Surviving Holes and Barriers in Geographic Data Reporting for Wireless Sensor Networks Yangfan Zhou1, Michael R. Lyu1, and Jiangchuan Liu2 1Dept. of Comp. Sci. & Eng., The Chinese University of Hong Kong, Hong Kong 2School of Comp. Sci., Simon Fraser University, Canada Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 1 Outlines Outlines Ø Ø Ø Ø Ø Background and motivations of this work Our proposed waypoint-based geographic data reporting protocol (GDRP) Demonstration of GDRP Simulation studies Conclusions Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 2 Background and Motivations Geographic Forwarding Ø Greedy forwarding v v v Ø A node finds out its nearest neighbor to the sink If the neighbor is nearer to the sink than the node, forward packet via it Otherwise, ?? (Network holes or barriers) Detour-mode forwarding v v Planarize the network à planar graph Route packets along the face of the graph towards the sink Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 3 Background and Motivations Geographic Forwarding The detour-mode forwarding tends to forward data packets along the boundaries of holes. à The path from the source to the destination is much longer than the optimum. à More energy consumption in data collection. Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 4 Background and Motivations Waypoint-based geographic forwarding Ø Ø Find a waypoint sequence [w(1), w(2), ..., w(M)] where w(1) is the source and w(M) the destination Forward packets via the waypoint sequence one by one v Packets are transported between two adjacent waypoints with a geographic forwarding scheme. ■ Minimize the unnecessary detours so that the path can bypass holes and barriers. ■ Waypoints: Calculated with a trial-and-error approach - Better and better waypoint sequences will be worked out gradually Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 5 Background and Motivations d (destination) d (destination) u6 u5 u10 u4 Hole 2 u9 u3 Hole 1 u2 u1 u8 w(4) Hole 3 w(1) Hole 2 w(2) Hole 1 w(3) w(5) u7 s (source) (a). A network scenario where greedy forwarding results in suboptimal path. s (source) (b). A network scenario where routing along the convex hull causes suboptimal results. Existing schemes may result in suboptimal paths Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 6 Part II GDRP: An Waypoint-based Geographic Data Reporting Protocol for Wireless Sensor Networks Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 7 Geographic Data Reporting Protocol (GDRP) Waypoint-Based Geographic Forwarding Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 8 When a Path is Acceptable strongly perfect sequence Ø Ø It is a greedy-forwarding path from the first node to the last node Given an x-y coordinate system with its x-axis passing the first and the last nodes, the maximum difference of the y-coordinates between any two nodes in the sequence is no more than d = a · r, where a is a constant and r is the communication range. Acceptable Path Ø A path is acceptable when the path segments between Ø two adjacent waypoints are strongly perfect sequence Why? Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 9 When a Path is Acceptable Definition The topological length of a path is the total number of hops between the source and the destination of the path Energy consumption in data forwarding Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 10 When a Path is Acceptable Lemma The topological length of a path is bounded by times the Euclidean distance between the source and the destination if the path is a strongly perfect sequence Corollary If a path between two nodes is a strongly perfect sequence, the topological length of the path is not larger than times that of their shortest path Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 11 When a Path is Acceptable Lemma The topological length of a path is bounded by times the Euclidean distance between the source and the destination if the path is a strongly perfect sequence Strongly perfect sequence Ø Suppose the path is [u0, u1, …, destination] Ø Draw circles centered at uk when k is odd, with the radii being r/2 Ø Ø These circles cannot intersect These circles must be in the rectangle area with length and width being l and (a+1)r Maximum # of such circles Topologic length of the path Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 12 When a Path is Acceptable Corollary If a path between two nodes is a strongly perfect sequence, the topological length of the path is not larger than times that of their shortest path 1. The topologic length of a strongly perfect sequence 2. The topologic length of the shortest path is lower-bounded by Hence, the topologic length of a strongly perfect sequence will not be worse than times the shortest path Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 13 Waypoint Calculation Waypoint calculation Ø Ø Ø In each round, based on the current knowledge of the holes and barriers, find a best set of waypoints for the next round Purpose: make the packets bypass the known holes and barriers so as to minimize the topological length of the path found in the next round How? Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 14 Waypoint Calculation When a path is not an acceptable path Ø Ø Ø There are holes or barriers in between the source and the destination At least one path segment between a pair of adjacent waypoints is not a strongly perfect sequence The impact of holes or barriers can be modeled as how they make the path segment “imperfect” - Find which parts of the segment make it fail to be a strongly perfect sequence Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 15 Waypoint Calculation Perfect sequence Ø Ø Similar to strongly perfect sequence With only one difference: It is not necessary that the last second node is connected with the last node. - It is not necessary to be a “path” perfect sequences: [w, u1, u2,w’] [u4, u5, u6,w’] [u8, u9, u10, w’] [u2, u3, u4] and [u6, u7, u8] make the whole path segment fail to be a strongly perfect sequence Holes and barriers Ø Ø Call these parts detour parts Save these parts: they are the current Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 16 Waypoint Calculation Problem 1: Who should be the potential waypoints 1. The last node in a detour part should be a potential waypoint 2. The first node in a detour part should be a potential waypoint Reason: The hole or barrier does not influence the path any longer from the node on Reason: The node can avoid the detour part by forwarding packets to another direction Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 17 Waypoint Calculation Ø Now we have a set of the potential waypoints, how to select a waypoint sequence for Ø the next round? We expect in the next round, we can find an acceptable path v v v Construct a graph G(V, E) - V: the set of the potential waypoints - E: two nodes in G share an edge if the line segment between them does not intersect a known detour part The waypoint sequence should be a path for the source to the sink in G(V, E) The waypoint sequence forms the shortest path from the source to the sink Hence, the waypoint sequence for the next round is [w, u2, u8, w’] Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 18 Geographic Routing between Waypoints Routing between adjacent waypoints Ø Geographic forwarding - Detour-mode forwarding: routing along the face of the planar graph counter-clockwise or clockwise - Use one as default. Change if required by a waypoint (when it is a starting node of a detour part) Still a light-weighted protocol for sensor nodes Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 19 Part III A Case Demonstration Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 20 GDRP Demo A case demonstration: round 1 This path segment make the whole path fail to be a strongly perfect sequence Nodes 1 and 2 are then potential waypoints, because they are the first node and the last node of the detour part Construct the waypoint graph Find the shortest path from the source to the sink. Hence, the new waypoint for the next round is [source, destination] Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 21 GDRP Demo A case demonstration: round 2 Again, we will reach this node, since it is the starting node of a detour part, it will route the packet to another direction This path segment make the whole path fail to be a strongly perfect sequence Node 3 is then a potential waypoint. Because node 1 is the first node of two detour parts, it means it cannot bypass a hole or barrier by routing packets to another direction. So it is removed from the potential waypoint set. Construct the waypoint graph Find the shortest path from the source to the sink. Hence, the new waypoint for the next 22 Mobile Ad Hoc and Sensor 2009, Macau, China round isSystems, [source, node 3, destination] GDRP Demo A case demonstration: round 3 Now packets will be sent to node 3 first. This path segment make the whole path fail to be a strongly perfect sequence Nodes 4 is then a potential waypoint. Construct the waypoint graph, find the shortest path from the source to the sink. Hence, the new waypoint for the next round is [source, node 2, destination] Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 23 GDRP Demo A case demonstration: round 4 Now packets will be sent to node 2 first. These path segments between adjacent waypoints are both strongly perfect sequences We are done! We can see that the resulting path is comparable to the shortest path Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 24 Part IV Simulation Results Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 25 Simulation Studies Protocols in simulation study Ø Ø Ø GDRP (Geographic Data Reporting Protocol): Our protocol GPSR (Greedy Perimeter Stateless Routing): Traditional geographic forwarding CONVEX-W - Waypoint-based geographic forwarding - Packets are forwarded along the convex hull of the known holes Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 26 Simulation Studies Simulation settings Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 27 Simulation Studies Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 28 Simulation Studies Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 29 Conclusions Ø Ø We propose a waypoint-based geographic forwarding protocol We prove the performance guarantee of our protocol Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 30 Thank you!!! Q&A Mobile Ad Hoc and Sensor Systems, 2009, Macau, China 31
© Copyright 2025 Paperzz