Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Similar documents
From Shared Memory to Message Passing

Sensor Network Gossiping or How to Break the Broadcast Lower Bound

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Mathematical Problems in Networked Embedded Systems

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Monitoring Churn in Wireless Networks

Wireless Networks Do Not Disturb My Circles

Information flow over wireless networks: a deterministic approach

Bit Reversal Broadcast Scheduling for Ad Hoc Systems

Time-Optimal Information Exchange on Multiple Channels

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua

Efficient Symmetry Breaking in Multi-Channel Radio Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Clock Synchronization

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14

CS434/534: Topics in Networked (Networking) Systems

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri

Convergence in competitive games

CS 787: Advanced Algorithms Homework 1

Broadcast in the Ad Hoc SINR Model

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical

MAC Theory. Chapter 7

Acknowledged Broadcasting and Gossiping in ad hoc radio networks

A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks

Green Codes : Energy-efficient short-range communication

Wireless in the Real World. Principles

Distributed Local Broadcasting Algorithms in the Physical Interference Model

Network-Wide Broadcast

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Self-Stabilizing Deterministic TDMA for Sensor Networks

Data Dissemination in Wireless Sensor Networks

Pattern Avoidance in Poset Permutations

Lecture on Sensor Networks

Randomized broadcast in radio networks with collision detection

Online Call Control in Cellular Networks Revisited

Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks

CSCI 1590 Intro to Computational Complexity

Low-Latency Multi-Source Broadcast in Radio Networks

Sensor Networks. Distributed Algorithms. Reloaded or Revolutions? Roger Wattenhofer

Achieving Network Consistency. Octav Chipara

Probabilistic Coverage in Wireless Sensor Networks

Radio Aggregation Scheduling

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane

A Randomized Algorithm for Gossiping in Radio Networks

Lecture 7: The Principle of Deferred Decisions

TSIN01 Information Networks Lecture 9

Chapter 16. Waves and Sound

Skip Lists S 3 S 2 S 1. 2/6/2016 7:04 AM Skip Lists 1

2 I'm Mike Institute for Telecommunication Sciences

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Clock Synchronization

Online Frequency Assignment in Wireless Communication Networks

Candidate: Dragan Trajkov. Mentor: Dr. Jim Roberts

Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

An evolution of a permutation

The Worst-Case Capacity of Wireless Sensor Networks

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18

Some results on optimal estimation and control for lossy NCS. Luca Schenato

Robust Location Detection in Emergency Sensor Networks. Goals

Computing functions over wireless networks

Interference-Aware Broadcast Scheduling in Wireless Networks

FTSP Power Characterization

Routing Messages in a Network

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

A Bit of network information theory

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization

Local Broadcast in the Physical Interference Model

Efficiency and detectability of random reactive jamming in wireless networks

Game Theory and Randomized Algorithms

Lecture 2. 1 Nondeterministic Communication Complexity

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba

PHED: Pre-Handshaking Neighbor Discovery Protocols in Full Duplex Wireless Ad Hoc Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

Nonuniform multi level crossing for signal reconstruction

Mobile Communications

CONVERGECAST, namely the collection of data from

Interference: An Information Theoretic View

Synchronization and Beaconing in IEEE s Mesh Networks

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation

Rumors Across Radio, Wireless, and Telephone

Harvesting a Clock from a GSM Signal for the Wake-Up of a Wireless Sensor Network

Adaptive Sensor Selection Algorithms for Wireless Sensor Networks. Silvia Santini PhD defense October 12, 2009

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Chapter 10. User Cooperative Communications

Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo

Lecture 5 Transmission

Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network

Scheduling broadcasts with deadlines

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1

Localization in Wireless Sensor Networks

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

Part I: Introduction to Wireless Sensor Networks. Alessio Di

Transcription:

Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009

Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental phenomena communicate over wireless channels Typically, listening or transmitting 100 expensive than idle CPU or radio switched off. Radio use computation cost

Goals System designers: power down radios as much as possible Successful communication requires synchronization of radio devices

Previous Literature Extensively studied in practice - deployment and clock synchronization of wireless sensor networks: McGlynn and Borbash 2001, Tseng, Hsu and Hseih 2003, PalChaudhuri and Johnson 2004, Moscibroda, Von Rickenbach and Wattenhofer 2006, Sundararaman, Buy and Kshemkalyani 2005.

Two processors case Warm-up: assume (for now) two processors clocks are at most n steps apart processors should try to synchronize within 4n steps

Picture Interpretation 1 CPU and CLOCK start 2 radio power ON 3 radio power OFF 1 2, 3

Good Solution Which awake solutions are good? Those that for any shift between 1 and n will always meet (remember that strings are of length at least 4n).

Good Solution Which awake solutions are good? Those that for any shift between 1 and n will always meet (remember that strings are of length at least 4n).

bad solution for 2 strings: shift=10

Density of Strings We discretize time to short intervals: put 1 when radio is ON, put 0 when radio is OFF. Clearly, if we set all bits at positions 1 to n to one, then all right shifts from 1 to n will result in meeting of two strings. Q What is the smallest density needed such that, all right shifts from 1 to n result in meeting of two strings?

Density of Strings We discretize time to short intervals: put 1 when radio is ON, put 0 when radio is OFF. Clearly, if we set all bits at positions 1 to n to one, then all right shifts from 1 to n will result in meeting of two strings. Q What is the smallest density needed such that, all right shifts from 1 to n result in meeting of two strings?

Density of Strings We discretize time to short intervals: put 1 when radio is ON, put 0 when radio is OFF. Clearly, if we set all bits at positions 1 to n to one, then all right shifts from 1 to n will result in meeting of two strings. Q What is the smallest density needed such that, all right shifts from 1 to n result in meeting of two strings?

Example of a Good Solution For n = 36 we now consider two identical strings of the length 2n + 4 n + 2 = 98. Then for any of 1,..., 36 right shifts, the following two strings meet.

good solution for 2 strings: shift=0

good solution for 2 strings: shift=1

good solution for 2 strings: shift=10

good solution for 2 strings: shift=17

good solution for 2 strings: shift=25

good solution for 2 strings: shift=32

good solution for 2 strings: shift=36

We explain how to derive the good solution, and do so deterministically. First, let us define the model.

Model and Problem Statement m radio devices Each device starts at an arbitrary time {0, 1, 2,..., n} n is maximal initial clocks difference At each time unit, device can be awake or sleeping Goal: Adjust clocks for all m devices, under objective to minimize radio use per processor, (i.e. the total time of radio being awake) Extension 1: Interference if exactly two awake processors, then they can communicate with each other Extension 2: Model can capture different clocks speeds and interference

Model and Problem Statement m radio devices Each device starts at an arbitrary time {0, 1, 2,..., n} n is maximal initial clocks difference At each time unit, device can be awake or sleeping Goal: Adjust clocks for all m devices, under objective to minimize radio use per processor, (i.e. the total time of radio being awake) Extension 1: Interference if exactly two awake processors, then they can communicate with each other Extension 2: Model can capture different clocks speeds and interference

Model and Problem Statement m radio devices Each device starts at an arbitrary time {0, 1, 2,..., n} n is maximal initial clocks difference At each time unit, device can be awake or sleeping Goal: Adjust clocks for all m devices, under objective to minimize radio use per processor, (i.e. the total time of radio being awake) Extension 1: Interference if exactly two awake processors, then they can communicate with each other Extension 2: Model can capture different clocks speeds and interference

Main Results Our bounds on the optimal radio use, per processor, in order to synchronize the network: Two processors, optimal use: Ω( n) deterministic lower bound matching deterministic O( n) upper bound Arbitrary m = n β processors: ( ) Ω n 1 β 2 the lower bound for any deterministic protocol ( ) nearly-matching O n 1 β 2 poly-log(n) for randomized protocol, whp If m is not known: We can repeat the previous bullet O(log n) times, and estimate the value of m.

Main Results Our bounds on the optimal radio use, per processor, in order to synchronize the network: Two processors, optimal use: Ω( n) deterministic lower bound matching deterministic O( n) upper bound Arbitrary m = n β processors: ( ) Ω n 1 β 2 the lower bound for any deterministic protocol ( ) nearly-matching O n 1 β 2 poly-log(n) for randomized protocol, whp If m is not known: We can repeat the previous bullet O(log n) times, and estimate the value of m.

Main Results Our bounds on the optimal radio use, per processor, in order to synchronize the network: Two processors, optimal use: Ω( n) deterministic lower bound matching deterministic O( n) upper bound Arbitrary m = n β processors: ( ) Ω n 1 β 2 the lower bound for any deterministic protocol ( ) nearly-matching O n 1 β 2 poly-log(n) for randomized protocol, whp If m is not known: We can repeat the previous bullet O(log n) times, and estimate the value of m.

Main Results Our bounds on the optimal radio use, per processor, in order to synchronize the network: Two processors, optimal use: Ω( n) deterministic lower bound matching deterministic O( n) upper bound Arbitrary m = n β processors: ( ) Ω n 1 β 2 the lower bound for any deterministic protocol ( ) nearly-matching O n 1 β 2 poly-log(n) for randomized protocol, whp If m is not known: We can repeat the previous bullet O(log n) times, and estimate the value of m.

Lower Bound The density of strings is small there is a shift such that the strings do not meet. Lemma (Two Non-Colliding Strings) For any absolute constant C 1/ 2, and for every L-bit string with l L/C ones, there is at least one shift within L/(2C 2 ), such that the string and its shifted copy do not meet.

Lower Bound The density of strings is small there is a shift such that the strings do not meet. Lemma (Two Non-Colliding Strings) For any absolute constant C 1/ 2, and for every L-bit string with l L/C ones, there is at least one shift within L/(2C 2 ), such that the string and its shifted copy do not meet.

Proof Outline Consider an L-bit string, with l ones. Inspect the set of differences among the positions of these l ones in the string. There are L of these differences (because of the density of ones in the string). Choose an integer from {1,..., L} not in the set of differences and shift the string for that number to the right. Now, the strings do not meet!

Matching Upper Bound for Two Processors We now show the upper bound and give the deterministic algorithm for two devices.

Matching Upper Bound for Two Processors Theorem For any n, there exists a string of length W = 2n + 4 n + 2 with at most 4 n + 4 ones such that this string will overlap itself for all shifts from 1 to n. Proof Outline Set the bits at positions: (i n + i) and (i n) to 1, for i {1,..., 2 n + 2 } Set the remaining bits to 0 We show that for any shift from 0 to n, two strings of the length W meet with probability 1

Matching Upper Bound for Two Processors Theorem For any n, there exists a string of length W = 2n + 4 n + 2 with at most 4 n + 4 ones such that this string will overlap itself for all shifts from 1 to n. Proof Outline Set the bits at positions: (i n + i) and (i n) to 1, for i {1,..., 2 n + 2 } Set the remaining bits to 0 We show that for any shift from 0 to n, two strings of the length W meet with probability 1

Algorithm for many processors The main observation is that if there are many processors, each one must use its radio much less! We, in fact, show nearly matching (within poly-log) upper and lower bounds. Main insight: make every processor connect to only a few other random processors. Since there are lots of processors, this will happen with much fewer radio invocations.

Algorithm for many processors Why is connecting to only a few other random processors is a good idea? This creates an expander graph with high probability, where adjacent nodes are synchronized. We can now run classical synchronization protocols over expander graph. Small diameter of expander fast synchronization!

Algorithm for many processors Lower bond for m > 2 is more involved, see the paper. Our results also extend to the radio broadcast model where in the case of interference only noise is heard.

Protocol that does not need to know m (the number of processors) Why should we care about not knowing m? If m is large, radio use is also small, so we do not have to spend lots of energy! The bigger m, the less energy (per device) we need to spend communicating. How do we estimate m?

Protocol that does not need to know m (the number of processors) First, assume that m is large, say m = n poly-log(n). If we did not underestimate m, we could run the protocol for known m and then count the number of nodes. If the number of nodes is greater than our estimate of m we are done. If not, cut the estimate of m and try again. The key observation is the energy of the next round is far greater then all the previous rounds combined, so the most expensive (last round) is the only one that counts!

Conclusion and Open Questions 2-processor case: Matching deterministic upper and lower bound. Multi-processor case: Lower bound for a deterministic protocol. Nearly matching upper bound for a randomized protocol. Questions: Deterministic protocols for multi-processors case? Close the gap for randomized setting. We can ask many other distributed computing questions in this model.

Thank You