multiple crossing links Multiple crossing links

  • If a link is crossed by multiple
  • ther links, we probe it

multiple times.

  • Probing a pair of cross links

may not find all the crossing, if they are obscured by other links.

slide-54
SLIDE 54

9/22/05 Jie Gao, CSE590-fall05 54

Problems with CLDP Problems with CLDP

  • How many probes? In what order?
  • Can we probe the links concurrently?

– Lock a link when it’s probed.

  • Say we finish all the probes, and do face routing on

the graph. Can we guarantee that the face routing always succeeds?

slide-55
SLIDE 55

9/22/05 Jie Gao, CSE590-fall05 55

Simulation Simulation

slide-56
SLIDE 56

9/22/05 Jie Gao, CSE590-fall05 56

Simulation Simulation

slide-57
SLIDE 57

9/22/05 Jie Gao, CSE590-fall05 57

Simulation Simulation

slide-58
SLIDE 58

9/22/05 Jie Gao, CSE590-fall05 58

Simulation Simulation

slide-59
SLIDE 59

9/22/05 Jie Gao, CSE590-fall05 59

Summary Summary

  • Knowledge of nodes’ location enables many

powerful mechanisms for route discovery without expensive flooding operations yet requires no routing tables or other high-maintenance data structures.

  • However, there are practical challenges in applying

geographical routing.

slide-60
SLIDE 60

9/22/05 Jie Gao, CSE590-fall05 60

Next class Next class

  • We noticed that the trouble is due to face routing.
  • Is greedy routing robust to localization noise?
  • Can we ignore the real coordinates and use virtual

coordinates for routing?

slide-61
SLIDE 61

9/22/05 Jie Gao, CSE590-fall05 61

Midterm project check Midterm project check

  • Date

– 10/6, 10/11? – Present to the class what you plan to do and get feedback.

  • If you decide what topic you will work on, send me a

note.

slide-62
SLIDE 62

9/22/05 Jie Gao, CSE590-fall05 62

Paper presentation on 10/18 Paper presentation on 10/18

  • A cute paper:
  • [Zhu05] Y. Zhu and R. Sivakumar, Challenges:

Communication through Silence in Wireless Sensor Networks, MobiCom'05.

  • Interesting problems:
  • [Yang05] Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William

Arbaugh, Toward resilient security in wireless sensor networks, Proceedings of the 6th ACM international symposium

  • n Mobile ad hoc networking and computing (MobiHoc), 34-45,

2005.

  • [Funke05b] S. Funke, Topological Hole Detection and its

Applications, DIALM-POMC, 2005.