1 / 46

Distributed Navigation Algorithms for Sensor Networks

Distributed Navigation Algorithms for Sensor Networks. Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri Dept. of Computer Science, University of California, Santa Barbara, CA 93106, USA IEEE INFOCOM 2006. Outlines. Main ideas Previous works Navigation using uniform skeleton graph

olinda
Télécharger la présentation

Distributed Navigation Algorithms for Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Distributed Navigation Algorithms for Sensor Networks Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri Dept. of Computer Science, University of California, Santa Barbara, CA 93106, USA IEEE INFOCOM 2006

  2. Outlines • Main ideas • Previous works • Navigation using uniform skeleton graph • Navigation using adaptive skeleton graph • Experimental Results • Conclusions

  3. Main ideas • Distributed algorithms to aid navigation of a user through area covered by sensors. • Danger zone, danger point, safe path • Flooding (optimal) vs. reduced graph (approximately optimal ) • Basic solution • Construct a reduced graph • Carry out a search on the skeleton graph to find shortest path/minimal exposure paths over the skeleton graph only

  4. Previous works • GPSR (Greedy Perimeter Stateless Routing) • Local search • Low communication cost, but low performance • Stateless is not meant literally, but refers to this small, purely local state. • Flooding • Global search • High performance, but high communication cost [9] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proc. of MOBICOM 2000.

  5. References • [8] Q. Li, M. DeRosa, and D. Rus, “Distributed algorithms for guiding navigation across a sensor network,” in Proc. of IPSN ’03., 2003. • [9] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proc. of MOBICOM 2000. • [14] S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, “Exposure in wireless ad-hoc sensor networks,” in Proc. of MOBICOM 2001, 2001. • [15] G. Veltri, Q. Huang, G. Qu, and M. Potkonjak, “Minimal and maximal exposure path algorithms for wireless embedded sensor networks,” in Proc. of SenSys 2003, 2003.

  6. Danger Zone • Shortest feasible path • Danger Point • Minimum exposure path • Probability of detection The potential function φ(x, y) itself is arbitrary, but it should monotonically decrease as we move away from the enemy position. where R is the Euclidean distance from the point of danger to the point (x, y)

  7. The superposition property:

  8. cx x

  9. Shortest Path Algorithm • BFS • When BFS terminates, every node knows its distance to the source and its parent point points to its parent along the path toward the source. • Every packet contains two fields • How many hop it has traveled from the source • The last node visited • Every node maintains a distance variable • If a node receives multiple search packets from source, only packets with smallest hop counts are forwarded. • Proposition : In a network of n nodes, the number of total packet transmissions required for the shortest path algorithm is O(n).

  10. Minimum Exposure Path Algorithm When the algorithm terminates, every node knows the exposure of the minimum exposure path to the source.

  11. Greedy Perimeter Stateless Routing for Wireless Networks (GPSR) • It is a greedy routing strategy for ad hoc networks which utilizes geographic information to find its destination.

  12. Alternatives protocol : DSR, AODV • DSR : Dynamic Source Routing • AODV : Ad-Hoc On-Demand Distance Vector Routing • Do not utilize geographic information and instead flood the network with query packets for finding routes.

  13. Perimeter routing - 1 Two paths : (xyzD) and (xwvD)

  14. Perimeter routing - 2 Traversing the cycle (xwvDzyx) by the right-hand rule amounts to navigating around the pictured void.

  15. Outlines • Main ideas • Previous works • Navigation using uniform skeleton graph • Navigation using adaptive skeleton graph • Experimental Results

  16. Navigation Using Uniform Skeleton Graph (USG) • Step 1: Construct a reduced graph Ex: GPSR • Step 2: Carry out a search on the skeleton graph to find shortest paths and minimal exposure paths

  17. Construct a reduced graph • Some node initiates the grid street construction protocol. • Using GPSR. • Next we turn to the embedding of the perimeter street. • Detect the danger zone boundary • The node inside the danger zone can go to sleep • The boundary node broadcast “wake up” message with life time of w hop to its neighbor.

  18. grid streets : The grid streets are a square grid of lines separated by distance s from each other. • Perimeter streets : An additional set of streets which follow the perimeter of the danger zone is also included in the street map and they are the perimeter streets.

  19. . . .

  20. How to avoid running out energy This can be avoided by varying the value of s, the street separation; or by shifting all the streets by a constant amount in the diagonal direction. Load balancing by shifting

  21. How to discover a path that points not on streets ? • What can one do for source and destination pairs which do not lie on any street? • If the destination does not lie on any street, then it is enclosed in a square enclosed by four streets. • Methods • The destination can be found by flooding that limited square. • Construct the streets on-demand. • Automatic load balancing

  22. Navigation Using Uniform Skeleton Graph (USG) • Step 1: Construct a reduced graph Ex: GPSR • Step 2: Carry out a search on the skeleton graph to find shortest paths and minimal exposure paths

  23. The USG: basic properties

  24. b & L a

  25. cD L 2D L 3D

  26. Outlines • Main ideas • Previous works • Navigation using uniform skeleton graph • Navigation using adaptive skeleton graph • Experimental Results

  27. Navigation Using Adaptive Skeleton Graph (ASG) • Idea of ASG • Place streets densely near danger zones while sparsely far away from danger zones • How do they achieve that? Recursively divide the area into quadtree四分樹until no quadtree cell whose boundary is intersected by danger zones boundary.

  28. Illustration of Constructing street map for ASG (Shortest Path)

  29. The sensor at a danger point flood with BFS • Every node finds it is equidistant from any two point declared as Voronoi edge • Embeding street map on Voronoi edge using quadtree as before Illustration of Constructing street map for ASG (Minimum Exposure Path) The danger point : A,B,C

  30. Performance of ASG • ASG improves (compared to USG) • not only the number of nodes • Implies lower communication cost • but also the total path length • Implies performance boosting

  31. Theorem 4 : ASG basic property – 1 (minimum communication cost) • Communication cost of discovering the shortest path is The limits of communication cost is the limits of the size (length) of ASG So we prove that the size of ASG is

  32. : Total length of street at all levels By definition of well-behaved curve Communication cost of ASG: # of node cross Perimeter Length of the node Total length of street at that level

  33. worst case x/2 lASG lOPT x x x/2 Theorem 5 : ASG basic property -2 (shortest path) • For a path joining any two points located on the streets in the adaptive skeleton graph

  34. Theorem 6 : ASG basic property – 3(minimum exposure path) • For a path joint any two points located on the street in ASG • The proof is the same as corresponding Theorem for USG (Theorem 3), the size of square did not used in that proof, so SASG : the exposure for the adaptive skeleton graph.

  35. Performance Comparison USG with ASG

  36. Outlines • Main ideas • Previous works • Navigation using uniform skeleton graph • Navigation using adaptive skeleton graph • Experimental Results

  37. Experimental Results • Place n sensors in a area • Do the experiment with n =1024, 4096 and 16384 nodes. • Shortest path is tested with two types of danger zones

  38. Experimental Results(Skeleton Graph Size v.s. Number of Nodes) S : Simple C : Complex 659 nodes ~4% 337 nodes ~37% The uniform skeleton graph is slightly larger than the adaptive graph, but this difference is not highly significant.

  39. Experimental Results(Performance ratio for Shortest Path) Performance Ratio = Generate 200 random point pairs lying within the sensor coverage area The approximated path lengths are no worse than 50% of optimal, The adaptive skeleton graph performs better as expected.

  40. Experimental Results(Performance ratio for Minimum Exposure Path) Both the uniform and adaptive skeleton graphs perform equally well with neither holding a decisive advantage. Performance Ratio = Use 20 different scenarios, each of which consists of three danger points Compute 10 minimum exposure paths

  41. Conclusions • Shortest path and minimum exposure path can be solved using skeleton graph • The USG and ASG provide close to optimal paths with very low communication overhead • ASG is more scalable than USG

  42. References • [8] Q. Li, M. DeRosa, and D. Rus, “Distributed algorithms for guiding navigation across a sensor network,” in Proc. of IPSN ’03., 2003. • [9] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proc. of MOBICOM 2000. • [14] S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, “Exposure in wireless ad-hoc sensor networks,” in Proc. of MOBICOM 2001, 2001. • [15] G. Veltri, Q. Huang, G. Qu, and M. Potkonjak, “Minimal and maximal exposure path algorithms for wireless embedded sensor networks,” in Proc. of SenSys 2003, 2003.

More Related