1 / 35

Exploration of Path Space using Sensor Network Geometry

Exploration of Path Space using Sensor Network Geometry. Ruirui Jiang, Xiaomeng Ban, Mayank Goswami , Wei Zeng , Jie Gao , Xianfeng David Gu Stony Brook University. Prob1: Scalable Multipath Routing. Deliver data using multiple (disjoint) paths Improving throughput Lower delay

mead
Download Presentation

Exploration of Path Space using Sensor Network Geometry

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban, MayankGoswami, Wei Zeng, JieGao, Xianfeng David Gu Stony Brook University

  2. Prob1: Scalable Multipath Routing • Deliver data using multiple (disjoint) paths • Improving throughput • Lower delay • Improving data security • Encode data and send different segments along different paths • Q: How to generate multiple paths? • t • s

  3. k Node Disjoint Paths • Centralized solutions • Flow algorithm, node disjoint paths, O(n3) • Distributed solutions • Only exist for 2 node disjoint paths. • Relaxation: braided multi-paths. • High discovery costs.

  4. Prob2: Fast Recovery from Failures • Sudden node or link failure • Link quality fluctuates. • Unpredictable inference, e.g., hidden terminal problem • 802.15.4 networks interfering with WiFi [MT 08] • Jamming attacks • Q: how to quickly generate an alternative path? R. Musaloiu-E, A. Terzis, Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks, International Journal of Sensor Networks, 3(1):43-54, 2008.

  5. Prior Work • IP fast re-routing schemes • Avoid loop? • Path splicing [SIGCOMM 08] • Perturb edge weights • Compute multiple shortest path trees for each root • Switch to another SPT under in-transit failures • Storage requirement is too high for sensornet. Motiwala, Elmore, Feamster, Vempala, Path splicing, SIGCOMM Comput. Commun,. Rev., 2008

  6. Understanding of the Path Space • Where are the paths connecting source and destination? • How to quickly find them? • How to minimize storage/computation costs? • Multipath routing using greedy routing? • Find an embedding, route to the neighbor closer to destination.

  7. Our Solution: Using Circular Domains • Our previous work: deform a network into circular domain [IPSN’09]. • Greedy routing guarantees delivery. 

  8. Circular Domains are not Unique • Embedding into a circular domain is not unique, they differ by a Möbius transformation. 

  9. Main Idea: Use Different Metrics • Find multiple paths: • Embed to a circular domain D. • Apply Mӧbius transformation f on D: f(D) • Find greedy routing in f(D). • Goal: find disjoint paths. • Recover from link failure: • Apply a Mӧbius transformation f on D: f(D) • Goal: greedy routing on f(D) does not use the broken link.

  10. Outline • Mӧbius transformation • Explain the idea in a continuous domain • Theoretical guarantee • Implementation issues on a discrete network • Simulation results

  11. Möbius Transform • Möbius transform • Conformal: maps circles to circles • Four basic elements: translation, dilation, rotation, inversions. a, b, c, d are 4 complex numbers, ad ≠ bc

  12. Outline • Mӧbius transformation • Explain the idea in a continuous domain • Theoretical guarantee • Implementation issues on a discrete network • Simulation results

  13. Greedy Paths in Different Circular Domains • Generate disjoint paths using different transformations • t • f1 • s • t • s

  14. Greedy Paths in Different Circular Domains • Generate disjoint paths using different transformations • s • f2 • s • t • t

  15. Isn’t This Just Routing along Arcs? • One can greedily route along an arc. [NN, 03] • But there is no guarantee of delivery! • Our method follows an arc, which is actually the greedy route in another circular domain. • Delivery is always guaranteed. Nath and Niculescu, Routing on a curve, SIGCOMM Comput. Commun. Rev., 2003.

  16. Networks with Holes • When a circular arc route hits a hole, it is diverted along the boundary • Two paths can converge on the boundary • s • t

  17. Finding Disjoint Paths • Each hole defines two angle ranges • Inside each range there can only be one path • Goal: find a max number of paths.

  18. Finding Disjoint Paths • Project all intervals on a unit circle • Order the endpoints angularly. • Adjacent endpoints define canonical segments. • Remove canonical segments NOT covered by any range

  19. Finding Disjoint Paths • Greedy algorithm: • For each segment as the starting segment, • Choose it, move clockwise. • Choose the first one not in conflict • Ex: choose 5.

  20. Finding Disjoint Paths • Greedy algorithm: • Different starting segments give different solns. • Take the solution with maximum # segments • Theorem: GREEDY is optimal.

  21. Outline • Mӧbius transformation • Explain the idea in a continuous domain • Theoretical guarantee • Implementation issues on a discrete network • Simulation results

  22. Preprocessing Into a Circular Domain • Embed the network into a circular domain • Follows [IPSN’09] • Compute a triangulation locally • Non-triangular faces are “holes” • Nodes locally compute curvature • Modify edge lengths iteratively • When converge, obtain the requested embedding • Distributed, gossip-style algorithm.

  23. How to compute a Mӧbius Transformation? • Uniquely determined by mapping 3 points z1, z2, z3, to w1, w2, w3, respectively. • I.e., mapping one circle to another circle

  24. How to compute a Mӧbius Transformation? • New metric can be locally determined. • p • t • f1 • p • s • t • s

  25. Generate Multiple Paths • No holes: • Evenly spread the tangent vectors of the paths at source and dest. • Heuristic • Bounded degree. • With holes: • Know: locations & sizes of holes • Very limited global info • s • t

  26. How to Apply the Mӧbius Transformation in Routing? • A packet carries the four parameters a, b, c, d as a matrix. • Composition of 2 transformations is simply matrix multiplication

  27. Recovery from Temporary Link Failure • We compute a Möbiustransformation • S.t. the broken link is NOT on the greedy path. • Make big jumps

  28. Recovery from Temporary Link Failure • Map the “live” neighbor p to be on the straight path • On-demand recovery of in-transit failures. • Möbius transform attached to packet. • t • f1 • p • p • s • t • s

  29. Simulation Results • Relatively dense network: • 1K nodes, avgdeg≈ 20. • Multi-path routing • Compare with centralized flow algorithm. • Vary parameter m: # paths we seek. • Check # disjoint paths we got • Compare with the OPT.

  30. Multipath Routing Results Max # disjoint paths

  31. Simulation Results for Recovery from Failures • Regional failure • Inside a geometric region: prob[failure] = p1. • Outside a geometric region: prob[failure] = p2. • p1> p2. • Compare with • Greedy routing with geographical coordinates • Greedy routing in a circular domain • Recovery with Möbius transformation • Recovery with random walk.

  32. Simulation Results for Recovery from Failures • Circular + Möbius > Circular + RandWalk > Circular >> Geographical + RandWalk ≈ Geographical • Random walk makes local, random steps and is likely trapped inside the failure region • p1=0.8 p2=0

  33. Simulation Results for Recovery from Failures • Success rate: Circular + Möbius > Circular + RandWalk > Circular Circular + RandWalk Circular + Möbius • p1 p2 Circular Consistently better by making big jumps

  34. Conclusion and Future Work • Regulating a sensor network shape • Helps to explore path space with limited global info • Open problem: bridging the gap • Provable results in the continuous space • Heuristic methods in the discrete network

  35. Questions & Comments?

More Related