topology control and mobility management in mobile ad hoc networks fei dai and jie wu department of...
Post on 21-Dec-2015
212 views
TRANSCRIPT
![Page 1: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/1.jpg)
Topology Control and Mobility Management in
Mobile Ad Hoc NetworksFei Dai and JIe Wu
Department of Electrical and Computer EngineeringNorth Dakota State University
Department of Computer Science and EngineeringFlorida Atlantic University
![Page 2: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/2.jpg)
2
Mobile Ad Hoc Networks
Infrastructure-less multi-hop wireless networks formed by mobile nodes
Challenges Frequent topology changes Lack of central control Limited network resources
Energy Bandwidth Computing power
![Page 3: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/3.jpg)
3
Topology Control (TC)
Goal Reduce transmission range (r) while
maintaining network connectivityMotivation
Energy efficiency ETx r (2 4) r=10, single hop: ETx 1000 (=3) r=1, 10 hops: ETx 10
Channel spatial reuse Interference Area r2
![Page 4: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/4.jpg)
4
TC (Continued)
Method Each node collects information of 1-hop
neighbors using “Hello” beacons Select a few logical neighbors from 1-hop
neighbors Adjust transmission power to cover only logical
neighborsLogical Topology
Virtual network formed by logical links (i.e., links between logical neighbors)
![Page 5: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/5.jpg)
5
TC Example
Original topology Logical topology
1-hop neighbors
logical neighbors
![Page 6: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/6.jpg)
6
Existing TC Protocols
Select logical neighbors using local info. Relative neighborhood graph (RNG) Minimal energy mobile wireless network and
extensions (LSPT) Local minimum spanning tree (LMST) Yao graph Cone-based topology control (CBTC)
![Page 7: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/7.jpg)
7
Relative Neighbor Graph (Toussaint, 1980)
Remove link (u,v) if …w s.t.
du,v > du,w and du,v > dw,v
where
du,v = dist. from u to v
From v’s view u is a non-logical neighbor
u
v
w
logical neighbors
logical links
![Page 8: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/8.jpg)
8
Yao Graph
Divide neighborhood into 6 cones
Select a nearest node from each cone as logical neighbor
A special case of RNG Incremental search
Until one neighbor detected in each cone
u
v
w1
w2w3
w4 w6
w5
Cone 1
![Page 9: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/9.jpg)
9
Minimal Energy Mobile Wireless Network (Rodoplu and Meng, 1999)
MEMWN Logical neighbors forms a
closure outsider j, insider k
s.t. Ei,j > Ei,k + Ek,j
Extension (Li and Halpern, 2001) Construct a shortest path from
current node to each 1-hop neighbor w.r.t. Tx power
First hop relays are logical neighbors
Closure j
![Page 10: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/10.jpg)
10
Cone-Based Topology Control(Li and Halpern, 2001)
Find k logical neighbors that are Nearest to the current
node The maximal cone width
2/3Improve Yao graphExtension
4/5 with some additional constraint
v
w1
w2
w3
w4
![Page 11: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/11.jpg)
11
Local Minimal Spanning Tree (Li, Hou, and Sha, 2003) LMST
Formed by shortest links Connect all 1-hop neighbors Logical neighbors are MST
neighbors In other words …
Remove link (u,v) if
exist w1, w2,…, wk s.t. du,v > du,w1 du,v > dw1,w2 … du,v > dwk,v
u
v
w1 w2
w3
w4
Local MST
![Page 12: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/12.jpg)
12
LMST Example
u
v
w
6
5
4
u
v
w
u
v
w
5
4
u
v
w
5
4
u
v
w
5
4
Original topology Logical topology
Local MSTs at nodes u, v, and w
removed linklogical link
6 6
![Page 13: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/13.jpg)
13
Summary: Link Removal Rule
Detect loops (u, w1, w2,…, wk, v) within 1-hop neighborhood
Break loop by removing a link (u,v) with the highest cost Cu,v
Some criteria break more loops than the others
Guarantees connectivity in static networksWhat if the network is not static?
![Page 14: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/14.jpg)
14
TC in Mobile Networks
Inaccurate position information Actual transmission range may not cover all
logical neighbors Solution: slightly increase the actual
transmission range (buffer zone)
Inconsistent local view Simultaneous removal => disconnection Solution: enforce view consistency
![Page 15: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/15.jpg)
15
Outdated Information
Link (v,w) is broken after w moves out of v’s transmission range
u
v
w
6
4
u
v
w
5
4
movement
![Page 16: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/16.jpg)
16
Solution: Buffer Zone
Increase the actual transmission range r by l to create a buffer zone that tolerate node movement
l=dt, where t is the maximal relative moving speed, and d is the maximal delay
Using a l<dt is possible
u
v
w
5
4
r
r+l
![Page 17: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/17.jpg)
17
Local view
Inconsistent Local Views
u
vw
6
5
4movement
5
Local MSTs at nodes u and v
u
v
w
5
4
u
v
w5
4
simultaneous removal
6
6
Original topologyu
v
w
Logical topology
u
v
w
“Hello” msg
Δ
Decision making times
t
![Page 18: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/18.jpg)
18
Strong View Consistency(Wu and Dai, 2004)
Solution All nodes exchange
“hello” messages at control period (h)
Decisions are made at the beginning of each data period (d)
Problems “Hello” message
collision Require synchronous
clocks
u
v
w
Δt
h d
“Hello” interval
control period data period
![Page 19: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/19.jpg)
19
Asynchronous Solution(Dai and Wu, 2005)
Enhanced local view Use history information
Enhanced link removal rule Make conservative decisions
Weak view consistency Guarantee connectivity in spite of mobility and
asynchronous decision making
![Page 20: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/20.jpg)
20
Enhanced Local View
Contain k recent “Hello” messages Up to k2 cost values for each link (u,v)
Max(Cu,v): maximum cost in current local view Min(Cu,v): minimum cost in current local view MinMax(Cu,v): minimum Max(Cu,v) in all local views MaxMin(Cu,v): maximum Min(Cu,v) in all local views
u
v
w
t
kΔEnhanced local view
![Page 21: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/21.jpg)
21
Enhanced Link Removal Rule
A link (u,v) can be removed, if a loop (u, w1, w2,…, wk, v) exist, and
Min(Cu,v) > Max(Cu,wi), Max(Cw1,w2), …, Max(Cwk,v)
Previous example reconsidered Cannot remove (u,w): Min(Cu,w) < Max(Cv,w)
Cannot remove (v,w): Min(Cv,w) < Max(Cu,w)
u
vw
6
5
4
u
v
wmovement
5
![Page 22: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/22.jpg)
22
Weak View Consistency
Local views are weakly consistent, if MinMax(Cu,v) >= MaxMin(Cu,v) for all (u,v)
Put together Two “Hello” messages from each neighbor are
enough to guarantees connectivity
Theorem: Applying enhanced link removal rule using weakly consistent local views guarantees connectivity
Theorem: Applying enhanced link removal rule using weakly consistent local views guarantees connectivity
Theorem: Enhanced local views containing two recent “Hello” messages are weakly consistent.
Theorem: Enhanced local views containing two recent “Hello” messages are weakly consistent.
![Page 23: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/23.jpg)
23
Simulation
Simulator: ns2 Simulated algorithms
MST: local minimal spanning tree RNG: relative neighborhood graph SPT: local shortest spanning tree with link cost d2
(a=2) and d4 (a=4), where d is distance. Mobility model
Random waypoint, avg. speed 1-160m/s Ideal MAC layer without collision/contention Connectivity ratio: (pairs of connected nodes) / (total node pairs)
![Page 24: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/24.jpg)
24
TC Protocols Under Mobile Environment
Fragile: very sensitive to mobility
![Page 25: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/25.jpg)
25
Buffer Zone Width
Connectivity ratio increased as buffer zone width increases
Buffer zone alone does not guarantee connectivity
![Page 26: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/26.jpg)
26
Consistent Views
Using consistent views improves connectivity ratio significantly
![Page 27: Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State](https://reader031.vdocuments.site/reader031/viewer/2022032801/56649d565503460f94a337e5/html5/thumbnails/27.jpg)
27
Conclusion
In MANETs, TC may cause Insufficient actual transmission power Disconnected logical topology
Weak consistency scheme Guarantee connectivity using 2 recent “Hello”
messages No synchronization overhead Slightly increase the number of logical links Enhance many existing TC protocols
Future directions Fault tolerance against collision