topology transparent schedules for energy limited ad hoc
play

Topology-Transparent Schedules for Energy Limited Ad hoc Networks - PowerPoint PPT Presentation

1st IEEE International Workshop on Foundations and Algorithms for Wireless Networking FAWN 2006 Pisa, Italy March 13, 2006 Topology-Transparent Schedules for Energy Limited Ad hoc Networks Peter J. Dukes Charles J. Colbourn Violet R.


  1. 1st IEEE International Workshop on Foundations and Algorithms for Wireless Networking FAWN 2006 Pisa, Italy March 13, 2006 Topology-Transparent Schedules for Energy Limited Ad hoc Networks Peter J. Dukes Charles J. Colbourn Violet R. Syrotiuk

  2. Medium Access Control (MAC) • Many networks use a broadcast channel – LANs, satellites, radio, optical, sensors • MAC protocol coordinates all packet transmissions • MAC has fundamental impact on overall network performance 2

  3. MAC in Ad Hoc Networks • Self-organizing collection of mobile wireless nodes – No centralized control, wired infrastructure • Limited radio transmission range – Network is multi-hop, allows spatial reuse • Objectives of MAC: – Minimize delay, maximize throughput 3

  4. Spectrum of MAC Protocols • Contention based – Direct asynchronous competition RTS CTS Data ACK – Achieves high throughput with reasonable expected delay, but poor worst-case delay • Allocation based – Deterministic slot assignment – Achieves delay bound but poor throughput 4

  5. Topology and Scheduling • Topology-dependent approaches – Recompute access on topology change • Topology-transparent approaches – Independent of topology change – Neighbour information not used – Two design parameters: N, D max 5

  6. Energy Demands on Lightweight Nodes Listening is expensive! Radio Transmit Receive Idle 1 15W 11W 0.05W 2 5.76W 2.88W 0.35W 6

  7. A Combinatorial Schedule • Nodes of a network: V = {1, …, n} • Time slots: {1, …, m} • A slot schedule is represented as a partition [T,R,S] of V – Nodes in T can transmit – Nodes in R are eligible to receive – Nodes in S are asleep • For each time slot, we need a slot schedule – S j = [T j ,R j ,S j ], 1 < j < m 7

  8. Example Frame Schedule S 1 S 2 S 3 S 4 S 5 S 6 S 7 S 8 S 9 S 10 S 11 S 12 S 13 Transmit Receive Sleep n=13 nodes, m=13 slots in this example. First slot schedule, S 1 – T 1 ={1,5,9}, R 1 ={10,11,12,13}, S 1 ={2,3,4,6,7,8} 8

  9. Guarantees on Transmission • Condition for transmitter x to reach receiver y? • Given F and (x,y) in VxV, define – σ (x,y) = {j | x in T j and y in R j } – Those slots j in {1, …, m} in which x can transmit and y is listening • Necessary condition: σ (x,y) is nonempty • Also require that in some slot with y receiving, the only transmitting node in range is x 9

  10. Possible/Impossible Transmissions in Slot i i in σ (x,y) z x y x in T i y in R i z not in T i Possible Impossible 10

  11. Successful Transmission • Assume – Every node has at most D neighbours – Neighbourhoods dynamic but unchanged in a frame • A successful transmission between any pair of nodes is ensured if – For all x, y in V, x ≠ y, and any d ≤ D-1 nodes, x 1 , …, x d ≠ x d U � ( x i , y ) ( x , y ) / � i 1 = 11

  12. D-Cover-Free Family • No set is a subset of the union of D other sets … a D-cover-free family 12

  13. Requirement of 2 vs. 3 States When S j =0 ∀ j, i.e., requirement is a D-cover-free family x y For 3 node states, the receiver is excluded as a transmitter, so the requirement (D-1)-cover-free family 13

  14. Energy Budget • The selection of a suitable frame length is challenging • Let t j , r j , s j be the number of nodes scheduled transmit, receive, and sleep in slot j, with cost τ , ρ , φ • Energy consumption per slot m 1 ( t r s ) � � + � + � j j j m j 1 = 14

  15. Optimization Problems • How to allocate the energy budget for a frame to the individual slots? • How to allocate the energy budget within a slot to transmitters, receivers and idle nodes? – Basic optimization show the number of Tx and Rx per slot should be the same • Once decided, how to construct a schedule realizing (or closely approximating) the desired distribution? 15

  16. General Schedule Constructions • Adopt a graph theoretic model • Represent the possible sets of Tx/Rx pairs in each slot as subgraphs of the set of all allowable Tx/Rx communications • Use x → y indicates opportunity for x to transmit and y to receive – Assume x ≠ y – Occurs λ times in a frame schedule 16

  17. General Schedule Constructions (cont’d) • λ DK n is the λ -fold symmetric directed multigraph on n vertices – For any distinct x,y, λ arcs from x to y • Let DK a,b be the complete bipartite directed graph – vertex set A U B, |A|=a, |B|=b – an arc is directed from each (out-) vertex of A to each (in-) vertex of B 17

  18. General Schedule Constructions (cont’d) • Consider one slot schedule [T,R,S] within a frame schedule • Place a DK t,r on out-vertex set T, t=|T|, and in-vertex set R, r=|R| – Each arc represents a possible transmission in this slot • Goal: select such directed bipartite graphs (slot schedules) to form a frame schedule – Every arc occurs equally often, λ times 18

  19. General Schedule Constructions (cont’d) • Let G be an arbitrary directed multigraph • A G-design of order n and index λ is a partition of the edges of λ DK n into copies of G, called blocks • A frame schedule in which every pair of nodes has λ slots from x to y is equivalent to some ordering of the blocks of a DK t,r -design of order n and index λ 19

  20. Example of Cyclic DK 3,4 -design of Order 13 and Index 1 13 12 1 11 2 3 10 4 9 Take cyclic shifts to form 5 8 7 6 frame schedule T 1 ={1,5,9}, R 1 ={10,11,12,13}, S 1 ={2,3,4,6,7,8} 20

  21. Conditions • Global condition: ∀ y, { σ (x,y) | x in V\{y}} is a (D-1)-cover-free family – This condition difficult to check efficiently • Local condition: ∀ y and x ≠ x’, | σ (x,y) σ (x’,y)| < λ /(D-1) � – Use this more stringent condition, since it is more easily verified 21

  22. Constructions • Constructions that respect either the global or local constraint • Indirect (recursive) constructions – Dual cover-free families – Packcovers • Direct constructions – Addition sets – Computational methods • Hill climbing 22

  23. Conclusions & Future Work • Presented combinatorial conditions for topology-transparent schedules in energy limited ad hoc networks • Provide indirect and direct constructions for such schedules – These just illustrate the kinds of techniques that can be applied • Ongoing work – Computational methods, and other constructions 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend