35
Locating and Bypassing Routing Holes in Senso r Networks Authors: Qing Fang, Jie Gao a nd Leonidas J. Guibas Presented by: Yinfei Pan

Locating and Bypassing Routing Holes in Sensor Networks

Embed Size (px)

DESCRIPTION

Locating and Bypassing Routing Holes in Sensor Networks. Authors: Qing Fang, Jie Gao and Leonidas J. Guibas Presented by: Yinfei Pan. Introduction. Sensor networks Usually vast in their scale Lost cost per node mostly static Energy is an very important consideration - PowerPoint PPT Presentation

Citation preview

Page 1: Locating and Bypassing Routing Holes in Sensor Networks

Locating and Bypassing Routing Holes in Sensor Networks

Authors: Qing Fang, Jie Gao and Leonidas J. Guibas

Presented by: Yinfei Pan

Page 2: Locating and Bypassing Routing Holes in Sensor Networks

Introduction

• Sensor networks– Usually vast in their scale– Lost cost per node – mostly static– Energy is an very important consideration

• routing cannot be too heavy– AODV, DSR, and Flooding may have more cost– Need new routing mechanism design

• Geographical Routing may be a good choice

Page 3: Locating and Bypassing Routing Holes in Sensor Networks

GPSR

• Location of the destination node is assumed to be known

• Each node knows location of its neighbors

• Each node forwards a packet to its neighbor closest to the destination (greedy forwarding)

• If routing holes are found, uses perimeter routing

Page 4: Locating and Bypassing Routing Holes in Sensor Networks

GPSR

• Perimeter routing requires the maintenance of the underlying planar graph (too expensive in sensor networks)

• In fact, perimeter routing are not used most of the time– Karp and Kung’s results show that most forwarding is

through greedy forwarding– So, keeping a planar graph at every node all the time,

which is used only occasionally seems unnecessary.

Page 5: Locating and Bypassing Routing Holes in Sensor Networks

The Purpose of This Paper

• Situation: packet stuck at a node all of whose 1 hop neighbors are further away from the destination (Local minimum)

• Find underlying geometric properties behind the local minimum phenomenon.– Seemingly unorganized structures have struct

ures– Explore holes in sensor networks

• A closed cycle with no self intersections bounding a closed region

Page 6: Locating and Bypassing Routing Holes in Sensor Networks

Why Holes Important

• Geographic multi-cast: routing to a geographic region

• Detection of the boundary of disaster regions

• Geographic properties of the underlying terrain

• Detecting regions with low sensor density due to depletion of node power.

• Information storage mechanisms

Page 7: Locating and Bypassing Routing Holes in Sensor Networks

What’s Done by This Paper

• Incorporate stuck nodes into routing research

• Local TENT rule to determine whether a node is a stuck node

• Find holes: BOUNDHOLE (a distributed algorithm)

Page 8: Locating and Bypassing Routing Holes in Sensor Networks

First Method to Identify Holes• Definitions

– Weak stuck node P• P is the closest node to node Q (among P’s neighbors), and

Q is out of the communication range of P (Assume each has radius 1)

• Q is called black node

P

J

H

Q

Page 9: Locating and Bypassing Routing Holes in Sensor Networks
Page 10: Locating and Bypassing Routing Holes in Sensor Networks

Holes Finding• S is a set of nodes

• Vornoi Diagram partitions plane into Vornoi cells (All points within a cell are closest to only one node)

• Delaunay triangulation: connecting nodes that are in adjacent cells (dual graph of Vornoi)

• Delaunay triangle has “emptycircle” property– circumcircle contains no node

s of S inside

Page 11: Locating and Bypassing Routing Holes in Sensor Networks

Holes Finding

• In the Delaunay triangulation if all the edges adjacent to a node p are not longer than 1, then P is not a stuck node (within communication range)

• Possible stuck nodes: nodes with at least one adjacent delaunay edges longer than 1.

Page 12: Locating and Bypassing Routing Holes in Sensor Networks

Holes Finding

• Restricted Delaunay Graph (RDG): A sub graph of DT with only edges <=1 are kept.

• A hole is a face in the RDG with at least 4 vertices.

Page 13: Locating and Bypassing Routing Holes in Sensor Networks

Drawback of The First Method

• The algorithm for computing the Delaunay triangulation is a centralized algorithm– a heavy algorithm for sensor networks

• the set of nodes identified using this method, is a super set of the set of real weak stuck nodes.

• the destination may not be a node in the network,– You just want you data multicast to a specific region

Page 14: Locating and Bypassing Routing Holes in Sensor Networks
Page 15: Locating and Bypassing Routing Holes in Sensor Networks

Improved Method to Identify Holes

• Strong Stuck nodes– Node p if there exists a location q outside p’s transmission r

ange so that no neighbor of p is closer to q than itself.– Collection of Qs is called black region– So this strong definition is in fact to extend one black point to a

black region (Includes weak def.)

P

J

HBlack Region

Q

Page 16: Locating and Bypassing Routing Holes in Sensor Networks
Page 17: Locating and Bypassing Routing Holes in Sensor Networks

TENT Rule

• For each p, order all of its neighbors counterclockwise

• For each adjacent pair (u, v) draw perpendicular bisector of the two edges with p (u, p) (v p)

• These intersect at a center O. If O is in communication range of p, then no black region (all in communication range)

• We say p cannot be stuck in the direction upv

Page 18: Locating and Bypassing Routing Holes in Sensor Networks

TENT Rule

• Define a stuck angle at a node p is the angle spanned by a pair of adjacent neighbors of node p in which the direction of p becomes the local minimum (no neighbor in this area was found to be more closer to the destination)

• A node is strong stuck if it has at least one stuck angle• If angle upv is <120 degrees, p cannot be stuck (just the

point black region disappear)• a node can have at most 3 stuck directions• The computation of TENT Rule can be preformed with o

nly information on 1-hop neighbors.

Page 19: Locating and Bypassing Routing Holes in Sensor Networks

Possible Stuck Node v

Page 20: Locating and Bypassing Routing Holes in Sensor Networks

Holes Finding

• BOUNDHOLE– Simply greedy sweeping algorithm– Hole is a closed region bounded by a non self interse

cting polygonal loop– A hole H belongs to a strong stuck node v if H is identi

cal to the loop formed by BOUNDHOLE starting at v– u is an upstream node of v if u is the previous hop nei

ghbor sharing same boundary of a Hole with v in a clockwise order

– When finding a hole’s boundary, the right-hand side of the edge is inside the hole

Page 21: Locating and Bypassing Routing Holes in Sensor Networks

BOUNDHOLE

• Assume P is a stuck node, stuck direction is spt1

• Step 1. use the right hand rule starting at t1. Take the t2 by sweeping from p counterclockwise.

• Step 2. Continued until pt1t2 … tk goes back to p

• Step 3: Solve Edge Intersection (next slide)

Page 22: Locating and Bypassing Routing Holes in Sensor Networks

BOUNDHOLE

• tj tj+1 intersects ti ti+1 There are two cases– tj not visible to ti and ti+1, Delete ti+1… tj+1 and continue

• Form a new sequence of t0t1 · · · (ti)(tj+1)(tj)

Page 23: Locating and Bypassing Routing Holes in Sensor Networks

BOUNDHOLE

• Intersects solving (cont.)– ti not visible to tj and tj+1, take ti+1 as the next hop for tj

• Form a new sequence of t0 · · · (tj)(ti+1)(ti)

Page 24: Locating and Bypassing Routing Holes in Sensor Networks

BOUNDHOLE Can Work

• For each three consecutive nodes in the sequence, the third one is not visible to the first one.

• Each node one the boundary of hole appear at most 6 times (prove see paper since too complex)

• So, in generating the sequence, we are indeed making progresses, and when travel through the boundary, we are in an finite set.

Page 25: Locating and Bypassing Routing Holes in Sensor Networks

BOUNDHOLE is Distributed

• One stuck direction is simple and localized.

• The computation at each node depends only on the 1-hop neighbors. Thus the algorithm is distributed

• Thus, this method scales well to large networks

Page 26: Locating and Bypassing Routing Holes in Sensor Networks

Result (Tighter than Delaunay Triangulation)

Page 27: Locating and Bypassing Routing Holes in Sensor Networks

Optimizations

• Suppressed Start– The Hole finding stages

• Initially gather 1-hop info• Then run TENT to determine if it is a stuck node• BOUNDHOLE begin to find boundary of hole

– Stuck nodes initiate messenger packet in direction of being stuck.

• Consider the graph in next slide

Page 28: Locating and Bypassing Routing Holes in Sensor Networks

Suppressed Start

• All stuck nodes compute same hole (see left)• Duplication causes unnecessary traffic• So, assign each init package an ID, then drop redundant

packets– When package comes from ingress edge that an earlier messen

ger packet with a lower ID has taken, drop it.

Page 29: Locating and Bypassing Routing Holes in Sensor Networks

Wrong Case

• See right, consider two loop: j – l – n – o – p – i - j and loop k – m – n – o – p – i – j – k

• We have problem! k try to identify its hole, but its package will be dropped by o, p, or I

• How to fix: Set an Enforce Bit to not drop– Is this method actually solve the problem??

Page 30: Locating and Bypassing Routing Holes in Sensor Networks

Node failures• Failures can create new holes

and change boundaries of existing holes

• periodically broadcast to its neighbors, if no response for 3 times, then do BOUNDHOLE NOTICE: To deal with Node failures, the enforce bit must be set this time

• However, won’t this cause more communication cost for only one node change– My suggestion: Use enforce state,

not just a bit, when BOUNDHOLE in this case met the common edge stop the hole finding process and we still could get a hole correct whole loop

Page 31: Locating and Bypassing Routing Holes in Sensor Networks

Routing Stages

• Greedy forwarding as GPSR• Get stuck: route the packet along the boun

dary of the hole. • When gets to a node more closer to destin

ation, back to Greedy forwarding• If inside the hole but not reachable after to

ur around the boundary, do "flooding“– Can compute the better side by storing shape

of the hole

Page 32: Locating and Bypassing Routing Holes in Sensor Networks

Conclusion

• Information saving and computing is only on problematic parts of the network– only node on the body of a hole need to store

additional information• upstream and downstream neighbors• boundary sharing• he shape of the boundary (optional)

• Result: energy saving, low memory demand, fast response

Page 33: Locating and Bypassing Routing Holes in Sensor Networks

Contribution

• Initiate research on studying the structures of sensor networks

• Provide an effective method to explore such structure

• Problems & Improvement see the following slides …

Page 34: Locating and Bypassing Routing Holes in Sensor Networks

Problems & Improvement Suggestions on this paper

• Lack simulation results - only some topology graphs are available

• To find hole, it is necessary for the use of suppressed start, but as the paper itself shows, this is problematic and enforce bit seems do not solve the problem at all (When to set that bit in general case?)

• The underlying assumption of this paper, which we can say the fundamental issue of this paper is the communication range is an ideal circle which is not true in real world, so, this need to be improved

• Improvement suggestion see next slide …

Page 35: Locating and Bypassing Routing Holes in Sensor Networks

Problems & Improvement Suggestions on this paper

• One stuck node own a hole, and there are many nodes on the boundary, is the hole be found actually like the physical structure? Highly untenable.

• Improvement Suggestion: In fact, this paper based on an ideal circle as the communication range, so the TENT Rule in fact is just to rule out all the possibility inside the communication range of a node since those nodes must not be in a void area which identified in this paper as a hole. For most of the other nodes which do not comply the TENT Rule, this paper in fact assumes them as in void region, so it get a super set of actual holes. In real world, communication range definitely is NOT that ideal and link quality is also a very important issue, the basic ideal of TENT Rule is still great valuable, but we can improve it, and make it more complex by incorporation the real geometrical shape of communication range.