Professional Documents
Culture Documents
Adhoc
Adhoc
Adhoc
Application
5
Sensor Network
Protocols Routing 3
Topology
Control
1 Medium Access 2 Power
Link layer
Control Control
4
Fundamental limits of ad hoc networks
Hidden Terminal
A B C
Exposed Terminal
A B C D
• No carrier sense
• Collision avoidance using RTS/CTS handshake
– Sender sends Request-to-Send (RTS)
• Contains length of transmission
– If receiver hears RTS and not currently deferring,
sends Clear-to-Send (CTS)
• Also contains length of transmission
– On receiving CTS, sender starts DATA transmission
• Any station overhearing an RTS defers until a
CTS would have finished
• Any station overhearing a CTS defers until the
expected length of the DATA packet
A B C
RTS
A B C
DATA
A B C D
CTS
A B C D
DATA
A B C D
DATA RTS
A B C D
DATA CTS
A B C D
DATA
B C D E
RTS
RTS
DATA
ACK
RTS
RTS
RTS
No Transmit
Busy?
frame
Yes
Max No Double
Wait inter- window? window
frame period
Yes
Max No Discard
Increment Wait attempt? packet
attempt U[0,W]
Yes
Increment
attempt
• Model assumptions:
– No hidden terminal: all users can hear one
another
– No packet capture: all receive powers are
identical
– Saturation conditions: queue of each station
is always nonempty
• Parameters:
– Packet lengths (headers, control and data)
– Times: slots, timeouts, interframe space
0 123 45
Bianchi 00
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 33
Steady State Analysis
• Two probabilities:
– Transmission probability
– Collision probability p
• Analyzing the Markov chain yields an
equation for in terms of p
• However, we also have
1
1 (1 )
• Solve for and p
Bianchi 00
250m
Transmission
range
550m
Sensing/interference range
RTS
A B C D
CTS
A B C D
DATA
A B C D
DATA
A B C D
DATA RTS
A B C D
• Path loss:
– Ratio of received power to transmitted
power
– Function of medium properties and
propagation distance
• If PR is received power, PT is the
transmitted power, and d is distance
( )
• where ranges from 2 to 4
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 55
Interference Models
Pi Pk
³ (1 + D)
d ( X i ,Y ) d ( X k ,Y )
• Individual transmissions:
– Each node decides on a power level on the basis
of contention and power levels of neighbors
• Network-wide task:
– Broadcast
– Multicast
• Static:
– Assign fixed (set of) power level(s) to each node
– Topology control
• POWMAC
• -PCS } Throughput and energy
• PCMA
• PCDC } Dual channel schemes
A B C D
A B C D
• RTS/CTS at Pmax
• For DATA packets:
– Send at the minimum power P needed, as
in the basic scheme
– Periodically send at Pmax, to maintain the
collision avoidance feature of 802.11
• ACK sent at power level P
• Throughput comparable to 802.11
• Significant energy savings [JV 02]
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 64
POWMAC
• To obtain a given
topology H, need
p(u) = max d(u,v)a
(u,v)Î H
• Goal: Construct a
topology that contains
energy-efficient paths
– For any pair of nodes,
there exists a path
nearly as energy-
efficient as possible
• Constraints:
– Sparsity
– Constant degree
– Distributed construction
• Variant of distance-stretch
optimal - distance H (u,v)
max
u,v optimal - distance G (u,v)
L(e) = lune of e
I(e) = {(u,v) Î T : L(e)I {u,v} ¹ Æ} - 1
I(T ) = max I(e)
eÎ T
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 90
Node Interference Number
• Defined by [BvRWZ
04]
• When does an edge
interfere with another
node?
– The lune of the edge
contains the node
L(e) = lune of e
I(e) = L(e) - {u,v}
I(T ) = max I(e)
eÎ T
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 91
Minimizing NIM
• Goal: Determine
connected topology
that minimizes NIM
• I(e) is independent
of the topology
L(e) = lune of e
I(e) = L(e) - {u,v}
I(T ) = max I(e)
eÎ T
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 92
Minimizing NIM
• Set weight of e to be
I(e)
• Find spanning subgraph
that minimizes
maximum weight
– MST!
• Calculating L(e) possible
using local
communication
• Computing an MST
difficult to do locally
• In general, minimizing
NIM hard to do locally
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 93
Sparseness and Interference
(n) O(1)
• Energy consumed by a
broadcast over range r
is proportional to r
• Problem: Compute the
sequence of broadcast
steps that consume
minimum total energy
• Centralized solutions
• NP-complete [ZBH 02]
• Assume ( 1) / 2
nodes per ring
• Total energy of SPT:
( 1)( (1 ) )/2
• Optimal solution: 1
– Broadcast to all nodes
– Cost 1
• Approximation ratio
(n)
• Dependence on
– 2 : in the limit
– 2 : bounded < 12
≥ 60°
Empty
60°
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 103
Upper Bound on Weight of MST
• Assume = 2
• For each edge e, its
diamond accounts for an
area of at least
| e |2 60°
2 3
• Total area accounted
2
for is
at most (2 / 3) = 4p / 3 | e |2
• MST cost equals å | e |
2 å 2 3
£ 4p
e
e
8p
• Claim also applies for 2 å | e |2 £
3
» 14.51
e
Level 2
Level 1
Level 1
• Path loss:
– Ratio of received power to transmitted
power
– Function of medium properties and
propagation distance
• If PR is received power, PT is the
transmitted power, and d is distance
( )
• where ranges from 2 to 4
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 116
Interference Models
Pi Pk
³ (1 + D)
d ( X i ,Y ) d ( X k ,Y )
• Throughput capacity:
– Number of successful packets delivered per second
– Dependent on the traffic pattern
– What is the maximum achievable, over all protocols,
for a random node distribution and a random
destination for each source?
• Transport capacity:
– Network transports one bit-meter when one bit has
been transported a distance of one meter
– Number of bit-meters transported per second
– What is the maximum achievable, over all node
locations, and all traffic patterns, and all protocols?
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 120
Transport Capacity: Assumptions
d ( X i , Y ) (1 )d ( X k , Y )
• Transmissions are in synchronized slots
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 121
Transport Capacity: Lower Bound
sender
receiver
• Sender-receiver distance is (1 / n )
• Assuming channel bandwidth W,
transport capacity is
(W n )
• Thus, transport capacity per node is
W
( )
n
i k
d( j,l ) ³ (1+d)d(i, j)- d(l ,k)
d(l , j) ³ (1+d)d(k,l )- d(i, j)
d
d(l , j) ³ (d(i, j) + d(k,l ))
2
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 126
Transport Capacity: Upper Bound
• Transport capacity:
1
– Per node transport capacity decreases as
n
– Maximized when nodes transmit to
neighbors
• Throughput capacity: 1
– For random networks, decreases as n log n
– Near-optimal when nodes transmit to
neighbors
• Designers should focus on small
networks and/or local communication
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 129
Remarks on Capacity Analysis
• Contention-Based:
– Random access protocols
– IEEE 802.11 with power saving methods
• Scheduling-Based:
– Assign transmission schedules (sleep/awake
patterns) to each node
– Variants of TDMA
• Hybrid schemes
• Collision avoidance:
– Within a listen phase, senders contending to send
messages to same receiver use 802.11
• Overhearing avoidance:
– When a node hears an RTS or CTS packet, then it
goes to sleep
– All neighbors of a sender and the receiver sleep until
the current transmission is over
• Motivation:
– Trade off latency for reduced energy consumption
– Focus on static scenarios
• In S-MAC and TRAMA, nodes exchange local
schedules
• Instead, adopt a global schedule in which data
flows along horizontal and vertical “waves”
• Idea:
– Organize the nodes according to a grid
– Within each cell, run a leader election algorithm to
periodically elect a representative (e.g., GAF)
– Schedule leaders’ wakeup times according to
positions in the grid
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 146
Wave Scheduling: A Simple Wave
QuickTimeª and a
TIFF (LZW) decompressor
are needed to see this picture.
QuickTimeª and a
TIFF (LZW) decompressor
are needed to see this picture.
}
synchronize to S1 S1 S1 S1 S1 S1 Primary
national time
standards S2 S2 S2
– Satellite, radio,
modem
• Secondary servers S2 S2 S2 S2
– Hierarchical subnet S4
(T2 - T1 ) - (T4 - T3 )
2
(T2 - T1 ) + (T4 - T3 )
T1 T4 d=
A 2
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 157
Error Analysis
(T2 - T1 ) - (T4 - T3 ) B
T2 T3
2
(T2 - T1 ) + (T4 - T3 )
d=
2
S A : Sender time at A
RA : Receiver time at A T1 A T4
PA® B : Prop. time for A ®B
SUC : S A - S B
SUC + RUC + PUC
RUC : RB - RA
2
PUC : PA® B - PB® A
ETH Zurich Summer Tutorial Algorithmic Foundations of Ad Hoc Networks 158
Sources of Synchronization Error
• Non-determinism of processing times
• Send time:
– Time spent by the sender to construct packet;
application to MAC
• Access time:
– Time taken for the transmitter to acquire the channel
and exchange any preamble (RTS/CTS): MAC
• Transmission time: MAC to physical
• Propagation time: physical
• Reception time: Physical to MAC
• Receive time:
– Time spent by the receiver to reconstruct the packet;
MAC to application
• Sender-receiver:
– Classical method, initiated by the sender
– Sender synchronizes to the receiver
– Used in NTP
– Timing-sync Protocol for Sensor Networks (TPSN)
[GKS 03]
• Receiver-based:
– Takes advantage of broadcast facility
– Two receivers synchronize with each other based on
the reception times of a reference broadcast
– Reference Broadcast Synchronization (RBS) [EGE 02]
topology
• Level discovery: 2 2 2
sik = sij s jk
ik = Dij s jk + D jk
• Optimal precision:
– Find an unbiased estimate for each pair (sij ,Dij )
with minimum variance
• [KEES 03]
f :Z a Â
f and f ' are nondecreasing
• A function that gives the size of the
aggregated data given the number of items
being aggregated
• Binary aggregation method:
– Find a min-cost matching
– For each pair, select one node at random and make it
the parent of the other
– Repeat the procedure with the parents until have
exactly one node
f :Z a Â
f and f ' are nondecreasing
• Independent of the function f
• Binary aggregation method yields an O(log n)
approximation for any function
– n is the number of nodes
• Can be derandomized to yield the same
asymptotic result
Application
5
Sensor Network
Protocols Routing 3
Topology
Control
1 Medium Access 2 Power
Control Control
4
Fundamental limits of ad hoc networks