Xiaofeng Han, Xiang Cao, Errol L

Slides:



Advertisements
Similar presentations
KAIST CS712 병렬처리 특강 차세대 무선 네트워크 및 보안 동향 Syllabus Network & Security Lab.
Advertisements

김예슬 김원석 김세환. Info Northcutt Bikes Northcutt Bikes The Forecasting problem The Forecasting problem The solution 1~6 The.
2 전기회로의 기초 기초전자회로 PPT. ○ 생체의공학과 송지훈 35%
Maximum Flow.
Hourglass-A library for incremental processing on Hadoop
CS710 컴퓨터구조 특강 - 차세대 무선네트워크 및 보안 -
Sources of the Magnetic Field
Chapter 7 ARP and RARP.
스테레오 비젼을 위한 3장 영상의 효율적인 영상정렬 기법
Shortest Path Algorithm
사우스웨스트 항공사 동기부여 프로그램 사례 분석.
Chaper 2 ~ chaper 3 허승현 제어시스템 설계.
Battery-Dynamics Driven TDMA MAC Protocols for Wireless Body-Area Monitoring Networks in Healthcare Applications Hang Su, Student Member, IEEE, and Xi.
Multimedia Lab. Introduction
Ubiquitous Computing - Concepts -
REINFORCEMENT LEARNING
유비쿼터스 네트워크 연구실 (Ubiquitous Network Lab) Since 1994
7장 : 캐시와 메모리.
Ch.04 Greedy Method (탐욕적 방법)
CHAP 10:그래프 순천향대학교 하상호.
Chapter 2 OSI 모델과 TCP/IP 프로토콜.
Directed Diffusion for Wireless Sensor Networking
On the computation of multidimensional Aggregates
포항공과대학교 COMPUTER VISION LAB. 석박통합과정 여동훈
(Network Transaction Application Server)
쉽게 배우는 알고리즘 9장. 그래프 알고리즘.
Dynamic Programming.
Ch. 10 Algorithm Efficiency & Sorting
Ch. 10 Algorithm Efficiency & Sorting
통신과 통신망 (Communication & Networks)
알고리즘(Algorithm) – Greedy Method (탐욕적 방법)
Chapter 10 그래프(graph) SANGJI University Kwangman KO
Chapter 2. Finite Automata Exercises
Discrete Math II Howon Kim
제 3 장 신경회로망 (Neural Networks)
숭실대학교 마이닝연구실 김완섭 2009년 2월 8일 아이디어  - 상관분석에 대한 연구
발표자 : 홍익대학교 소프트웨어 공학 연구실 변은영 지도교수 : 김영철
10장. 그래프 알고리즘.
Cognitive radio Either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with.
KMS 구현 및 활용사례 경쟁력 강화를 위한 2002년 5월 28일(화) 김 연 홍 상무 / 기술사
Parallel software Lab. 박 창 규
CHAPTER 6 그래프.
Professional Sales Negotiations
Data Mining Final Project
자료구조(SCSC) Data Structures
제6장 교착상태 OS 컴퓨터 운영체제 Operating Systems
Congestion Control for Vehicular Safety:
Chi-Kin Chau, Member, IEEE, Fei Qin, Samir Sayed, Muhammad
Ch.03 Dynamic Programming (동적 프로그래밍 or 동적 계획법)
Discrete Math II Howon Kim
Dynamic Programming.
Operating System Multiple Access Chatting Program using Multithread
Optimal placement of MR dampers
그래프와 트리 (Graphs and Trees)
이산수학(Discrete Mathematics)
MR 댐퍼의 동특성을 고려한 지진하중을 받는 구조물의 반능동 신경망제어
Internet Computing KUT Youn-Hee Han
CHAP 10 : 그래프.
Analysis and Testing of Programs with Exception-Handling Constructs
점화와 응용 (Recurrence and Its Applications)
이산수학(Discrete Mathematics)
The general form of 0-1 programming problem based on DNA computing
4. 분자 상호 작용의 네트워크 분석 4.1 네트워크 표현과 계산
Presentation by Timothy Kane
Hongik Univ. Software Engineering Laboratory Jin Hyub Lee
Dynamic Graph Query Primitives for SDN-based Cloud Network Management Ramya Raghavendra, Jorge Lobo, Kang-Won Lee 2012 HotSDN 정보통신공학과.
Peer-to-Peer SIP Network Using Distributed Hash Table
[CPA340] Algorithms and Practice Youn-Hee Han
Chapter 2. Coulomb’s Law & Electric Field Intensity
Chapter 7: Deadlocks.
Presentation transcript:

Fault-tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks Xiaofeng Han, Xiang Cao, Errol L. Lloyd, and Chien-Chung Shen [Delaware University] INFOCOM 2007 전산학과 강유화 2008. 12. 11.

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Contents Introduction Network Model and Preliminaries One-way Partial Fault-tolerance Relay Node Placement Two-way Partial Fault-tolerance Relay Node Placement One-way and Two-way Full Fault-tolerance Relay Node Placement Heuristic Implementations Experimental Results Conclusion Discussion CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Introduction Fault tolerance in wireless sensor networks Energy depletion Harsh environment Malicious attacks One approach to achieve fault tolerance in WSN to deploy a small number of additional relay nodes to provide k (k ≥ 1) vertex-disjoint paths between every pair of functioning devices Relay node placement full fault-tolerance relay node placement (FFRP) partial fault-tolerance relay node placement (PFRP) relay node placement has also been studied in two-tiered homogeneous wireless sensor networks CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 3

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Problem definition Heterogeneous wireless sensor networks (H-WSNs) The different transmission radii of target nodes introduce asymmetric communication links One-way / Two-way partial fault-tolerance relay node placement (One-way / Two-way PFRP). One-way / Two-way full fault-tolerance relay node placement (One-way / Two-way FFRP). Contribution O(σk2) approximation algorithms for both One-way PFRP and Two-way PFRP; O(σk3)approximation algorithms for both One-way FFRP and Two way FFRP evaluate heuristic implementations of the proposed algorithms CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 4

Proposed two-tier (cluster-based) architecture “Fault-Tolerant Clustering of Wireless Sensor Networks” G.Gupta and Mohamed Yunis, 2003 IEEE proceedings of WCNC Relay node Sensor node

Network Model and Preliminaries Terms, Symbols and their Semantics CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 6

Network Model and Preliminaries One-way Steinerization. (Equation 1) Two-way Steinerization: (Equation 2) CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 7

Network Model and Preliminaries Minimum k-Vertex Connected Spanning Graph An important problem related to the relay node placement is to find a minimum k-vertex connected spanning graph (MKCSG). MKCSG problem is to compute a k-vertex connected spanning graph For undirected graphs, when k ≥ 2, this problem is NP-hard, For directed graphs, this problem is Np hard when k ≥ 1. CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 8

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 One-way PFRP One-way Partial k-Vertex Connected Graph O(σk2)-approximation algorithm. CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 9

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 One-way PFRP Definition 3.8: [Relay Component][5] We start at r (relay node), travel along each edge incident to r in G If we meet a relay node, we repeat the process; if we meet a target node, we stop. all of the nodes (target or relay) and edges visited in this recursive process form a relay component of r. Definition 3.3: [Super Path][4] G = (V ∪ R, E) be a one-way partial k-vertex connected graph for V a one-way path PG(u, v) in G is a super path, if u and v are target nodes and every interior node (if any) of PG(u, v) is a relay node Every relay node placed by Algorithm 1 is on exactly one super path → → CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 10

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Two-way PFRP Two-way partial k-vertex connected graph O(σk2)-approximation algorithm. CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 11

One-way and Two-way PFRP CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 12

One-way and Two-way PFRP Algorithm 3 for One-way (Two-way) FFRP In Step 6, Algorithm 3 connects the relay nodes on PG(u, v) with u and v as well as their in-neighbors and out-neighbors [full-connection] In Step 7, Algorithm 3 tests each cluster of relay nodes deployed in Step 6, and removes the cluster if the graph of the resulting network remains a directed k-vertex connected graph. O(σk3)-approximation algorithm. → CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 13

Heuristic Implementations Most existing approximation algorithms for MKCSG problem quite complicated and difficult to implement in computation- and communication constrained sensor networks Motivated by the heuristic algorithms, greedy heuristic algorithm as a practical alternative for the MKCSG problem repeatedly add the edges that can best help to improve the graph connectivity until the graph becomes k-vertex connected. Definition 7.1: [Contribution]: In a graph that is not k-vertex connected, the connectivity between node pairs is lower than k. unsaturated node pairs. The contribution of an edge uv (or uv) is defined as the number of unsaturated node pairs whose connectivity can be improved by the deployment of edge uv (or uv) in this graph. → → CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 14

Heuristic Implementations CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 15

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Experimental Results Performance of our algorithms using heuristic implementations Qualnet 3.8[9] as the simulation platform. Randomly place target nodes in a 1000m × 1000m 2D terrain To model a H-WSN, we set T (min) = 200m and T (max) = 500m, and let every target node use a random transmission radius between T (min) and T (max) in each simulation. CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 16

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Experimental Results The number of relay nodes first increases, then decreases One-way FFRP algorithm requires 5.9 times and 10.2 times more relay nodes than the One-way PFRP algorithm Two-way FFRP algorithm requires 4.6 times and 7.7 times more relay nodes than the Two-way PFRP algorithm CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Experimental Results The case of k = 4, N (target node) stands for the network size In a sparse network with 20 target nodes, when T(relay) increases from T (min) to T (max), and the number of relay nodes computed by the One-way and the Two-way PFRP algorithms drops 36% and 42% In a dense network with 60 target nodes, the performance of the One-way and the Two-way PFRP algorithms remain stable. CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 18

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Conclusions Addresses the problem of deploying a minimum number of relay nodes to achieve diverse levels of fault-tolerance in the context of heterogeneous wireless sensor networks Develop approximation algorithms O(σk2) approximation algorithms for one-way and two way partial fault-tolerance relay node placement O(σk3)- approximation algorithms for one-way and two-way full fault tolerance relay node placement. To support real applications, provide heuristic implementations of these algorithms performance of the proposed algorithms is much better than the performance ratios derived CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 Discussion Energy efficiency? One relay node failure? Survivability: ensure alternate path exists for sensor nodes when one of the relay nodes fail Convergence time in simulation result Locally optimal relay node placement in heterogeneous wireless sensor networks GLOBECOM 2005 Quanhong Wang   Kenan Xu   Takahara, G.   Hassanein, H.   Dept. of Electr. & Comput. Eng., Queen's Univ., Canada CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안

CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 References [4] E. L. Lloyd and G. Xue, “Relay node placement in wireless sensor networks,” IEEE Transactions on Computers, vol. 56, pp. 134–138, 2007. [5] J. L. Bredin, E. D. Demaine, M. Hajiaghayi, and D. Rus, “Deploying sensor networks with guaranteed capacity and fault tolerance,” in ACM MobiHoc, 2005 CS710 컴퓨터구조 특강 – 차세대 무선네트워크 및 보안 21

INFOCOM 2007 Session 47: Sensor Networks IV Fault-Tolerant Relay Node Placement in Wireless Sensor Networks: Problems and Algorithms Weiyi Zhang, Guoliang Xue, Satyajayant Misra (Arizona State University, US) Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li (University of Toronto, CA) Fault-tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks Xiaofeng Han, Xiang Cao, Errol Lloyd, Chien-Chung Shen (University of Delaware, US) Optimal Policies for Distributed Data Aggregation in Wireless Sensor Networks Zhenzhen Ye, Alhussein Abouzeid, Jing Ai (Rensselaer Polytechnic Institute, US)