Localized Distance-Sensitive Service Discovery in Wireless Sensor Networks ∗ Xu Li

Nicola Santoro

Ivan Stojmenovic

SCS, Carleton University Ottawa, K1S 5B6, Canada

SCS, Carleton University Ottawa, K1S 5B6, Canada

EECE, University of Birmingham Birmingham, B15 2TT, UK

[email protected]

[email protected]

ABSTRACT

[email protected]

In traditional WSNs, nodes are responsible only for sampling their surroundings and reporting to pre-defined data sinks. With advance in robotics, WSNs are now evolving towards service-oriented robotic networks such as mobile sensor networks (MSNs) [5] and wireless sensor and actor networks (WSANs) [1], where some service providers, i.e., mobile sensors or actors, offer movement-assisted services to other nodes and/or to the physical world. In MSNs, redundant sensors can geographically relocate to replace failed ones for coverage maintenance; in WSANs, actors may move to a target location to, e.g., repair faulty sensors, extinguish a fire in a woody area, turn off water tap in cast of wateroverflow, rescue survivors in an emergency situation, etc. Service discovery is a crucial component of any serviceoriented network. Discovery criteria depend on the underlying network and the application. In the above movementassisted service delivery cases, delivery distance is a primary concern for energy-saving and timely response. Further, since we are in the context of WSNs, service discovery must be performed in an efficient way, i.e., with constant storage load on each node and with no global computation. Many generic service discovery algorithms [3, 6] and adoptable techniques [4, 7–9] have been proposed for wireless ad hoc networks. But these algorithms have major weaknesses. In particular, they are not suitable for the problem of distance-sensitive service discovery in resourceconstrained WSNs, where the algorithms are expected to provide closest/nearby service selection guarantee:

In this paper, we identify a new problem in wireless sensor networks, distance sensitive service discovery, where nearby or closest service selection guarantee is expected. We propose a lightweight solution algorithm, iMesh, which uses no global computation and generates constant per node storage load. In iMesh, service providers construct a localized planar structure, information mesh, using the existing blocking rule enhanced with a newly proposed expansion rule. The information mesh possesses good proximity property and serves as service directory. Service consumers conduct a lookup process restricted within their home mesh cells to discover nearby services. We first analytically study its properties over a grid network model. Then we evaluate its performance in randomized network scenarios by extensive simulation. Simulation results indicate that iMesh guarantees nearby (closest) service selection with very high probability > 99% (resp., > 97%) at considerably low message cost.

Categories and Subject Descriptors C.2.2 [Network Protocols]: Applications—Service discovery; C.4 [Performance of Systems]: Design studies

General Terms Algorithms, Performance

Keywords

Definition 1 (Closest Service Selection). A service consumer discovers the closest service provider.

Service discovery, Localized algorithms, Sensor networks

1. INTRODUCTION

Definition 2 (Nearby Service Selection). A service consumer discovers a service provider that is at most twice as far as the closest one.

A wireless sensor network (WSN) is a collection of microsized wireless sensing devices, sensors, deployed in a region of interest for object monitoring and/or target tracking.

Intuitively, if we construct a Voronoi diagram using service providers as creating points and let each of them distribute its location information along the perimeter of its Voronoi polygon, then the Voronoi diagram becomes a distributed service directory with bounded per-node storage load. In this case, distance-sensitive service lookup becomes localized. That is, a service consumer queries along a path in an arbitrary direction, and it will find its closest service provider once it hits the perimeter of its home Voronoi polygon. This intuitive solution possesses all the properties that we are looking for, but it requires global computation. Hence, to make this solution practical, as service directory we must substitute the Voronoi diagram with a localized planar struc-

∗This research was partially supported by the UK Royal Society Wolfson Research Merit Award, and NSERC Strategic Grants STPSC 356913-07 and STPGP 336406-08.

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. FOWANC’08, May 26, 2008, Hong Kong SAR, China. Copyright 2008 ACM 978-1-60558-149-1/08/05 ...$5.00.

85

ture that has good proximity property. A naive idea of improvement is to replace Voronoi digram with square mesh. That is, service providers propagate their location information horizontally and vertically; the propagation paths form a mesh structure as service directory. Although this method requires only local computations, it can generate inconstant storage load on nodes if service providers are all placed in a line, and it has no guarantee on closest/nearby service selection because the mesh structure bears no proximity property. As we show in this paper, it is however possible to modify the mesh-construction technique to obtain a planar structure that (as the mesh but unlike the Voronoi diagram) can be constructed in a purely localized manner and (as the Voronoi diagram but unlike the mesh) possesses our required guaranteed proximity property. The needed modification is the use of distance-based blocking, and has been independently suggested by two groups, Tchakarov and Vaidya [10] and Li, Santoro and Stojmenovic [5]. Their proposals did not however contain any (correct) theoretical analysis of the resulting information structure and its properties. Unlike the protocol proposed here, neither of them considers the use, in addition to blocking, of an expansion rule that we show leads to major improvements in the performance.

cation service [9]. By this algorithm, a node publishes its position along a “column” in the network, and is able to discovery the location of any other node simply by searching along a “row”. Its main weakness is that location update and discovery have to cross the entire network. In addition, if all the nodes are located in a column, every node has to store every other’s location, suffering large storage load. Tchakarov and Vaidya proposed the Content Location Protocol (GCLP) [10]. Content servers periodically advertise their location in four directions. Nodes receiving service advertisements become location server and forward the advertisements from the closest content server that it knows. A client sends queries in four directions and will get replies once the queries reach some location servers. The authors cursorily claimed, without√real analysis, that a client’s discovered service is at most 2 times as far as the closest one, which however is not correct (as shown in this paper). Li, Santoro and Stojmenovic independently proposed a node discovery algorithm DSND [5] based on a similar idea as GCLP [10]. It is a building block of the sensor relocation protocol MSRP presented in the same paper for coverage maintenance. It enables the neighbors of a failed sensor to efficiently discovery a nearby redundant one as replacement. The replacement is then relocated to fill the position of the failed sensor. The authors presented some preliminary theoretical results of DSND, with no supporting proofs.

1.1 Related Work Many service discovery algorithms have been proposed for wireless ad hoc networks in the literature. They can be categorized as directory-based approach or directory-less approach. These algorithms usually rely on global computation for service directory construction/maintenance or for service advertisement/lookup, and require inconstant storage space on sensor nodes. Hence they are not suitable for resource-constrained WSNs. A survey of existing service discovery algorithms can be found in [3, 6]. In addition to these specialized algorithms, there are other techniques, for example, data-centric storage schemes and location services that can be adopted to solve the service discovery problem in WSNs. In the following, we will briefly review some of these related works. Ratnasamy, Karp, Yin and Yu proposed the Geographic Hash Table (GHT) data-centric storage scheme [7], where event data are hashed to a geographic location according to event type and stored at the nodes around the hash location. In this scheme, a node near the data source may have to travel a long distance for data retrieve, and bottleneck spots can occur when some types of data are frequently requested. Sarkar, Zhu and Gao proposed the double-ruling information brokerage scheme [8]. A data producer hashes data to a geographic point and replicates the data along a closed curve through the point; a data consumer queries around the hash point and obtains the data when hitting the data replication curve. This scheme may generate bottleneck spot problem and often generates relatively long replication and search routes when the data is available nearby. Li, Jannotti, De Couto, Karger and Morris proposed the Grid Location Service (GLS) [4]. In this algorithm, a quadtree is constructed by recursively partitioning the sensory field; the location of a node is stored at a unique subset of nodes determined by the node ID and the quad-tree. This protocol requires pre-knowledge of the sensory field for field partition. It generate large message overhead since location updates and location queries travel along zigzag lines. Stojmenovic, Liu and Jia presented the quorum-based lo-

1.2

Contributions

We propose a distance-sensitive service discovery protocol iMesh for WSNs. This protocol consists of the main ideas, basic information blocking and expansion. The first idea is similarly used in protocols GCLP [10] and DSND [5]. This paper adds important information expansion rule that leads to major improvement in performance. Also, it presents a thorough analytical study that is missing in [10] and [5], in addition to a more comprehensive simulation study. The basic version of iMesh, referred to as iMesh-A, is a generalization of protocol DSND [5]. It uses the information blocking rule only. The entire protocol containing both the blocking rule and the expansion rule is contrastively referred to as iMesh-B. In iMesh-B, service providers publish their location information, like in a mesh, in four directions: north, west, south and east. During their transmission, information collinearly or orthogonally block each other, by the blocking rule: a node receiving information from multiple service providers forwards only the information of the closest one. Information may however be extended to other directions by the expansion rule: a node where information x orthogonally blocks information y transmits x along the backward transmission path of y for a limited distance. The transmission paths together constitute a planar structure, called information mesh [5], which distributedly stores the location information of all the service providers. To discover nearby services, service consumers simply conduct a cross lookup process within their residing mesh cells. The properties (construction cost and distance sensitivity) of iMesh (both versions) are analyzed over a grid sensor network model, for ease of understanding. The study focuses first on the theoretical analysis of the information structure constructed by iMesh-A and by Mesh-B. The analysis of the performance of the algorithm is then provided by extensive simulation of iMesh-A, iMesh-B and the quorum-based location service (Quorum for short) [9]. We comparatively eval-

86

uate their performance in randomly placed sensor networks. Simulation results show that iMesh generates significantly lower message overhead than Quorum, and that iMesh-B guarantees nearby (closest) service selection with probability > 99% (resp., > 97%), noticeably improving the distance sensitivity of iMesh-A with negligible extra communication. In summary, the main contributions of this paper include: • identify the distance-sensitive service discovery problem in wireless sensor networks and propose a novel localized solution protocol iMesh; • derive the message complexity and the constant per node storage load property of iMesh with formal proof of correctness for grid networks; • generalize the cases that iMesh violates closest service selection and derive the upper bound of the distance sensitivity of iMesh in those cases; • evaluate the performance of iMesh by extensive simulation on random networks and conclude that iMesh nearly provides nearby service selection guarantee.

(a) A complete mesh

The rest of the paper is organized as follows: Sec. 2 defines the grid network model; Sec. 3 and 4 describe iMesh-A and analyze its properties, respectively; Sec. 5 presents iMeshB; Sec. 6 provides comparative simulation study of iMesh-A, iMesh-B and Quorum with randomly placed sensors.

(b) An information mesh

Figure 1: Information mesh construction

2. MODEL AND DEFINITIONS

directory, i.e., information mesh. The complete version of iMesh, iMesh-B, which contains both the blocking rule and the expansion rule, will be presented later, in Sec. 5.

In this paper, we first consider a WSN where nodes are placed exactly at the intersection points of a grid structure. For this model we provide theoretical analysis. We then consider randomized sensor placement in the field and verify and confirm our findings in this widely used setting, showing practicality of our approach. Nodes are classified as service providers (SPs) or service consumers (SCs). In practice, SCs may be the nodes that require services themselves or the nodes that require services on behalf of their monitored physical objects. SPs are randomly scattered in the network. All the nodes have the same communication radius. We denote the network by G(V, E) (or simply G), where V and E stand for node set and edge set, respectively. We use ν(G) to represent the number of SPs in G. Apparently, ν(G) ≤ n where n = |V |. Given G, ν(G) can be written as ν without ambiguity. We require that all the nodes know their own location by a localization system such as the Global Positioning System (GPS). We believe this requirement is reasonable because of the surveillance goal of WSNs. We assume the standard restrictions, i.e., total reliability, FIFO communication channel, bidirectional links and finite communication delay, commonly used in distributed computing domain. The reason for choosing to study first the grid network model is that we want to emphasis on the theoretical aspects of iMesh. In fact, iMesh can be implemented in arbitrary network scenarios by using the GFG routing protocol [2] as part of the quorum-based location service [9]. We then use uniform random sensor networks in our simulation study to confirm theoretical findings.

3.1

Information mesh construction

Consider only the residing rows and columns of the SPnodes in G. They intersect each other and constitute a complete mesh, as illustrated in Fig. 1(a), where SP-nodes are represented by solid big dots, and their residing rows and columns are highlighted by thick lines. If each SP distributes its own location information (by a registration message) among the nodes along its residing row and column, this complete mesh distributedly stores the location information of all the SPs and therefore can be used for service discovery. Let us closely examine the complete mesh structure in Fig. 1(a). SP-node c is closer to the area above the mid-point node v between itself and the vertically collinear SP-node a, and thus it has relatively high priority to be discovered by the SC-nodes in that area. In addition, SP-node b might be a better choice for the SC-nodes located in its right-side area than SP-node a. In these cases, a does not need to distribute its location information in those areas. Similar argument can be made for other SP-nodes. According to this observation, we define a blocking rule as follows: Rule 1 (Blocking Rule [5]). A node u shared by the residing rows/columns of two SPs a and b (a = b) stops the further propagation of the information of a, iff |ua| > |ub| ∨ |ua| = |ub| ∧ colline(a, b) ∨ |ua| = |ub| ∧ ¬colline(a, b) ∧ horizon(b), where colline(a, b) and horizon(b) denote the case that a and b are (vertically or horizontally) collinear and the case that the involvement of b is along the horizontal direction, respectively. When this blocking happens, we say u u “b blocks a at u” and denote it by a ← b or b → a.

3. BASIC IMESH PROTOCOL In this section, we will present the basic version of iMesh, iMesh-A, which is a generalization of protocol DSND [5]. This version uses the blocking rule alone to build the service

Application of the above blocking rule can lead to the merger of adjacent mesh cells and result in a pruned mesh

87

structure, which is the so-called information mesh. We denote the information mesh constructed on top of G by M(G) (or simply M). Figure 1(b), where solid small dots represent the nodes at which the blocking rule is applied, shows the information mesh corresponding to the complete mesh structure in Fig. 1(a). According to the definition of the blocking rule, we have the following corollary.

all the composing mesh edges of its home cell and make a right decision. Figure 1(b), where search cells are marked by thick gray lines, and search paths are marked by thick arrowed black lines, illustrates the cross lookup method.

4.

ANALYSIS

In this section, we shall explore on the theoretical aspects of iMesh-A. As we will see, iMesh-A has low message complexity and optimal per node storage load; however it does not always provide perfect nearby service selection guarantee (rare counterexample cases exist). Note that, partial results including Lemmas 2, 3 and Theorems 1 - 3 have been mentioned in [5]. Here, we complement them with formal proofs. All the other results are new.

Corollary 1. M is a planar structure. In an asynchronous environment, a node c, at which a SP-node b is supposed to block another SP-node a, may wrongly retransmit the registration message of a, because of the late arrival of the registration message of b, violating the blocking rule. Fortunately, this problematic situation can be identified by c, as soon as it receives both of the two messages. Once c notices that, it as initiator starts a revocation process, in which the inconsistent information is erased from M. More specifically, c sends a revocation message following the forward path of a’s registration message. The revocation message is processed in exactly the same way as a registration message. It stops at a node where a’s registration message stopped propagating. All the nodes that receive this revocation message remove a’s information from their local repositories. Such a revocation process can possibly lead to chain effect. That is, the registration message of a SP-node previously incorrectly blocked will now continue to propagate until the blocking rule is satisfied again.

Definition 6 (Chain Blocking). For two SPs a and b (a = b), b is said “chain-blocking a” if there is a blocking uk−1 u chain of length k (k ≥ 1) from b to a, i.e., a ←0 · · · ← b. k

k

We denote this chain blocking by a ⇐ b or b ⇒ a. k

Lemma 1. In a blocking chain a ⇐ b along Y (resp., X) axis, the distance between a and b along X (resp., Y) axis is not longer than their distance along Y (resp., X) axis. Proof. Consider two consecutive SP-nodes pi and pi−1 (1 ≤ i ≤ k) in the blocking chain. |xi − xi−1 | ≤ |yi − yi−1 |, where (xi , yi ) and (xi−1 , yi−1 ) are respectively the coordinates of pi and pi−1 . It is because, otherwise, pi , can not block pi−1 in Y-direction. In this case, |xk − x0 | = | ki=1 (xi − xi−1 )| ≤ ki=1 |xi − xi−1 | ≤ ki=1 |yi − yi−1 | = | ki=1 (yi − yi−1 )| = |yk − y0 |. Hence, the lemma holds.

 

3.2 Distance-sensitive service lookup For a SC-node a, the objective of its service lookup is to identify the location of its target service provider T (a) (see below for definition). According to the position of a, there are two possible lookup cases: in-cell case and on-edge case. Definition 3 (Home Cell [5]). The home cell HCell(a) of a SC a is the mesh cell where a is located in or the aggregation of the mesh cells which a is adjacent to. Definition 4 (SPV [5]). The Set of Providers in Vicinity (SPV) of a SC a is the set of SPs that distribute their information along the perimeter of HCell(a). Definition 5 (Target Service Provider [5]). The target service provider T (a) of a SC a is the nearest SP in the SPV of a. In the in-cell case, the SC-node a is located inside a cell of M. When a wants to find T (a), it sends a search message along its residing grid row and column in four directions. Such a search message stops its further transmission as soon as it hits a mesh edge (or the border of G), and then the node at which the message stops replies a with the location of its recorded SP-node closest to a (resp., a failure notice). If there is no SP in the network, what a will receive are all failure notice; otherwise, a can find the location of T (a) simply by a local comparison among its received location data. Because the search paths of a form a cross, this service lookup method is called cross lookup. The cross lookup method can also be applied to the onedge case, where the SC-node a is riding on an edge of M. In this case, the search message that travels along a residing mesh edge of a will stop at the farthest end of the mesh edge on the home cell perimeter. By this means, a can reach





Definition 7 (Extension [5]). The extension η(M) (or η for brevity) of M is the length sum of the edges in M. √ Lemma 2. [5] In a square G, η ∈ O(M in{ν n, n}). Proof. For a complete mesh that is constructed without applying √ the block rule, its extension is just the multiplication of n and the number v of its constituting grid rows and columns of G. Clearly, the maximum value of v is 2ν, for example, in the case that there are no horizontally or vertically collinear SP-nodes. Therefore, the√extension of the complete mesh is bounded above O(ν n). Because M is the result of edge pruning of the complete mesh structure by the blocking rule, its extension is natu√ rally bounded above O(ν n) as well. This upper bounder is actually achievable, for example, when SP-nodes are all located on the√same√line along X-axis (or Y-axis). Note that, when ν > n, ν n can be much larger than n in terms of order of magnitude for large n. Furthermore, since M is accommodated within √ G, its extension η obviously never the total number of edges exceeds |V | = 2n − 2 n = O(n), √ in G. Hence, η ∈ O(M in{ν n, n}). √ Lemma 3. [5] In a square G, η = Ω(ν + n). Proof. In M, every SP-node has exactly four incidental edges, each of which is shared by at most two SP-nodes, and thus the number of mesh edges is not less than 2ν. Under this circumstance, because each mesh edge has length at least 1, η is bounded below O(ν). Now, let us consider a northmost SP-node p0 . If p0 is not blocked along Y-axis, its entire residing column will be included in M; otherwise,

88

(a) Barrage Case

(b) Clean-Pass Case

(a) Dirty-Pass Case

(b) Isolation Case

Figure 2: The example situations of 1 < T CR(a) ≤ 2

Figure 3: The example situations of T CR(a) > 2

there must exist a blocking chain spanning the entire net√ work along Y-axis. In either case, η√is not less than n. Hence, by above analysis, η = Ω(ν + n).

TCR measures the distance sensitivity of iMesh. Ideally, T CR(a) is equal to 1, meaning closest service selection. This happens when the residing grid row and/or column of C(a) is part of the perimeter of HCell(a). However, due to randomized distribution of SPs, it may not always be the case. To study the distance sensitivity of iMesh-A, all the possible violation situations where TCR > 1 need to be identified. By an exhaustive search, we find that all violations are the variants of the following four basic cases:

Theorem 1. [5] In a square G, the message complexity of construction is O(ψ(G)), where ν + √ information mesh √ n ≤ ψ(G) ≤ M in{ν n, n}. Proof. If G is a synchronous environment, the paths that SP-nodes’ registration messages travel are exactly the edges of M. In this case, due to the blocking rule, a constant number (1 or 2) of registration messages are transmitted on each communication link in these mesh edges. Hence, the theorem follows immediately from Lemma 2 and 3. If, otherwise, G is an asynchronous environment, because some registration messages may be incorrectly transmitted on the links in G − M, and revocation messages are used for consistency maintenance, the message complexity can not be lower than in an synchronous scenario. On the other hand, because SP-nodes still block messages effectively, there are at most 4 messages, 2 in each direction, transmitted on each link in the complete mesh structure, and as a consequence the √ message complexity can not be worse than O(M in{ν n, n}). Hence, the theorem holds.

1. Barrage case: C(a) is chain-blocked by a SP in a’s SPV, before its blocking chain passes around HCell(a); 2. Clean-Pass case: the blocking chain of C(a) passes around HCell(a) at the corner where a SP is located; 3. Dirty-Pass case: the blocking chain of C(a) passes around HCell(a) at the corner where no SP exists, and a composing mesh edge of HCell(a) intersects the residing mesh edge of C(a); 4. Isolation case: the blocking chain of C(a) passes around HCell(a) at the corner where no SP exists, and no composing mesh edge of HCell(a) intersects the residing mesh edge of C(a). Figures 2 and 3, where irrelevant SC-nodes are hidden and SP-nodes are represented by solid big dots, illustrate the above four basic violation cases. In the two figures, the home cell HCell(a) of SC-node a is emphasized by broken thick lines, and the blocking chain of c = C(a) is highlighted by complete thick lines; broken thin lines indicate the Voronoi diagram created using SP-nodes, and shadowed areas are the places where TCR is greater than 1.

Theorem 2. [5] √ In a square G, the message complexity of cross lookup is O( n). Proof. A cross lookup process of a SC-node is restricted within a search cell, i.e., the home cell of the SC-node. In worst case, for example, when SP-nodes are all located on the same network border, a search cell spans the entire network, and a SC-node in the search cell will inquire all the way √ along its residing grid row and/or column, generating O( n) search messages. This proves the theorem.

Lemma 4. In Barrage case, T CR(a) ≤ 2. Proof. Let b be the SP-node in a’s SPV that chainblocks c (i.e., C(a)). We have |aT (a)| ≤ |ab|. Without loss of generality, assume that the chain of blocking happens along Y-axis, as shown in Fig. 2(a). By Lemma 1, |bu| ≤ |cu|. Observe that angle ∠cua can not be acute in any case. Thus ca is the longest side in triangle ∆cua. Namely, |cu| < |ca| and |ua| < |ca|. Then |ab| ≤ |bu| + |ua| ≤ |cu| + |ua| < |ca| + |ca| = 2|ca|. Because |aT (a)| ≤ |ab|, we have |aT (a)| ≤ 2|ca|, which completes the proof.

Theorem 3. [5] iMesh generates constant storage load on each network node. Proof. Each of the nodes that constitute M records at most one SP-node’s information from each of the four directions, i.e., the north, the south, the west and the east, due to the blocking rule. The nodes which are not part of M do not store any data at all. Hence, the theorem holds.

Lemma 5. In Clear-Pass case, T CR(a) ≤ 2.

Definition 8 (Target over Closest Ratio [5]). The target over closest ratio T CR(a) of a SC a is defined as |aT (a)| , where C(a) is a SP closest to a. T CR(a) = |aC(a)|

89

Proof. Without loss of generality, assume that the blocking chain of c (i.e., C(a)) is towards HCell(a) along Y-axis, as shown in Fig. 2(b). By Lemma 1, |sv| ≤ |vc|. Unambiguously, |bu| ≤ |sv| ≤ |cv| ≤ |cu|. From this point, the lemma then follows from the same proof as Lemma 4.

Lemma 6. In both Dirty-Pass case and Isolation case, T CR(a) may be larger than 2 but must not be larger than d(G) , where d(G) is spatial the diameter of G. |aC(a)| Proof. Let us examine the scenarios given in Fig. 3, where t = T (a) and the blocking chain of c (i.e., C(a)) is along Y-axis. By observation, |at| is already greater than 2|ac|, namely, T CR(a) > 2, and there is no restriction on the distance from t to the residing grid row of c. If we move b (together with d in Fig. 3(b)) and t far apart from a while maintaining their blocking relation, then |at| could be way larger than 2|ac|. On the other hand, because no pair of nodes has their separation larger than d(G), we have |at| ≤ d(G) . |at| ≤ d(G) and consequently T CR(a) = |ac| |ac| Figure 4: The effect of the expansion rule

5. COMPLETE IMESH PROTOCOL A distance-sensitive service discovery algorithm is expected to guarantee nearby service selection, that is that T CR(a) ≤ 2 for any SC-node a. By Lemma 6, iMesh-A may violate this expectation in Dirty-pass case and Isolation case. In this section, we will present the complete version of iMesh, iMesh-B, which achieves major improvement on distance sensitivity over, but has the same complexity as, iMesh-A. Define the territory of an arbitrary SP-node c as the area in which c can be discovered by the local SCs through the cross lookup method (refer to Sec. 3.2 for cross lookup). The larger the territory of c, the higher its probability of being discovered, and thus the better the distance sensitivity of iMesh. However, in iMesh-A, the size of a SP’s territory is strictly restricted by the blocking rule for message saving purpose. Figure 4 redraws the Dirty-Pass situation given in Fig. 3(a). In this figure, the territory of SP-node c is represented by the light gray area, which is actually the aggregation of the mesh cells adjacent by the registration paths (marked by arrowed hollow lines) of c. In order to improve the distance sensitivity of iMesh, territory expansion is a must. In iMesh-B, the information mesh is built not only according to the blocking rule but also using an expansion rule. The new expansion rule enables SPs to expand their territories in the case of orthogonal blocking. The formal definition of the expansion rule is given below:

does not either change the structure of, or remove any location information from, the information mesh. Therefore, Lemma 2, 3, 4 and 5 and Theorem 2 still hold for iMesh-B. In addition, it is not difficult to verify that Theorem 1 and 3 are also applicable to iMesh-B. In summary, the expansion rule enables iMesh-B to achieve improved overall distance sensitivity over iMesh-A at very low cost. Its effect and cost will be seen clearly later, through simulation in Sec. 6.

6.

PERFORMANCE EVALUATION

Existing service discovery algorithms and adoptable techniques usually rely on global computation and generate large message overhead; they may in addition impose inconstant storage load on network nodes and/or induce severe bottleneck problem. Protocol iMesh however has obvious advantages in all these aspects. It yield constant per node storage load and avoids long service registration/lookup paths, while providing satisfactory distance-sensitivity. In the case that no comparable work exists, we choose to evaluate iMesh in comparison with Quorum [9], through an extensive set of simulation. As we will see in the following, iMesh (both versions) has considerably lower message overhead than Quorum, and iMesh-B guarantees nearby (closest) service selection with probability > 99% (resp., > 97%), noticeably improving the distance sensitivity of iMesh-A at negligible communication cost.

Rule 2 (Expansion Rule). A node u at which a SPnode a orthogonally blocks another SP-node b sends the information of a to b along the backward path from which it receives b’s information. The information of a does not travel all the way to b but stops at the point where the path intersects the bisector between a and b.

6.1

Evaluation metrics

We study the message overhead of iMesh in comparison with Quorum’s using the following metrics: • Total Number of Construction Messages (TNCM): the total number of messages transmitted in the network for information mesh construction; • Number of Construction Messages per SP (NCMSP): the average number of messages generated by a SP for the purpose of information mesh construction; • Number of Search Messages per SC (NSMSC): the average number of service lookup messages generated by an arbitrary SC (reply messages are not counted);

In Fig. 4, the transmission paths of the expansion messages of SP-node c is highlighted by arrowed solid lines, and the dark gray area is the expansion part of the territory of c. By observation, c’s territory expands into the home cell HCell(a) of SC-node a, and a becomes able to discover c as a result. Consider another SC-node a that shares the same home cell with a. The closest SP-node C(a ) to a is d in the blocking chain of c. In iMesh-A, T CR(a ) could be way greater than 2 (if HCell(a) is very large) according to Lemma 6. On the contrary, in iMesh-B, we have T (a ) = c and then T CR(a ) ≤ 2 following a similar proof as Lemma 4. By above examples, the expansion rule eliminates the Dirty-Pass case, and thus the negative Lemma 6 only partially holds for iMesh-B. By definition, the expansion rule

As Quorum guarantees closest service selection (i.e., TCR = 1), the following evaluation metrics are for iMesh only: • Average TCR and Peak TCR: the average TCR and the peak TCR of all the possible SCs in the network. • PTCR1, PTCR2, and PTCR3: the probabilities of TCR = 1, 1 < TCR ≤ 2, and TCR > 2.

90

6.2 Simulation setup We simulated iMesh-A, iMesh-B and Quorum within a custom network simulator, which uses the Greedy-Face-Greedy (GFG) routing technique [2] to support directional message transmission (for the detail on how, one can refer to [5, 9]). Our simulation was carried out over a large-scaled sensor network that contains 10, 000 nodes and fully covers the sensor field. The average node density is 8 − 9. We run two sets of experiments. In the first set, the network is set to be a synchronous environment with simultaneous execution and unified link delay; in the second set, the network is configured to be an asynchronous environment where SP-nodes start the protocols maximally 30 simulated time units off each other, and each communication link has transmission delay of 10 simulated time units at most. We choose the settings with the percentage of SPs (PSP) in the network varying from 1% to 50%. For each setting, we executed iMesh-A, iMesh-B and Quorum over 100 randomly generated network scenarios to get average results.

6.3 Experimental results 6.3.1

Message overhead

We first study the performance difference between the two versions of iMesh, i.e., iMesh-A and iMesh-B, in a synchronous environment and in an asynchronous environment. Figure 5(a) show the TNCM of iMesh in relation with PSP. For reference, mesh extension (Definition 7) is also drawn in the figure. As PSP grows, the information mesh has a more and more complex structure and is therefore expected to exhibit an increasing extension and a growing construction message overhead. The expectation is confirmed by the ascending trend of the curves in the figure. The small gap between the TNCM curves for iMesh-A and iMesh-B in either environment indicates that the overhead of the expansion rule is minor. And, from the figure we can also see that TNCM will never exceed some constant times mesh extension. This observation verifies Theorem 1. Examine Fig. 5(a) again and pay attention to the difference of TNCM in the two environments. It is observed that TNCM is always higher in the asynchronous environment than in the synchronous environment. It is due to the extra messages used for eliminating information inconsistency caused by asynchrony. Further, in either environment, as PSP grows, TNCM curves deviate more and more from the curve of mesh extension, and the TNCM of iMesh-B approaches to the that of iMesh-A closer and closer. It is because, when there are more SP-nodes, the situation that two collinear SP-nodes are an odd number of hops away happens more often, causing more overlapping registration messages on mesh edges, and the mesh cell has smaller size, leading to the reduction of the travel distance of expansion messages. Figure 5(b) displays the NCMSP of iMesh as a function of PSP. From the figure, we can see that NCMSP drops and approaches to 4 as PSP goes up. It is because, when SP density increases, a SP-node’s registration message travels a decreased hop-distance (on average) in each direction before being blocked, and the travel distance can be as low as 1-hop, resulting in merely 4 registration messages in the extreme case. As shown in the figure, each SP-node uses slightly more construction messages in the asynchronous environment in the synchronous environment due to information consistency maintenance; iMesh-B generates slightly larger

NCMSP than iMesh-A in both environments, which again implies the negligible message cost of the expansion rule. Figure 5(c) depicts the NSMSC of iMesh, which is in fact irrelevant to synchrony and to the expansion rule, as a result of PSP. It is observed that NSMSC drops and approaches to 4 as PSP climbs. It is because, when SP density increases, a SC-node’s search message travels a decreased hop-distance (on average) in each direction before finding a SP, and the travel distance can be as low as 1-hop, resulting in merely 4 search messages in the extreme case. Because the performance of Quorum is irrelevant to synchrony, below we will study the performance difference between iMesh and Quorum in an asynchronous environment. Figure 5(d) shows iMesh v.s. Quorum in TNCM in relation with PSP. We can observe that, as PSP increases, TNCM goes up quickly in Quorum but climbs at a very slow speed in iMesh, starting almost from the same point. We can also see that the gap between Quorum and iMesh becomes increasingly large as PSP goes up. These phenomena are due to the fact: a SP’s registration message always propagates across the entire network in Quorum; but, as confirmed by Fig. 5(b), it travels decreased distance with increased PSP due to message blocking in iMesh. Figure 5(e) shows the NCMSP of Quorum and of iMesh as a result of PSP. We can observe that the Quorum curve is nearly a horizontal line. It is because in Quorum a SP’s registration message has to travel across the entire network, whose width is constant. On the contrary, iMesh (both versions) has very low NCMSP due to message blocking, and as we explained in previous paragraph, the larger the PSP, the more often message blocking happens, and therefore the lower the NCMSP. This figure shows that Quorum is nearly 5 times more expensive when PSP ≥ 10%, and 2 times more expensive when 1% ≤ PSP < 10%, than iMesh. Figure 5(f) shows iMesh versus Quorum in NSMSC as PSP varies. From this figure we can observe that Quorum generates almost constant NSMSC regardless of PSP, and that its NSMSC is dramatically larger (over 20 − 100 times larger) than that of iMesh. It is because, a SC in Quorum has to search across the entire network and along the whole outer boundary for a closest SP; while in iMesh, a SC does not query along the outer boundary of the network, and its service lookup operation (i.e., cross lookup) is restricted within a search cell, whose size decreases as PSP increases. To sum up, the results given in Figures 5(a) - 5(f) clearly indicate that protocol iMesh (whether the A version or the B version) use a considerably small number of messages for service registration and service lookup, considering network size and compared with the Quorum algorithm [9]. In a detailed level, iMesh-B generates slightly larger message overhead than iMesh-A; but the difference is actually negligible.

6.3.2

Distance sensitivity

We shall now study the distance sensitivity of iMesh. Note that the results to be presented below are regardless of the (synchronous or asynchronous) nature of the network. Figures 5(g) and 5(h) respectively show the average TCR and the peak TCR in relation with PSP. From Fig. 5(g) we can see that the average TCR is nearly equal to 1 in all PSP cases. This is because of the low probability of TCR > 1. In both of the two figures, the curves decline and approach to 1 closer and closer as PSP increases. This phenomenon is due to the decreasing probability of TCR > 1. According to the

91

50

20

20

20

100

500

80

400

60

Quorum iMesh-A iMesh-B

40

Quorum iMesh

20%

30%

40%

50%

10%

Percentage of SPs

(f)

.99

.98

.97 iMesh-A iMesh-B 10%

20%

30%

Percentage of SPs

(i)

PTRC1

40%

50%

30%

40%

50%

1.002

.02

.01

20%

30%

40%

50%

10%

iMesh-A iMesh-B

4.0 3.0

30%

40%

1.0 1%

50%

10%

(h)

iMesh-A iMesh-B

.6 .4 .2

10%

20%

30%

40%

50%

Percentage of SPs

(k)

PTCR2

20%

30%

40%

50%

Percentage of SPs

Average TCR

.8

Percentage of SPs

(j)

20%

1.0

0.0 1%

50%

2.0

(g)

.03

20% 30% 40% Percentage of SPs

TNCM (iMesh v.s. Quorum)

Percentage of SPs

iMesh-A iMesh-B

10%

10%

5.0

1.004

NSMSC (iMesh v.s. Quorum)

0.0 1%

(d)

NSMSC

1.006

1.0 1%

.04 Probability of 1 < TCR <= 2

1.0

0 1%

6.0

Percentage of SPs

NCMSP (iMesh v.s. Quorum)

.96 1%

20%

200

50%

iMesh-A iMesh-B

200

0 1%

20% 30% 40% Percentage of SPs

1.008

100

10%

10%

(c)

Probability (x 0.001) of TCR > 2

0 1%

50%

NCMSP (syn. v.s. asyn.)

300

20

20% 30% 40% Percentage of SPs

Peak TCR ratio

(b)

TNCM (syn. v.s. asyn.)

10%

Probability (x 0.001) of TCR > 2

50%

0 1%

Average TCR ratio

20% 30% 40% Percentage of SPs

NSMSC

NCMSP

10%

0 1%

300

100

10

(a)

probability of TCR = 1

10

5

0 1%

Quorum iMesh-A iMesh-B

400

15

30

10

(e)

500 iMesh

NSMSC

40 NCMSP

TNCM (1,000)

30

iMesh-A(asy) iMesh-B(asy) iMesh-A(syn) iMesh-B(syn)

50

TNCM (1,000)

iMesh-A(asy) iMesh-B(asy) iMesh-A(syn) iMesh-B(syn) Mesh extension

40

PTCR3 (×10−3 )

Peak TCR

.016 iMesh-A iMesh-B .012

.008

.004

0.0 1% 2% 3% 4% 5% 6% 7% 8% 9% 10% Percentage of SPs

(l)

PTCR3 (amplified view)

Figure 5: Experimental results

7.

two figures, iMesh-B always has better distance sensitivity than iMesh-A. It is because the expansion rule effectively eliminates the Dirty-pass case (refer to Sec. 4 for definition). Figures 5(i) – 5(k) depict PTCR1, PTCR2 and PTCR3 as a function of PSP, respectively. By Fig. 5(i), both iMeshA and iMesh-B provides closest service selection with high probability, respectively larger than 96% and 97%. By Fig. 5(j) and 5(k), both PTCR2 and PTCR3 quickly drop down nearly to 0 as soon as the density of service providers increases to 10%. The three figures together indicate that iMesh guarantees nearby service selection with very high probability, larger than 99%, in all PSP cases, and they also confirm our previous analysis about TCR. Figures 5(i) – 5(k) also imply that iMesh-B always has better distance sensitivity than iMesh-A. It is because iMeshB eliminates the Dirty-Pass case by the expansion rule. Examine the part for PSP in range from 1%−10% in Fig. 5(k). An amplified version of this part is given in Fig. 5(l). The PTRC3 of iMesh-A and iMesh-B are both extremely low, i.e., lower than O(10−3 ). In particular, iMesh-B has PTCR3 significantly smaller, in oder of magnitude, than iMesh-A. In summary, the figures 5(g) - 5(l) indicate that iMesh has satisfactory distance sensitivity. They particularly illustrate that iMesh-B performs much better in both closest service selection aspect and nearby service selection aspect and has lower probability of undesired distance service selection than iMesh-A. According to Sec. 6.3.1, iMesh-B in fact achieves these advantages over iMesh-A practically at no cost.

REFERENCES

[1] I. F. Akyildiz and I. H. Kasimoglu. “Wireless sensor and actor networks: research challenges”. Ad Hoc Networks, 2(4):351–367, 2004. [2] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia. “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks”. In Proc. of ACM DIALM, pages 48–55, 1999. [3] Z. Gao, Y. Yang, J. Zhao, J. Cui, and X. Li. ”Service Discovery Protocols for MANETs: A Survey”. In Proc. of MSN (LNCS 4325), pages 232–243, 2006. [4] J. Li, J. Jannotti, D. S. J. D. Couto, D. R. Karger, and R. Morris. “A Scalable Location Service for Geographic Ad Hoc Routing”. In Proc. of ACM MobiCom, pages 120–130, 2000. [5] X. Li, N. Santoro, and I. Stojmenovic. “Mesh-based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks”. In Proc. of UIC (LNCS 4611), pages 696–708, 2007. [6] A. N. Mian, R. Beraldi, and R. Baldoni. “Survey of Service Discovery Protocols in Mobile Ad Hoc Networks”. Technical Report 4/06, Universit degli Studi di Roma La Sapienza, Rome, Italy, 2006. [7] S. Ratnasamy, B. Karp, L. Yin, and F. Yu. “GHT: A Geographic Hash Table for Data-Centric Storage”. In Proc. of ACM WSNA, pages 78–87, 2002. [8] R. Sarkar, X. Zhu, and J. Gao. “Double Rulings for Information Brokerage in Sensor Networks”. In Proc. of ACM MobiCom, pages 286–297, 2006. [9] I. Stojmenovic, D. Liu, and X. Jia. “A scalable quorum based location service in ad hoc and sensor networks”. Int’l Jour. of Communication Networks and Distributed Systems, 1(1):71–94, 2008. [10] J. B. Tchakarov and N. H. Vaidya. “Efficient Content Location in Wireless Ad Hoc Networks”. In Proc. of IEEE MDM, pages 74–85, 2004.

92

Localized Distance-Sensitive Service Discovery in ...

May 26, 2008 - Service discovery, Localized algorithms, Sensor networks. 1. INTRODUCTION. A wireless sensor network (WSN) is a collection of micro-.

333KB Sizes 1 Downloads 179 Views

Recommend Documents

Localized Distance-sensitive Service Discovery in ...
1. Localized Distance-sensitive Service Discovery in Wireless Sensor and Actor Networks. Xu Li, Nicola Santoro, and Ivan Stojmenovic, Fellow, IEEE.

Efficient Semantic Service Discovery in Pervasive ... - Semantic Scholar
computing environments that integrate heterogeneous wireless network technolo- ... Simple Object Access Protocol (SOAP) on top of Internet protocols (HTTP, SMTP). .... In this area, various languages have been proposed to describe.

pdf-1837\louisiana-a-students-guide-to-localized-history-localized ...
Try one of the apps below to open or edit this item. pdf-1837\louisiana-a-students-guide-to-localized-history-localized-history-series-by-joe-gray-taylor.pdf.

Localized and delocalized plasmons in metallic ...
Dec 13, 2006 - ton energy against incident angle (and hence in-plane wave vector k =2 sin /0) for the ..... By using both types of image cuts R( , ) and R( ,E) from the ..... An alternative approach to modeling the plasmon modes of a truncated ...

Efficient Runtime Service Discovery and ... - Research at Google
constraint as defined by Roy T. Fielding, stating that the ... of autonomously finding more information and performing ... technologies iii) that emphasizes simplicity and elegance. The ... All operations on these resources use the standard HTTP.

Experimental generation of intrinsic localized modes in ...
Aug 16, 2007 - Department of Physics and Astronomy, Dickinson College, Carlisle, PA 17013, USA. Received 7 ... Online at stacks.iop.org/JPhysD/40/5394. Abstract ..... near the zone boundary and—to a lesser degree—at the zone centre.

Visualizing highly localized luminescence in GaN/AlN ...
Oct 22, 2012 - a scanning transmission electron microscope (STEM) operating in spectrum imaging mode. For the electron beam .... emission from the GaN bulk covered by AlN on the right-hand .... Rectangles in (c), (d), (e) and (g) show the emission fr

Localized Minimum-Latency Broadcasting in Multi-rate ...
While this feature of multi-rate link-layer transmissions has traditionally been used for unicast, it has recently been proposed for use in broadcasting scenarios.

Localized Minimum-Latency Broadcasting in Multi-radio ...
School of Computer Science and Engineering, University of New South Wales, Australia. 2. IBM T J Watson Research Center, Hawthorne, New York, USA. Email: {junaidq, ctchou, jool}@cse.unsw.edu.au, [email protected]. ∗†‡. Abstract. We address the

Google Message Discovery - SPAM in a Box
compared to software or appliance based solutions. ... Always On, Always Current Message Security: Routing messages through Google's market-leading.

Google Message Discovery - SPAM in a Box
Best of all, it's hosted by Google. So there's no hardware or software to download, install or maintain. ... compared to software or appliance based solutions. New Age of Archiving and Discovery. In today's .... all-inclusive per-user fee? No more co

Investigating Life in Cities - Discovery Education
1. In the pieces that muckrakers created, they often used sensory details to help .... poor children are crowded out of the schools year by year for want of room. ... of ten he would make an excellent mechanic, if trained early to work at a trade,.

Discovery Reliability Availability Discovery Reliability Availability
advent of the Web, large and small groups like societies ... Today, with millions of Web sites, and .... PsycEXTRA and how you can start your free trial, visit the.

Discovery Reliability Availability Discovery Reliability Availability
have identified information and have classified ... Often material appears on a Web site one day, ... the Internet as a source of material for papers, credibility.

Iterative Route Discovery in AODV
A major challenge in the design of ad hoc network is the ..... Thus, it is logical to assess the behavior of an approach .... [9] D. B. Johnson and D. A. Maltz.

Organic Chemistry in Drug Discovery
one of the main drivers in the drug discovery process. However .... sides within the central nervous system .... chemistry and made this technology a key driver.

Investigating Life in Cities - Discovery Education
I ain't in the business for me health,” and the bang of the door and the angry ... New York: The Macmillan Company, 1914. Web. Discovery .... Sons, 1914. Web.

PART1 AUA Localized Prostate Ca.pdf
meet with different prostate cancer care spe- cialists (e.g., urology and either radiation. oncology or medical oncology or both) when. possible to promote informed decision mak- ing. (Moderate Recommendation; Evidence. Level: Grade B). 4. Effective

Bone Surface Reconstruction Using Localized ...
the case of long shaped bones such as the tibia, humerus, clavicle, ulna or .... as connected if their distance is less than 10 pixels (Fig. 2d). .... 987–1010, 2006.

Xheal: Localized Self-healing using Expanders - CiteSeerX
on social networking sites, and biological networks, includ- ..... 10: else. 11: Let [C1,...,Cj] ← primary clouds of v; F ← sec- ondary cloud of v; [U] ← Clouds(F) \ [C1 ...

Discovery - googleusercontent.com
company. From the launch of Discovery Channel in the U.S. in 1985, DCI now has operations in ... individual company with specific enterprise enhancements ...

Discovery - googleusercontent.com
Business. Discovery Communications, Inc. (DCI) is a leading media and ... Solution. “The Google Search Appliance is easier to set up than your home PC,” says IT ... (collections) into one, so that a single search returns an integrated set of ...

Science in the Cloud: Accelerating Discovery in ... - Research at Google
Feb 17, 2012 - 2 HARVESTING CYCLES FOR SCIENCE .... The Exacycle Project began two years ago. .... google.com/university/exacycleprogram.html.

Discovery - googleusercontent.com
company. From the launch of Discovery Channel in the U.S. in 1985, DCI now ... He says that the GSA easily incorporates three data libraries. (collections) ... Perhaps best of all, says Gardella, “the Google Search Appliance requires very little.