Topological Hole DetectionPaperMotivationSlide 4Other UsesAssumptionsThe continuous caseDiscrete CaseSlide 9Slide 10AlgorithmsBeacon SelectionDistributed ImplementationApplication: Landmark Selection in GLIDERSlide 15Problems of unaware Landmark-SelectionSlide 17Solution: First AttemptSolution: Second AttemptMore ApplicationsEvaluation: UDG - randomEvaluation: UDG - gridEvaluation: Non-UDGConclusionThank You!Topological Hole DetectionRitesh MaheshwariCSE 590PaperS. Funke, “Topological Hole Detection and its Applications”, DIALM-POMC, 2005.Basically, aim is to identify which nodes form the boundary, outer or inner (of holes), in a wireless sensor networkMotivationImagine a remote nature preserveLong summer drought, resulting inWildfires!Airplanes dropping thousands of cheap sensor nodes, so that the sensor network:Organizes itself, routes messagesIdentifies current firefrontAnswers Queries efficientlyMotivationImagine a remote nature preserveLong summer drought, resulting inWildfires!Airplanes dropping thousands of cheap sensor nodes, so that the sensor networkOrganizes itself, routes messagesIdentifies current firefront => Hole Detection!Answers Queries efficientlyOther UsesProvide topology information to Location unaware protocols like GLIDERHelp in Landmark selection for GLIDERBetter Virtual coordinates in absence of Location InformationAssumptionsRegion REvery point in R is covered for sensing by atleast one sensorUsually comm range larger than sensing rangeUnit Disk GraphNo location informationOnly connectivity information availableThe continuous caseA beacon pointConstruct contours of Euclidean distance from beaconObservation: contours usually break at boundaryDiscrete CaseNo ‘points’ – only sensor nodesNo ‘distance’ measurement – only hop-countConnected Components of same hop-count from beacon form contoursDiscrete CaseBeacon – node pdp(v) is hop-count from p to node vI(k) = { v : dp(v) = k} is isoset of level kI(k) may be disconnected, so resulting connected components are called C1(k), C2(k), C3(k)…..Discrete CaseBoundary nodes are now the end nodes of the Connected Components - C1(k), C2(k) etcPick random node r in Ci(k) and find nodes in Ci(k) with highest hop-count from r Usually, one beacon is not enough. They use 4AlgorithmsBeacon SelectionThe 4 beacons should be as far away as possibleChoose 1st beacon randomlyOther 3 chosen on the basis of their distance from the 1st beaconDistributed ImplementationTopology exploration done only rarelyThus naïve implementation suitsCan be done by Flooding a constant number of timesApplication: Landmark Selection in GLIDERLandmarks divide the network into tiles using Voronoi diagramsLocal coordinate system constructed within each tileWhen p in tilep wants to send packet to q in tileq,Inter-tile: Packet is routed to a neighboring tile which is nearer to tileq than tilep and so onIntra-tile: When reaching tileq, local coordinate system used to route to qProblems of unaware Landmark-SelectionProblems of unaware Landmark-SelectionSolution: First AttemptObservation: If 2 landmarks are on same hole boundary, then the hole cannot be totally inside one tileSolution: Second AttemptHole Repulsion and PruningMore ApplicationsTo find Virtual Coordinates in presence of holesMedial-Axis-Based RoutingEvaluation: UDG - randomEvaluation: UDG - gridEvaluation: Non-UDGConclusionSimple protocolOnly Connectivity info requiredHole detection => Event detectionBut useful only for dense networksNot that bad, as they assume cheap sensorsThank
View Full Document