1 / 28

Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets

Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Presented by Jing Sun Computer Science and Engineering Department University of Conneticut. Geographic routing. +Highly scalable O(1) route discovery O(1) routing table

Download Presentation

Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets Presented by Jing Sun Computer Science and Engineering Department University of Conneticut

  2. Geographic routing • +Highly scalable • O(1) route discovery • O(1) routing table • Path lengths are close to the shortest path • -Each node should node its geographic coordinates • -Greedy forwarding can be suboptimal because it does not use real connectivity info.

  3. Motivation for BVR • Simple – minimal complexity, with minimal assumptions about radio quality, presence of GPS, … • Scalable – low control overhead, small routing tables • Robust – node failure, wireless vagaries • Efficient – low routing stretch

  4. The BVR Network:

  5. Introduction of BVR

  6. Introduction of BVR – Cont. • 4 pieces • Deriving positions • Forwarding rules • Beacon Maintenance • Lookup: mapping node IDs  positions • Used from other work: • Reverse path trees construction (Directed Diffusion) • Consistent hashing to map node identities to its current coordinates

  7. Beacon-Vector: deriving positions • Randomly select nodes as beacons. The beacon vectors serve as coordinates • r beacon nodes (B0,B1,…,Br) flood the network; • P(q), a node q’s position, is its distance in hops to each beacon P(q) =  B1(q), B2(q),…,Br(q)  • k, p, C(k,p), Node p advertises its coordinates using the k closest beacons (we call this set of beacons C(k,p)) • Nodes know their own and neighbors’ positions • Nodes also know how to get to each beacon

  8. Beacon-Vector: forwarding • Define the distance between two nodes P and Q as • To reach destination Q, choose neighbor to reduce distk(*,Q) • If no neighbor improves, enter Fallback mode: route towards the beacon which is closer to the destination • If Fallback fails, and you reach the beacon, do a scoped flood

  9. Modeling The Forwarding Algorithm The sum of the differences for the beacons that are closer to the destination d than to the current routing node p The sum of the distances to the farther beacons We want to minimize:

  10. Fallback towards B1 Example B1 B2 0,3,3 3,0,3 1,2,3 2,1,2 1,3,2 2,2,2 2,3,1 3,2,1 3,3,0 B3

  11. Beacon maintenance • Route based on the beacons the source and destination have in common • Does not require perfect beacon info. • Each entry in the beacon vector has a sequence number • Periodically updated by the corresponding beacon • Timeout • If the #beacons < r, non-beacon nodes nominate themselves as beacons • Set a timer that is a function of its unique ID • If there’re more than r beacons • A beacon stop being a beacon if there’re more than r beacons with smaller IDs

  12. Location directory • First look up the destination coordinates by name • Hashing H: nodeid → beaconid [14] • Use beacons as storage • Each node k that wants to be a destination periodically publishes its coordinates to its corresponding beacon bk = H(k) • When a node wants to route to node k, it sends a lookup request to bk • Cache the coordinates

  13. Simulation Results • Assumptions for high level simulation • Fixed circular radio range • Ignore the network capacity and congestion • Ignore packet losses • Place nodes uniformly at random in a square planner region • 3200 nodes uniformly distributed in a 200 * 200 unit area • Radio range is 8 units • Vary #total beacons and #routing beacons

  14. Greedy success rate

  15. Success ratio given 10 routing beacons, node density per tx range

  16. On-demand two hop neighbor acquisition • At lower densities, each node has fewer immediate neighbors • The performance of greedy routing drops • Add a neighbor’s neighbors to the routing table, if greedy forwarding is impossible

  17. 1-Hop v.s. 2-Hop

  18. #beacons required to achieve less than 5% scoped floods

  19. Performance under obstacles • Place horizontal & vertical walls with lengths of 10 or 20 units when the radio range is 8 units. BVR (True Positions)

  20. Transmission stretch over the shortest path

  21. Prototype evaluation • Office-Net: 42 mica2dot motes in a 20m * 50m office • Univ-Net: 74 mica2dot motes deployed across multiple student offices on a single floor in a UC Berkeley building

  22. Office-Net Routing performance with 5 beacons

  23. Univ-Net Routing performance with 5 beacons

  24. Office-Net success rate upon node failure. 5 beacons

  25. Impact of Beacon Failures, 100 nodes, 8 beacons

  26. Questions? • Thank you!

  27. Example Route from 3,2,1 to 1,2,3

  28. Other Routing Protocols • Shortest Path • Scalability O(n2) message and O(n) routing state • Hierachical • Less message. O(nlogn) message and O(logn) message. • Maintainence issue. • Geographic Routing • O(1) and O(1) • Assumes fixed radio range • Require each node knows its geographic coordinates • Doesn’t consider real radio connectivity

More Related