Priority Based Enhancement of Online Power-Aware Routing in Wireless Sensor Network. Ronit Nossenson Jerusalem College of Technology



Similar documents
2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

Connectivity and cuts

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley goldberg/

Course on Social Network Analysis Graphs and Networks

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley goldberg/

Connected Identifying Codes for Sensor Network Monitoring

Social Media Mining. Graph Essentials

CIS 700: algorithms for Big Data

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Scheduling Shop Scheduling. Tim Nieberg

CMPSCI611: Approximating MAX-CUT Lecture 20

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Graph Theoretic Models and Tools for the Analysis of Dynamic Wireless Multihop Networks

Network (Tree) Topology Inference Based on Prüfer Sequence

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

5.1 Bipartite Matching

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

Euler Paths and Euler Circuits

Network Design and Protection Using Network Coding

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, Chapter 7: Digraphs

Distributed Computing over Communication Networks: Maximal Independent Set

Decentralized Utility-based Sensor Network Design

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Monitor Placement for Maximal Identifiability in Network Tomography

Network Metrics, Planar Graphs, and Software Tools. Based on materials by Lala Adamic, UMichigan

Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

Link Identifiability in Communication Networks with Two Monitors

Topological Properties

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005

On the k-path cover problem for cacti

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

A Tool For Active FLEET Management and Analysis of Activities of a Snow PlowING and a Road Salting Fleet

On Optimal Monitor Placement for Localizing Node Failures via Network Tomography

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

Part 2: Community Detection

Small Maximal Independent Sets and Faster Exact Graph Coloring

Graph theoretic techniques in the analysis of uniquely localizable sensor networks

SCAN: A Structural Clustering Algorithm for Networks

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Minimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes.

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

VISUALIZING HIERARCHICAL DATA. Graham Wills SPSS Inc.,

The Basics of Graphical Models

Efficient Throughput for Wireless Mesh Networks by CDMA/OVSF Code Assignment

Network Algorithms for Homeland Security

On the independence number of graphs with maximum degree 3

Computer Communications

What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, G. Trédan. Misleading stars

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Math 179: Graph Theory

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Hyacinth An IEEE based Multi-channel Wireless Mesh Network

Simplified External memory Algorithms for Planar DAGs. July 2004

Protracted Network: Quality of Service

On the Unique Games Conjecture

Steiner Tree Approximation via IRR. Randomized Rounding

THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM

TORA : Temporally Ordered Routing Algorithm

On 2-vertex-connected orientations of graphs

Chapter 6: Graph Theory

CSC 373: Algorithm Design and Analysis Lecture 16

Protein Protein Interaction Networks

Graph Theory Applications in Network Security

Graph Theory Problems and Solutions

Lecture 2 Introduction to Data Flow Analysis

A Study of Sufficient Conditions for Hamiltonian Cycles

NodeXL for Network analysis Demo/hands-on at NICAR 2012, St Louis, Feb 24. Peter Aldhous, San Francisco Bureau Chief.

Simple Graphs Degrees, Isomorphism, Paths

Analysis of Algorithms, I

A 2-factor in which each cycle has long length in claw-free graphs

Data Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining

A Fast Algorithm For Finding Hamilton Cycles

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

Graph Powers: Hardness Results, Good Characterizations and Efficient Algorithms. Dissertation

Finding and counting given length cycles

Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005

Option 1: empirical network analysis. Task: find data, analyze data (and visualize it), then interpret.

Computer Science Department. Technion - IIT, Haifa, Israel. Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Graph Theory Algorithms for Mobile Ad Hoc Networks

Regular Augmentations of Planar Graphs with Low Degree

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

Capacity of Inter-Cloud Layer-2 Virtual Networking!

Network Flow I. Lecture Overview The Network Flow Problem

DATA ANALYSIS II. Matrix Algorithms

A Graph-Theoretic Network Security Game

Social and Economic Networks: Lecture 1, Networks?

Routing and Packet Forwarding

Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Energy Efficient Monitoring in Sensor Networks

CSE 4351/5351 Notes 7: Task Scheduling & Load Balancing

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Transcription:

Priority Based Enhancement of Online Power-Aware Routing in Wireless Sensor Network Ronit Nossenson Jerusalem College of Technology COMCAS 2011 1

What are sensor networks? Infrastructure-less networks Typically connects a large number of small static nodes capable of: Sensing Processing information Storing information Wireless communication Limited power Power Aware routing Ronit Nossenson COMCAS 2011 2

The goal To maximize the network lifetime of on-line power-aware routing algorithm The lifetime of a network with respect to a sequence of messages is the earliest time when a message cannot be sent due to saturated nodes NP-hard problem [Li, Aslam, Rus]: no on-line routing algorithm has a constant competitive ratio in terms of the lifetime of the network Ronit Nossenson COMCAS 2011 3

The optimization problem Let m 1, m 2, be a sequence of messages to be delivered between nodes in the network (on-line routing) We wish to: Maximize the number of delivered messages in the system Subject To: (1) message m s from v i to v j can be delivered iff a) m 1,, m s-1 are successfully delivered; and b) There exists at least one path from v i to v j with enough power to deliver the message m s (2) the total power used to send all messages from node v i does not exceed the initial power of v i Ronit Nossenson COMCAS 2011 4

The means Priority based enhancement to on-line power - aware routing algorithms The node priority assignment is driven from the network connectivity model It represents the importance of the node in the network topology structure Ronit Nossenson COMCAS 2011 5

The induced graph A vertex: a node An edge: a wireless link A vertex weight: the node's power level (finite) An edge weight: the power cost of sending a unit message (w = kd c ) Ronit Nossenson COMCAS 2011 6

Connectivity definitions (1/2) Let G(V,E) be an undirected connected graph A minimal edge-cut C of G is an edge set whose removal disconnects G and removal of any proper part of C does not disconnect G If C = k then C is called a k-cut, 1-cut is also called a bridge Ronit Nossenson COMCAS 2011 7

Connectivity definitions (2/2) Two vertices {u,v} are called k-connected if no k'-cut, k' < k, separates u from v The equivalence classes of this relation are called k-classes The partition of V into the (k+1)-classes is a refinement of the partition of V into k-classes. Thus, the connectivity classes have a hierarchical structure Example: {1,2,3,4,5,6} are in the same 2-class; This 2-class is divided into three 3-classes: {1,2,4,5}, {3}, and {6} Ronit Nossenson COMCAS 2011 8

Connectivity models (1/3) For a k-connected graph, its connectivity model represents both its (k+1)-classes and its k-cuts The well known bridge-tree model of a 1-connected graph represents its bridges and its 2-classes [Westbrook and Tarjan] Ronit Nossenson COMCAS 2011 9

Connectivity models (2/3) The cycle-tree model of a 2-connected graph represents its 2-cuts and its 3-classes [Galil and Italiano] Cycle-tree = each edge participates in one cycle the number of edges is O( V ) v 1 v 2 a) The induced graph v ={v 1,v 2 } b) The cycle-tree Ronit Nossenson COMCAS 2011 10

Connectivity models (3/3) These connectivity models are, in fact, special cases of a more general cactus-tree model [Dinic, Karzanov and Lomonosov] We use: the bridge-tree and the cycle-tree This connectivity model represents two levels of connectivity the 1-classes, their partition refinement of 2-classes, the 1-cuts and the 2-cuts A special case of the two-level cactus-tree model of [Dinitz and Nutov] Ronit Nossenson COMCAS 2011 11

Example Important observation: edges of this connectivity model are real network edges! Ronit Nossenson COMCAS 2011 12

The priority enhancement (1/2) Vertex which is attached to a bridge receives the highest priority (red color) Vertex which is attached to an edge from the cycletree receives a medium priority level (yellow color) Others receive low priority (green color) Ronit Nossenson COMCAS 2011 13

The priority enhancement (2/2) The routing algorithm prefers paths with low priority nodes (a to b) Initial power assignment according to nodes priority Ronit Nossenson COMCAS 2011 14

Connectivity models references E. A. Dinic, A. V. Karzanov and M. V. Lomonosov, On the structure of the system of minimum edge cuts in a graph Ye. Dinitz and Z. Nutov, A 2-level cactus tree model Z. Galil and G. F. Italiano, Maintaining the 3- edge-connected components of a graph on line J. Westbrook and R. E. Tarjan, Maintaining bridge-connected and bi-connected components on line Ronit Nossenson COMCAS 2011 15

Questions? nossenso@jct.ac.il Ronit Nossenson COMCAS 2011 16