Distributed Construction of an Underlay in Wireless Networks

Size: px
Start display at page:

Download "Distributed Construction of an Underlay in Wireless Networks"

Transcription

1 Distributed Construction of an Underlay in Wireless Networks Hannes Stratil Institute of Computer Engineering, Vienna University of Technology, Austria Abstract A wireless network consists of a large number of nodes that use wireless communication links to collectively perform certain tasks in various application domains (industry, military, etc.). Since wireless nodes are irregularly scattered over a large application area, a suitable wireless multihop routing protocol is needed to facilitate the communication between arbitrary nodes. Many geographic routing protocols use a planar graph as the underlying network topology. This paper presents an efficient algorithm for the localized computation of such an underlay, namely, the Short Delaunay Triangulation (SDT). The SDT contains all edges of the Delaunay Triangulation that are shorter than the communication range. The great asset of the Short Delaunay Triangulation is its spanning property: It approximates the shortest path of the Unit Disk Graph by a constant factor. Our distributed algorithm for constructing the SDT surpasses alternative underlay construction algorithms ( [1], [2]) and requires point-to-point communication links only. I. INTODUCTION Ad-hoc wireless networks are a collection of nodes that are randomly dispersed over some area of interest. They are considered useful for a wide range of application domains including military applications, surveillance, and wireless sensor networks. Ad hoc wireless networks are made up of nodes that communicate with each other over a wireless medium in the absence of a fixed infrastructure and any centralized control. Any computation in an ad-hoc wireless network hence needs to be carried out in a decentralized manner and should be localized (i.e., use information of its local neighborhood only), self-organized and self-stabilizing. Direct communication between two nodes is guaranteed only if the distance between them is less than the minimum of their respective communication ranges. It is generally not possible (nor desirable) that all nodes are within the communication range of each other. Communication between non-neighboring nodes thus requires a multihop routing protocol. We assume that all nodes are distributed in a twodimensional plane and stipulate the existence of a position service that provides network participants with their location. Location knowledge is an important information for supervision and security features. In wireless networks the position is in fact more important than a specific node ID. For example, tracking applications are more interested in where the target is located than in the ID of the reporting node. We do not concentrate on the implementation of a particular routing protocol in our work, but rather on the computation of an efficient underlay over which different routing protocols can be implemented. Various proximity graphs, e.g., elative Neighborhood Graph [3], Gabriel Graph [4], Yao graph [5] and Delaunay Triangulation [6], have been proposed for this purpose. Efficient and scalable algorithms for wireless networks may only use information about the local neighborhood. Hence, the computation of the underlay should also be done locally. Localized versions of the elative Neighborhood Graph and the Gabriel Graph can easily be computed, because a node only needs information about its single hop neighborhood to decide whether a communication edge exists in the elative Neighborhood Graph (resp. Gabriel Graph) or not. For the computation of a localized version of the Delaunay Triangulation a node needs more information than the single hop neighborhood: If the Delaunay Triangulation was only computed with the single hop neighborhood, the computed graph would neither be implicitly a subgraph of the centralized computed graph nor would the graph be necessarily planar. An important advantage of the Delaunay Triangulation is the spanning property. In computational geometry, the spanning ratio of a graph is defined as the maximum ratio of the length of the shortest path connecting any pair of sites in the graph to their euclidean distance. A graph is called a spanner, if the spanning ratio is bounded by a constant. The elative Neighborhood Graph and the Gabriel Graph are not

2 spanners for the complete graph, because their spanning ratios are unbounded. The Delaunay Triangulation has a constant spanning ratio, however. Another important property for an underlay is planarity, because several routing protocols need a planar graph to guarantee the delivery of messages (e.g., [7] [9]). Whereas the Yao graph is not planar, the Delaunay Triangulation is not only planar but also one of the densest planar graphs. In this paper, we present an algorithm for the construction of a planar subgraph, called the Short Delaunay Triangulation (SDT), which relies upon its local neighborhood only. It guarantees scalability, because the algorithm is independent of the total number of nodes in the wireless network. The SDT contains all edges of the centralized computed Delaunay Triangulation that are shorter than the communication range, but it can also contain some edges that are not present in the centralized computed version. Hence, the Short Delaunay Triangulation is not necessary a subgraph of the Delaunay Triangulation. We will show that the SDT is a graph-spanner of the Unit Disk Graph (UDG). A graph-spanner is a subgraph of the UDG in which the length of the shortest path connecting two nodes is within a constant factor of the length of the shortest path connecting these two nodes in the UDG. The spanning property is important, because it can be shown that an underlay with a constant spanning ratio is also within a constant factor of its energy costs [10]. Another novel feature of our algorithm is its use of dedicated communication links between the nodes, rather than the broadcast approach of [1] and [2], which is advantageous e.g. from the viewpoint of security: Wireless networks may be used in hostile environments, where authentication is necessary to protect the communication against malicious nodes. It is unacceptable in a highrisk environment to reveal the exact location of nodes to anyone within range [11]. Therefore, pairwise cryptographic techniques must be employed to protect the position information exchange between any two nodes in position based routing protocols. Several secure routing protocols based on shared keys have been proposed in the literature (e.g., [12], [13]), which are much easier to maintain if dedicated communication links can be used. The remaining sections are organized as follows: Some assumptions and the basic principles of planar graphs are explained in Section II. A detailed description of the underlay construction algorithm is presented in Section III. Section IV gives a detailed relation to other existing work. In Section V, we study the performance of our algorithm and compare it with the algorithms of Li et al. [1] and Gao et al. [2]. Section VI outlines some future directions for research and Section VII concludes the paper. II. PELIMINAIES A wireless network consists of a large number of nodes. Every node is a device that integrates at least a processing unit, some memory, a power unit and a wireless communication interface. The communication interface is used to transmit messages to neighbor nodes and to receive messages from neighbor nodes. A. Assumptions An algorithm for the computation of a planar subgraph requires the positions of the nodes: We assume the existence of a position service that allows every node to estimate its own coordinates locally, e.g., GPS. A survey of position services can be found in [14]. Moreover, we assume that the nodes in the network have negligible difference in altitude, so they can be considered roughly in a plane. B. Network Model The above specified network can be modeled as an undirected communication graph G(S, E) in the plane, with a set of sites S and a set of edges E. Each site s i of the set S := {s 0,..., s N 1 }, represent a node of our wireless network. The total number of sites is N = S. An edge (s i, s j ) E, s i, s j S, represents a wireless link of the network in G(S, E). Each node s has a real communication area A(s) which depends on transmission power, noise, interference, and blockages due to physical obstructions. A(s) is different at each node, irregular and generally unknown. We assume a known circumcised communication range (s). However, with the property that the disc disc(s; (s)) with center s and radius (s) satisfies disc(s; (s)) A(s). The neighborhood of a site s S, denoted by N (s), is the set of sites within s s circumcised communication range (s). Any site s i N (s) is called visible to s, and we assume n to be an upper bound on the nodes in the neighborhood n N (s), s S. The following properties for N (s) are required: Completeness: All sites s i within the circumcised communication range (s) are elements in the neighborhood set of site s. s i disc(s; (s)) : s i N (s) (1)

3 Consistency: If a site s i is in the neighborhood set of site s, than site s is in the neighborhood set of s i. s i N (s) : s N (s i ) (2) Both (1) and (2) are implied by the following property: s i disc(s; (s)) : s disc(s i ; (s i )) (3) Note that (3) is fulfilled by setting (s) = for all s, when = max{ : disc(s, ) A(s) for all s} is the minimum of the communication ranges of all nodes. In the remainder of this paper, we will hence assume that (3) with s : (s) = holds. An edge (s i, s j ) is present in G(S, E) if and only if s i, s j is less or equal than the communication range, where s i, s j denotes the euclidean distance between s i and s j. Therefore, G(S, E) is a undirected graph with at most N(N 1) 2 edges. If we normalize to one unit, than the communication graph is called the Unit Disk Graph. Definition 1 (Unit Disk Graph): The Unit Disk Graph UDG(S) of a set S is defined as an undirected graph, where there is an edge between two sites s i, s j if and only if the Euclidean distance between s i and s j is at most 1. The communication graph G(S, E) as well as the Unit Disk Graph are usually not planar. Informally, a graph is planar, if no two distinct edges cross each other. C. Spanning ratio Consider a graph G over a finite non empty set S I 2. For each pair of sites s i, s j, the length of the shortest path connecting s i and s j measured by euclidean distance is denoted by Π G (s i, s j ), while the direct euclidean distance is s i, s j. Definition 2 (Spanner): A graph G is called a spanner, if Π G (s i, s j ) is no more than a constant factor larger than s i, s j, for all s i, s j S. Definition 3 (Spanning atio): The spanning ratio of the graph G is defined by: Π G (s i, s j ) σ G := max s i, s j S (4) (s i,s j) s i, s j The complete graph has σ = 1, but is less interesting because the graph is not planar and the number of edges is quadratic. If the graph is not connected, then σ is infinity, so it is reasonable to focus on connected graphs only. III. SHOT DELAUNAY TIANGULATION The Delaunay Triangulation is a fundamental geometric construction. For a given set of sites, Delaunay Triangulation constructs a triangle tessellation of the plane with the initial sites as vertices. Definition 4 (Delaunay Triangulation): A triangulation of a set S of sites in the plane is called a Delaunay Triangulation DT (S) of S, if the circumcircle of each of its triangles does not contain any site of S in its interior 1. Definition 4 does not consider the case where all sites are colinear. The following Definition 5 is a little bit stronger and more convenient for our purpose: Definition 5 ( empty circle property): An edge (s i, s j ) is a Delaunay Edge if there exists a circle through s i and s j so that no site of S lies properly inside this circle. The Delaunay Triangulation is unique for a given set S of sites. The bound on the spanning ratio in the following Lemma 1 is an upper bound on all possible sets of sites in I 2. It is impossible to find a set S I 2 which has a higher spanning ratio than the presented bound, although there may be sets where the spanning ratio is less. Lemma 1: [15] The spanning ratio of the Delaunay Triangulation has a constant upper bound, which is at π least 2 and at most 2π 3 cos( π ) It is conjectured 6 that the spanning ratio of the Delaunay Triangulation is σ DT = π 2. The optimal worst-case time complexity of computing a Delaunay Triangulation for N sites in two dimensions is O(N log N). See [16] for an overview of available Delaunay triangulation algorithms. Note that the Delaunay Triangulation is not unique if four or more sites are cocircular. Each computation algorithm needs a deterministic rule for breaking ties here, i.e., to decide which of the edges are to be included in the Delaunay Triangulation and which of them are not. For simplicity, we will assume subsequently that no four or more sites are cocircular, and extend our approach in Subsection III-C. We recapitulate in the following lemma the planarity of the Delaunay Triangulation. Lemma 2: DT (S) is a planar graph. Proof: We show that no two edges may cross in the Delaunay Triangulation. Suppose two crossing edges, (, ) and (, ), appear in the Delaunay Triangulation. By Definition 5, there is a circle through and not containing or, and likewise there is 1 We consider that the interior of a circle is an open disc, i.e., the boundary is excluded.

4 a circle through and not containing or. If these properties are fulfilled, the two distinct circles must intersect at four points, which is impossible 2. Each planar triangulation (e.g., the Delaunay Triangulation) is denser than any other planar subgraph. Lemma 3: [6] A triangulation of a set S of sites is a maximal planar subdivision: no edge connecting two sites can be added to the triangulation without destroying planarity. The above presented graph is not directly applicable to our network model (Subsection II-B). The concept of the Delaunay Triangulation is originated in Computational Geometry one unit computes a planar subgraph of the complete graph. However, algorithms for wireless networks must be localized. It is therefore impossible to compute anything in a centralized manner. Moreover, the edges in our network model must be shorter than the communication range, whereas the length of edges in the Delaunay Triangulation are only depending on the geographic positions and are hence not bounded by any communication range. We hence assume that each node 3 s i S computes a local planar subgraph only with the nodes of its neighborhood N (s i ), denoted by DT (N (s i )). We denote by DT (s i ) all edges of this planar subgraphs which are originating at s i ; DT (s i ) = {(s i, s j ) DT (N (s i )) : s j N (s i )}. The term localized computed is used for the union of these graphs. Definition 6 (localized computed graph): The localized computed version of the Delaunay Triangulation is defined as: locdt (S) := DT (s i ) (5) s i S The Delaunay Triangulation of the whole set S will be denoted with DT (S) and we use the term centralized computed. The localized computed graph is important for our further work, although they are only abstract. In general, no device in the network is aware of the whole localized computed graph. Nevertheless, this graph must be connected and planar to be applicable for routing in wireless networks. In contrast to the elative Neighborhood Graph and the Gabriel Graph, the positions of the single hop neighbors are not sufficient to compute a localized version 2 No four or more sites are cocircular. 3 We denote nodes with the letter s to stay uniform with the graph definitions and to avoid confusions with the number of nodes. emember: n is the number of nodes in the neighborhood and N is the total number of nodes in the network. of the Delaunay Triangulation. We present a distributed algorithm for the computation of a planar subgraph of locdt (S), which we call Short Delaunay Triangulation SDT (S). The Short Delaunay Triangulation fulfills the Delaunay property of Definition 4 locally, but it is not a subgraph of the centralized computed Delaunay Triangulation. It contains all edges of the Delaunay Triangulation that are shorter than the communication range and some additional edges which are not present in the centralized computed Delaunay Triangulation. First of all, we will show in Lemma 5 that locdt (S), the union of the DT (s) s, s S, is connected, and then Lemma 6 will show that locdt (S) might not be planar although the DT (s) s are planar individually. The local Delaunay Triangulation DT (N (s)), s S, at each node is only computed by considering the single hop neighborhood. The local Delaunay Triangulations at different nodes might be inconsistent, i.e. a Delaunay Edge may be in the local Delaunay Triangulation DT (N (s i )) of node s i but not in DT (N (s j )). This could happen, since each node s uses only the nodes within its communication range for the computation of DT (N (s)) and ignores the nodes outside of the communication range. Fig. 1. The shaded region is outside of s communication range. Figure 1 explain this issue: If the triangle (,, ) is a Delaunay Triangle, then no other node is inside the circumcircle of this triangle by Definition 4. Node cannot communicate with a node in the shaded region, so for node the edge (, ) is a Delaunay Edge. If a node was located in the shaded region, node would compute a Delaunay Edge to this node and omits the edge to (because of Definition 5). Hence, the local Delaunay Triangulations would be inconsistent. The localized computed Delaunay Triangulation is by Definition 6 the union of the DT (s) for all s. For each edge (s i, s j ) of the Unit Disk Graph that is not in locdt (S), the edge is neither in DT (s i ) nor in DT (s j ). Before we proof the connectivity of locdt (S) we need

5 a lemma to verify the conditions when an edge is not a Delaunay Edge. Lemma 4: An edge (s i, s j ) of the Unit Disk Graph is not in DT (s i ), if and only if (s i, s j ) is intersected by an Delaunay Edge (s k, s l ). s i, s j, s k, and s l N (s i ). Proof: By Lemma 2, the local Delaunay Triangulation DT (s i ) is planar. It is by Lemma 3 impossible to add an edge to a triangulation without destroying the planarity. Hence, each non Delaunay Edge is intersected by at least one Delaunay Edge. The localized computed Delaunay Triangulation locdt (S) is obviously a subgraph of the Unit Disk Graph. If U DG(S) is connected, locdt (S) is also connected. We proof in the following the connectivity in the neighborhood of node s i, the proof is the same for the neighborhood of node s j. Lemma 5: locdt is connected. Proof: Suppose U DG(S) is connected and there are disconnected components C 1, C 2,..., C M in locdt (S). Let s i and s j be two nodes with s i, s j is minimal such that (s i, s j ) UDG(S) but (s i, s j ) / locdt (S) and s i C i, s j C j. Since edge (s i, s j ) UDG(S), there must be some node s l inside the circumcircle of the triangle (s i, s j, s k ) (Figure 2, Definition 4). Edge (s i, s j ) divides the circle through s i and s j in two circle segments, whereas node s k lies in the first segment and node s l lies in the other segment (Lemma 4). In at least one segment, w.l.o.g. the segment with node s k, s i, s k < s i, s j and s j, s k < s i, s j, (s i, s k ) UDG(S) and (s j, s k ) UDG(S). There are three cases: (s i, s k ), (s j, s k ) / locdt (S) s k with s k C k and s i, s k < s i, s j and s j, s k < s i, s j, (s i, s j ) violates minimality assumption. (s i, s k ) or (s j, s k ) / locdt (S) since s i, s k < s i, s j and s j, s k < s i, s j, (s i, s j ) violates minimality assumption. Both (s i, s k ),(s j, s k ) locdt (S) contradiction to the demanded disconnectivity of the components. locdt (S) is connected but not necessarily planar. Lemma 6: The union of local planar Delaunay Triangulations is not necessarily planar. S I 2 such that locdt (S) DT (S) (6) Proof: The computation of the local Delaunay Triangulations only with the single hop neighbors does not prevent two edges from intersecting. Figure 3 shows an example of 4 nodes (S := {,,, )}) where 4i=1 DT (s i ) is not a planar graph. Figure 3(a) shows the Unit Disk Graph of the network. The distance between node and node is longer than one unit (resp. longer as the communication range if we use the communication graph instead of the Unit Disk Graph), the nodes and are therefore twohop neighbors. The local Delaunay Triangulation of node (DT (N ( ))) and the edges originating at node (DT ( )) are shown in Figure 3(d). Figure 3(e,f) shows DT (N ( )) and DT (N ( )), which are equal because both nodes can communicate directly with the same set of nodes. However, DT ( ) and DT ( ) are obviously different. Finally, DT (N ( )) and DT ( ) are shown in Figure 3(g). The localized computed Delaunay Triangulation locdt (S) = 4 i=1 DT (s i ) is not a planar graph because of the intersection of edge (, ) with (, ) (Figure 3(b)). Figure 3(c) shows that the edge (, ) violates the conditions of a Delaunay Triangle, because the circumcircle of the triangle (,, ) contains node (Definition 4). All local Delaunay Triangulations DT (N (s i )), i = 1,..., 4 are planar individually the localized computed Delaunay Triangulation (Figure 3(b)) is non planar, however, because DT ( ) is inconsistent with DT ( ): The edge (, ) belongs to DT ( ), but not to DT ( ). The computation of a generalized local Delaunay Triangulation at node s with the positions of all single and all double hop neighbors DT ( N (s i )), s i N (s) would guarantee that all edges DT (s) from node s to its single hop neighbors are Delaunay Edges [2]. The drawback of this algorithm is that the time complexity could be as large as O(n 3 log n). Fig. 2. s j s k s i sl Edge (s i,s j) is no Delaunay Edge A. Algorithm We now describe our distributed computation algorithm for the Short Delaunay Triangulation. Each node s computes its local Delaunay Triangulation DT (N (s)) to eliminate the communication edges which are originating at node s and which are definitely not Delaunay Edges. The remaining edges originating at node s are denoted by DT (s). The union locdt (S) of the DT (s) s s S

6 (a) UDG(S) (b) locdt (S) (c) non Delaunay Edge (, ) (d) DT (N ()), DT () (e) DT (N ()), DT () (f) DT (N ()), DT () (g) DT (N ()), DT () Fig. 3. local planar vs. global non planar is non planar (Lemma 6), but would become planar, if each node ignored the edges which are not Delaunay Edges in at least one local Delaunay Triangulation. The removal of those non Delaunay Edges is the main task of our algorithm. Algorithm 1 (Short Delaunay Triangulation): Each node s: Step 1: computes DT (N (s)) Step 2: generates edge-ignore instructions, when s i, s j N (s) and edge (s i, s j ) / DT (N (s)). Step 3: unifies the edge-ignore instructions for every node s i N (s) to a message and sends this messages to the corresponding nodes in its neighborhood. Step 4: omits an edge (s, s i ) in its DT (s), if just one message from a single hop neighbor node contains an edge-ignore instruction for (s, s i ). We prove the planarity of the Short Delaunay Triangulation and show that the SDT is connected if the Unit Disk Graph is connected. Moreover, we show that the spanning ratio of the Short Delaunay Triangulation with respect to the Unit Disk Graph is the same as the spanning ratio of the Delaunay Triangulation with respect to the complete graph. For our major theorems, we need a number of properties of the SDT and the UDG, which will be established below. The following Lemma 7 shows that a communication edge (s i, s j ) cannot be an edge of the Short Delaunay Triangulation, if it is ignored in just one local Delaunay Triangulation DT (S 1 ), s i, s j S 1. Lemma 7: If an edge (s i, s j ) does not exist in just one local Delaunay Triangulation DT (S 1 ), s i, s j S 1, this edge does not exist in any larger Delaunay Triangulation DT (S 2 ) with S 1 S 2. Proof: An edge (s i, s j ) does not exist in a Delaunay Triangulation DT (S 1 ) if the empty circle property (Definition 5) is violated. This property is also obviously violated in DT (S 2 ), S 1 S 2. It is impossible for a node s to decide locally which of the edges of DT (s) (the edges originating at node s) are non Delaunay Edges in any other local Delaunay Triangulation, but the following Lemma 8 (from the work of Gao et al. [2]) gives us a useful tool to solve this problem.

7 Lemma 8: If two edges (, ) and (, ) cross in UDG, at least one of the four nodes has communication edges to the three other nodes. Proof: Both distances, and, are shorter than the communication range. Assume that they intersect at point p. By the triangle inequality,, p +, p, and, p +, p,. Summing these two inequalities, we get, +,, +,. (7) Therefore,,,,, or both have length shorter than the communication range. Similarly,, p +, p,,, p +, p, and by summation, +,, +,. (8) By this inequality,,,,, or both have length shorter than the communication range. No matter in which case, the node shared by the two short edges has communication edges to all three other nodes. The following Definition 7 gives us a useful notation for local Delaunay Triangulations: Definition 7 (correctly computed): We call a local Delaunay Triangulation DT (N (s)) computed correctly with respect to the final Short Delaunay Triangulation SDT (S), if DT (s) SDT (S), s S. The intersection of communication edges, which must be resolved in the course of planarization, can appear in three different cases: Case 1: Each node has communication edges to all three other nodes. In this case the local Delaunay Triangulation is computed correctly at each node. One of the intersecting communication edges must be a non Delaunay Edge, however. Both corresponding nodes of the non Delaunay Edge omit this communication edge in their local Delaunay Triangulation. Nevertheless, both corresponding nodes s i, s j of the non Delaunay Edge (s i, s j ) generate an edge-ignore instruction for (s i, s j ), because the nodes use only local information and do not know whether the corresponding node computed the local Delaunay Triangulation correctly or not. Case 2: Two edges intersect and two nodes have communication edges to the three other nodes. This case makes only sense, if the two nodes with the communication edges to the three other nodes are not connected by one of the intersecting edges. Otherwise no intersection may occur. In Figure 3, and are such nodes. In this example, the communication edge (, ) is a Delaunay Edge and edge (, ) is a communication edge which is not a Delaunay Edge. Node computes its local Delaunay Triangulation DT (N ( )) correctly, but node computes a non-correct Delaunay Triangulation DT (N ( )). The different local Delaunay Triangulations became inconsistent. Only node generates an edge-ignore instruction for edge (, ) in this case. Case 3: In the last case only one node has communication edges to all of the three other nodes. This case is a little bit harder to deal with because this node must inform two single hop neighbors that the edge between them must be ignored. Node is the only node in Figure 4 which has communication edges to all other nodes and is therefore the only node which computes its local Delaunay Triangulation correctly. The nodes and have no communication edges to node, so edge (, ) is locally a valid Delaunay Edge for both nodes. Node generates edge-ignore instructions for both nodes, and. Fig. 4. (, ) (, ) (s1, s3) α 1 α 2 Only node has communication edges to all other nodes. Other cases of two intersecting communication edges cannot occur, because the neighborhoods of the corresponding nodes must always be complete and consistent (Subsection II-B). Each node collects the edge-ignore instructions for the neighbor nodes and sends to each neighbor node at most one message with all edge-ignore instructions relevant for this node. Hence, the message complexity per node of our algorithm is at most O(n). The complexity for Case 3 is not optimal, however. Just generating an edge-ignore instruction when two single hop neighbors in local Delaunay Triangulation have no Delaunay Edge between them, would unnecessarily increase the time complexity and the message length. Consequently, a test is needed for Case 3 to verify whether a node must really generate edge-ignore instructions for the other nodes.

8 Figure 5 illustrates an example of Case 3 and shows the critical regions. The critical regions for node s are the shaded sections A and B. Only two nodes, one from section A and one form section B are endangered to allow an edge in their local Delaunay Triangulations that is not in the SDT. Node s has only to generate edgeignore instructions for all edges where one node lies in the first section and the other node lies in the second section. π/3 π/3 α 1 α 2 s s 5 Section A Section B Fig. 5. egions with endangered nodes. In the example of Figure 5, node s is the only node which has communication edges to two nodes, and. The number of these nodes is non relevant, it only matters that this nodes are not within the communication range of the nodes in the critical sections (specification of Case 3). A simple but rough test to verify whether a node has to generate the edge-ignore instruction is based upon elementary properties of triangles. Lemma 9: If an angle in a triangle is less or equal than π/3, then the edge opposite to this angle is smaller or equal than the longest edge in the triangle. Lemma 9 implies that two single hop neighbors have a common communication edge if the angle between the communication edges to those single hop neighbors is less or equal than π/3. Therefore, for the existence of Case 3 the following two properties are essential: There is an angle between two successive communication edges (called α 1 ), which is larger than π/3. There is a second angle between two successive communication edges (called α 2 ), which is larger than π/3. The simple test generates an edge-ignore instruction for an edge (s i, s j ), if the angle between s i and s j is smaller than π and if it contains α 1 and α 2 as subangles. However, the simple test considers larger regions than the critical regions, i.e., the regions between the dashed lines in Figure 5. Node s generates edge-ignore instruction for (, ) and (, s 5 ). An additional and more precise test can be used to reduce the number of edge-ignore instruction further by eliminating the small circle segments between the dashed lines and the critical regions (Figure 5). Consider a network of four nodes that are placed like that in Figure 4. If the inequalities of Lemma 10 below are true, then node is the only node with communication edges to the other nodes and edgeignore instructions must be generated. Lemma 10: If and, > 2, cos α 1 (9) (10), > 2, cos α 2 (11) then, >, and, >,. Proof: The law of cosinus provide us with,, 2 =, 2 +, 2 2,, cos α 1 (12) where α 1 is the angle between, and,., <, (13), 2 <, 2 +, 2 2,, cos α 1 (14) 2,, cos α 1 <, 2 (15) 2, cos α 1 <, (16) The proof for node is the same as for node. A node can exactly recognize via Lemma 10 whether two single hop neighbor nodes possibly allow a wrong Delaunay Edge. Therefore, a node s has only to generate an edge-ignore instruction for a specific edge (s i, s j ) if the corresponding nodes s i and s j lie within the critical sections and if the inequalities of Lemma 10 are true and if edge (s i, s j ) is not a Delaunay Edge in the local Delaunay Triangulation of node s (DT (N (s))). We now show the planarity of the Short Delaunay Triangulation. Theorem 1: The Short Delaunay Triangulation (SDT ) is planar. Proof: The local Delaunay Triangulations are planar due to Lemma 2. By Lemma 8, the three cases above are the only situations how intersections of edges can

9 occur. If we remove the non Delaunay Edges with the algorithm presented above, the resulted graph is planar. Corollary 1: SDT (S) locdt (S) Theorem 1 showed that removing edges form the graph makes the graph planar. We still have to prove that the resulting graph, i.e., the (SDT ) is connected. Theorem 2: The Short Delaunay Triangulation is connected. Proof: We prove the theorem by showing that the removal of edges from the localized computed Delaunay Triangulation, locdt (S), done by our algorithm does not disconnect the network. Note that locdt (S) is connected if the Unit Disk Graph is connected (Lemma 5). The three cases are the same as in Theorem 1: Case 1: No additional edge is removed from the locdt (S). Both corresponding nodes have the edge already removed by the computation of their local Delaunay Triangulations. Case 2: The second case clarifies the inconsistent views of the local Delaunay Triangulations. An edge (s i, s j ) is removed in this case, if this edge is a non Delaunay Edge in the local Delaunay Triangulation of either s i or s j. The node, that computes its local Delaunay Triangulation correctly (assume, w.l.o.g., node s i ), sends a message with an edge-ignore instruction to the corresponding node s j. Node s i has also an alternative path to the node s j (Lemma 5). Case 3: In this case, an edge (s i, s j ) is eliminated from the graph only when there is a third node s k which sends the edge-ignore instructions for this edge to s i and s j. Node s k has communication edges to s i and s j and establishes therefore an alternative path (Figure 4). The communication edge to node s i (resp. node s j ) is either a Delaunay Edge or there exists an alternative path to this node in the local Delaunay Triangulation of node s k. B. Four or more cocircular nodes If four or more nodes in a wireless network are cocircular, then is the Delaunay Triangulation not unique. Computing the Delaunay Triangulation needs a deterministic rule to decide which of the edges shall be included in the Delaunay Triangulation and which of them shall be omitted. Four or more cocircular nodes are a problem for our SDT-algorithm, if it is possible that only one node computes its local Delaunay Triangulation correctly (Case 3). In such a case, this node must first recognize that four or more nodes are cocircular, and second, this node must inform the other cocircular node about the non Delaunay Edges. However, we prove in Lemma 11 that only Case 1 and Case 2 can appear, if the nodes of intersecting communication edges are cocircular. At least one node of a crossed edge has communication edges to the nodes of the crossing edge and computes its local Delaunay Triangulation correctly. These nodes inform the corresponding nodes of whether the communication edge is a Delaunay Edge or not. The computation algorithm of the Short Delaunay Triangulation therefore needs no additional time and communication. Figure 6 gives an example of four cocircular nodes. Fig. 6. Four cocircular nodes Lemma 11: If two edges intersect and the four nodes are cocircular, than at least two nodes have communication edges to all other cocircular nodes. Proof: If two edges (, ) and (, ) cross, then there is at least one node with communication edges to the three other nodes (Lemma 8). We assume w.l.o.g. that node is the node with communication edges to, and. Edge (, ) divides the joining circle of the four nodes in two circle segments, whereas node lies on the perimeter of the first segment and node lies on the perimeter of the other segment. In at least one segment, the edge (, ) is longer than all other chord in this segment. Hence, at least one node of the intersecting edge (, ) lies within the communication range of node. If we assume w.l.o.g. that node is this node, then has communication edges to, and. C. Spanning Property of Short Delaunay Triangulation The spanning ratio of the Delaunay Triangulation (Lemma 1) does not apply to the Short Delaunay Triangulation, because the SDT does not contain arbitrarily 4 A straight line going through two points of a circle is called a secant. Its segment lying inside the circle is called a chord.

10 long edges. The spanning ratio of the Short Delaunay Triangulation, as defined in Definition 3, is in fact not bounded by any constant. However, we can guarantee the same spanning ratio for another more appropriate type of spanner the graph-spanner. Definition 8 (graph-spanner): A subgraph is called a graph-spanner, if the length of the shortest path connecting any two sites in the subgraph is no more than a constant factor larger than the length of the shortest path connecting the two sites in the original graph. We denote in the following the spanning ratio of the Short Delaunay Triangulation with respect to the Unit Disk Graph as the graph-spanning ratio. Definition 9 (Graph-spanning atio): The graphspanning ratio is defined by: Π SDT (s i, s j ) σ SDT := max s i, s j S (17) (s i,s j) Π UDG (s i, s j ) For the graph-spanner, we replace each communication edge by the shortest path of our Short Delaunay Triangulation. So we have to show, that this path exists, i.e., there is no edge in the path that is longer than the communication range. Lemma 12: The shortest path connecting two sites in the Short Delaunay Triangulation exists. Proof: Suppose a communication edge (s i, s j ). Let C be a circle whose boundary passes through s i and s j, with the diameter s i, s j (Figure 7). If this edge is not in the SDT, then at least on site s k lies by Definition 5 within circle C. (s i, s k ) UDG(S) and (s j, s k ) UDG(S), because s i, s k < s i, s j and s j, s k < s i, s j. For each new edge (e.g. (s j, s k )) exists a circle C 1 whose boundary passes through s j and s k which lies completely inside the circle C. If circle C 1 is empty, then edge (s j, s k ) is part of the SDT. Otherwise, there must be at least one site s l inside circle C 1. Again, (s j, s l ) UDG(S) and (s k, s l ) UDG(S), because s j, s l < s i, s j and s k, s l < s i, s j. The shortest path connecting two sites (s i, s j ) in the Short Delaunay Triangulation lies in any case completely within a circle with diameter s i, s j and therefore is no edge of the shortest path longer than edge (s i, s j ). The following Theorem 3 shows that the Short Delaunay Triangulation is a graph-spanner of the Unit Disk Graph. Additional, we prove that the upper bound of the graph-spanning ratio is the same as the upper bound of the Delaunay Triangulation spanning ratio. Theorem 3: The Short Delaunay Triangulation (SDT ) is a graph-spanner of the UDG. Fig. 7. s i s k C C 1 s l All edges of the shortest path are shorter than edge (s i, s j). The spanning ratio of the SDT is: σ SDT σ DT (18) Proof: The shortest path connecting s i and s j in the Unit Disk Graph consists of m edges: Π UDG (s i, s j ) = s i = t 0, t 1 + t 1, t s j... + t m 1, t m = s j (19) Due to Lemma 12 and Definition 3, t l, t l+1 Π SDT (t l,t l+1) σ DT, 0 l < m. Π UDG (s i, s j ) Π SDT (s i = t 0, t 1 ) σ DT + Π SDT (t 1, t 2 ) σ DT Π SDT (t m 1, t m = s j ) σ DT (20) Π SDT (s i, s j ) = Π SDT (s i = t 0, t 1 ) + Π SDT (t 1, t 2 ) Π SDT (t m 1, t m = s j ) (21) Π SDT (s i, s j ) Π UDG (s i, s j ) σ DT (22) σ SDT σ DT (23) IV. ELATED WOK Planar graphs are frequently used as underlays for position-based routing algorithms: Karp and Kung [7] as well as Bose et al. [8] proposed similar reliable routing algorithms. Both use a localized computed version of the Gabriel Graph as underlay. In the work of Bose and Morin [9] the underlying topology is the centralized computed Delaunay Triangulation. However, the centralized computed Delaunay Triangulation is not applicable to wireless networks, since it can contain arbitrarily long edges. Two methods for the localized computation of planar graphs that are related to the Delaunay Triangulation are published in [1] and [2]. The major difference between these algorithms and our algorithm is that

11 both algorithms use broadcasts to communicate with the neighbour nodes whereas our algorithm uses dedicated communication channels only. The algorithm of Gao et al. [2] constructs a planar graph called estricted Delaunay Graph (DG). First, each node s S computes the local Delaunay Triangulation DT (s) with its single hop neighbors and sends its local Delaunay Triangulation to all of its single hop neighbors. Second, each node s deletes an edge (s, t) from DT (s) if the edge does not exists in the DT (N (u)) (s, t N (u)). However, the time complexity of this algorithm is very high. Li et al. [1] propose the PLDel(S) as planar subgraph. Again, the nodes compute the local Delaunay Triangulations of their single hop neighborhood. Then each node proposes its local Delaunay Triangles and waits for reply messages whether the proposed triangles are also valid in the Delaunay Triangulations of the neighbourhood or not. V. PEFOMANCE ANALYSIS In this subsection we analyze the memory, message and time complexity for the computation of the Short Delaunay Triangulation accordingly to our algorithm. Moreover, we compare the results with two other distributed planarization algorithms; the algorithm of Li et al. [1] and the algorithm of Gao et al. [2]. Both algorithms assume, in contrast to our algorithm, that a node can broadcast a message to all nodes within its communication range. For fair comparison, we replace each broadcast by multiple transmissions. Message Complexity: At the beginning, each node sends its position to the nodes within its neighborhood. The number of nodes in the neighborhood is at most n, so each node sends at most n 1 messages 5. After the computation of DT (N (s)), each node s generates the required edge-ignore instructions for the edges in their local neighborhood, unifies the instructions to messages and sends this messages to the corresponding neighbor nodes. To sum up, a node sends at most two messages to a specific neighbor node and the message complexity of a node is therefore O(n). Additionally to the number of messages, we must also consider the message length. The total number of nodes in the network is N and we assume a unique node identifier can be represented by log N bits. Therefore, an edge-ignore instructions has O(log N) bits. How many edge-ignore instructions can, in the worst case, be unified to an edge-ignore message? The number of edge-ignore instructions is one for Case 1 and Case 2, however. The message length for Case 1 and Case 2 is therefore C +log N bits 6. A little bit more complicated is Case 3 with the critical sections. In the worst case, only one node lies in the first section and the remaining nodes lies in the corresponding section. The single node in the first section receive a message with C + (n 3) log N bits. The worst case message length is therefore O(n log N) bits. However, the remaining nodes in the corresponding critical section receives messages with C + log N bits (resp. C + 2 log N bits if Case 1 or Case 2 also appears). More bits appear, if the nodes are evenly distributed in two corresponding critical sections. If the number of nodes is even, each node in a critical sections receives a message with C+( n 2 2 ) log N bits (resp. C +( n 2 ) log N bits). If the number of nodes is odd, the nodes in one section receives messages with C +( n 1 n+1 ) log N bits (resp. C +( ) log N bits) 2 and the nodes in the other section receives messages with C +( n 3 n 1 2 ) log N bits (resp. C +( 2 ) log N bits). Hence, the total number of sent bits for O(n) messages is in the worst case O(n 2 log N) bits. Memory Complexity: Each node has only to store the position information of at most n 1 neighbor nodes. Hence, the memory complexity is O(n). Time Complexity: Each node s computes the local Delaunay Triangulation DT (N (s)) using the nodes of its local Neighborhood N (s). The number of nodes in the neighborhood is bounded by n and therefore the computational complexity at each node is O(n log n). Additionally, each node computes the inequalities of Lemma 10 at most n 1 times in order to verify whether a neighbor node lies within a critical section. Message Memory Time SDT O(n) O(n) O(n log n) Gao et al. [2] O(n) O(n) O(n 3 log n) Li et al. [1] O(n) O(n) O(n log n) The complexities of our work compared with the work of Li et al. [1] are very similar, although the constant factor of the message complexity is lower in our work. The number of messages is important in the context of energy requirements, because wireless devices 2 5 The node itself is also in the neighborhood. 6 C is some constant.

12 are normally equipped with batteries. Therefore a lower number of sending messages increases the lifetime of the devices. The main difference appears in the construction idea, however: Li et al. [1] accepts only a subset of edges at the beginning, the Gabriel edges, and then adds the remaining Delaunay Edges. Our algorithm starts with all edges and then removes the non-delaunay Edges. VI. DYNAMIC NETWOKS AND FUTUE WOK An important aspect for the performance of a distributed algorithm is the behavior of the algorithm in dynamic environments. The mentioned algorithms of Li et al. [1] and Gao et al. [2] are inefficient in the context of dynamic environments, because the algorithms must restart on each change in the topology. Whereas our computation algorithm is suitable for the usage in dynamic environments: By Lemma 7, a communication edge is not part of the Short Delaunay Triangulation, if at least one node sends an edge-ignore instruction for this edge. After changes in the local neighborhood of a node s and the required re-computation of the local Delaunay Triangulation DT (s), node s has only to send the changes in the edge states (from non-delaunay Edge to Delaunay Edge and visa versa) to the neighboring nodes and not the whole information about all non-delaunay Edge. The memory requirements for such a dynamic algorithm are higher than the requirements for the proposed algorithm, because the nodes must store the transmitted and received edge-ignore instructions. A detailed description of the dynamic algorithm and an extensive performance analysis is recommended to our future work. VII. CONCLUSION A position-based routing protocol needs an underlay for reliably delivering of messages from a source node to a destination node. We propose in this paper an efficient computation algorithm for the Short Delaunay Triangulation (SDT). The SDT is an underlay for wireless networks and is planar, a graph-spanner of the Unit Disk Graph, and is computed in a distributed fashion. Our algorithm is to our knowledge the first one that uses point-to-point communication via dedicated communication links. This is important, because it is in high-risk environments unacceptable to reveal the exact location of nodes to anyone within communication range. EFEENCES [1] Xiang-Yang Li, Gruia Calinescu, Peng-Jun Wan, and Yu Wang, Localized delaunay triangulation with application in ad hoc wireless networks, IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 10, pp , October [2] Jie Gao, Leonidas J. Guibas, John Hershberger, Li Zhang, and An Zhu, Geometric spanner for routing in mobile networks, in Proceedings of the second ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc 01), October 2001, pp [3] Godfried T. Toussaint, The relative neighborhood graph of a finite planar set, Pattern ecognition, vol. 12, no. 4, pp , [4] K. uben Gabriel and obert. Sokal, A new statistical approach to geographic variation analysis, Systematic Zoology, vol. 18, pp , [5] Andrew Chi-Chih Yao, On constructing minimum spanning trees in k-dimensional spaces and related problems, SIAM Journal on Computing, vol. 11, no. 4, pp , November [6] Herbert Edelsbrunner, Algorithms in combinatorial geometry, Springer-Verlag New York, Inc., [7] Brad Karp and H. T. Kung, GPS: greedy perimeter stateless routing for wireless networks, in Proceedings of the sixth annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000), August 2000, pp [8] Prosenjit Bose, Pat Morin, Ivan Stojmenovic, and Jorge Urrutia, outing with guaranteed delivery in ad hoc wireless networks, Wireless Networks, vol. 7, no. 6, pp , November [9] Prosenjit Bose and Pat Morin, Online routing in triangulations, in Proceedings of the Tenth International Symposium on Algorithms and Computation (ISAAC 99), January 1999, pp [10] Fabian Kuhn, oger Wattenhofer, and Aaron Zollinger, Asymptotically optimal geometric mobile ad-hoc routing, in Proceedings of the sixth international workshop on Discrete algorithms and methods for mobile computing and communications DialM 02, September 2002, pp [11] Stephen Carter and Alec Yasinsac, Secure position aided ad hoc routing protocol, in Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), November [12] Panagiotis Papadimitratos and Zygmunt J. Haas, Secure link state routing for mobile ad hoc networks, in Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 03 Workshops). January 2003, pp , IEEE Computer Society. [13] Jiejun Kong, Haiyun Luo, Kaixin Xu, Daniel Lihui Gu, Mario Gerla, and Songwu Lu, Adaptive security for multi-layer adhoc networks, Special Issue of Wireless Communications and Mobile Computing, August [14] Jeffrey Hightower and Gaetano Borriello, Location systems for ubiquitous computing, IEEE Computer Magazine, vol. 34, no. 8, pp , August [15] J. Mark Keil and Carl A. Gutwin, Classes of graphs which approximate the complete euclidean graph, Discrete & Computational Geometry, vol. 7, no. 1, pp , [16] Peter Su and obert L. Scot Drysdale, A comparison of sequential delaunay triangulation algorithms, in Proceedings of the eleventh Annual ACM Symposium on Computational Geometry, June 1995, pp

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Geometric Spanners for Routing in Mobile Networks

Geometric Spanners for Routing in Mobile Networks 1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile

More information

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

Pebble Sets in Convex Polygons

Pebble Sets in Convex Polygons 2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon

More information

Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

More information

Connected Components of Underlying Graphs of Halving Lines

Connected Components of Underlying Graphs of Halving Lines arxiv:1304.5658v1 [math.co] 20 Apr 2013 Connected Components of Underlying Graphs of Halving Lines Tanya Khovanova MIT November 5, 2018 Abstract Dai Yang MIT In this paper we discuss the connected components

More information

Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs

Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs Chen Avin Computer Science Department University of California, Los Angeles Los Angeles, CA 90095-1596, USA. avin@cs.ucla.edu

More information

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Wen-Zhan Song Yu Wang Xiang-Yang Li Ophir Frieder Abstract. Topology control in wireless ad hoc networks is to select a subgraph

More information

Geometric Routing: Of Theory and Practice

Geometric Routing: Of Theory and Practice Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and

More information

Preferred directions for resolving the non-uniqueness of Delaunay triangulations

Preferred directions for resolving the non-uniqueness of Delaunay triangulations Preferred directions for resolving the non-uniqueness of Delaunay triangulations Christopher Dyken and Michael S. Floater Abstract: This note proposes a simple rule to determine a unique triangulation

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

Yao Spanners for Wireless Ad Hoc Networks

Yao Spanners for Wireless Ad Hoc Networks Yao Spanners for Wireless Ad Hoc Networks A Thesis Presented to the Faculty of the Department of Computing Sciences Villanova University In Partial Fulfillment of the Requirements for the Degree of Master

More information

Computational Geometry

Computational Geometry Lecture 12: Lecture 12: Motivation: Terrains by interpolation To build a model of the terrain surface, we can start with a number of sample points where we know the height. Lecture 12: Motivation: Terrains

More information

On minimum m-connected k-dominating set problem in unit disc graphs

On minimum m-connected k-dominating set problem in unit disc graphs J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December

More information

Algorithms for Minimum m-connected k-dominating Set Problem

Algorithms for Minimum m-connected k-dominating Set Problem Algorithms for Minimum m-connected k-dominating Set Problem Weiping Shang 1,2, Frances Yao 2,PengjunWan 3, and Xiaodong Hu 1 1 Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing, China

More information

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra Apex graphs with embeddings of face-width three Bojan Mohar Department of Mathematics University of Ljubljana Jadranska 19, 61111 Ljubljana Slovenia bojan.mohar@uni-lj.si Abstract Aa apex graph is a graph

More information

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Routing s??? t s PODC 2003 2 Greedy Routing Each node forwards message to best neighbor

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

On Minimum Weight Pseudo-Triangulations

On Minimum Weight Pseudo-Triangulations On Minimum Weight Pseudo-Triangulations Oswin Aichholzer Franz Aurenhammer Thomas Hackl Bettina Speckmann Abstract In this note we discuss some structural properties of minimum weight pseudo-triangulations.

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS. J. Mark Keil, Tzvetalin S. Vassilev

APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS. J. Mark Keil, Tzvetalin S. Vassilev Serdica J. Computing 4 00, 3 334 APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS J. Mark Keil, Tzvetalin S. Vassilev Abstract. We consider sets of points in the two-dimensional

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Overview What is Topology Control? Context related work Explicit interference model Interference

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Packing Two Disks into a Polygonal Environment

Packing Two Disks into a Polygonal Environment Packing Two Disks into a Polygonal Environment Prosenjit Bose, School of Computer Science, Carleton University. E-mail: jit@cs.carleton.ca Pat Morin, School of Computer Science, Carleton University. E-mail:

More information

CLASSIFICATION OF SURFACES

CLASSIFICATION OF SURFACES CLASSIFICATION OF SURFACES JUSTIN HUANG Abstract. We will classify compact, connected surfaces into three classes: the sphere, the connected sum of tori, and the connected sum of projective planes. Contents

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer

More information

WE consider a wireless ad hoc network (or sensor

WE consider a wireless ad hoc network (or sensor IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 14, NO. 10, OCTOBER 2003 1035 Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks Xiang-Yang Li, Member, IEEE, Gruia

More information

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

Localized Topology Control for Heterogeneous Wireless Sensor Networks

Localized Topology Control for Heterogeneous Wireless Sensor Networks Localized Topology Control for Heterogeneous Wireless Sensor Networks Xiang-Yang Li Wen-Zhan Song Yu Wang 2 The paper studies topology control in heterogeneous wireless sensor networks, where different

More information

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Efficient Weighted Backbone Construction for Wireless Ad Hoc Networks

Efficient Weighted Backbone Construction for Wireless Ad Hoc Networks Efficient Weighted Backbone Construction for Wireless Ad Hoc Networks Xiang-Yang Li, Kousha Moaveni-Nejad, Wen-Zhan Song, Wei-Zhao Wang, Yu Wang Department of Computer Science, Illinois Institute of Technology

More information

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest

More information

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Peng-Jun Wan Khaled M. Alzoubi Ophir Frieder Abstract Connected dominating set (CDS) has been proposed as virtual backbone

More information

Connectivity Service for Mobile Ad-Hoc Networks

Connectivity Service for Mobile Ad-Hoc Networks Connectivity Service for Mobile Ad-Hoc Networks Alejandro Cornejo and Nancy Lynch MIT Computer Science and Artificial Intelligence Laboratory {acornejo,lynch}@csail.mit.edu Abstract We present a distributed

More information

An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks. Qassem Abu Ahmad February 10, 2008

An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks. Qassem Abu Ahmad February 10, 2008 An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks Qassem Abu Ahmad February 10, 2008 i Contents 1 Introduction 1 2 Main Results 2 3 An Optimal bound

More information

Computer Science 280 Fall 2002 Homework 10 Solutions

Computer Science 280 Fall 2002 Homework 10 Solutions Computer Science 280 Fall 2002 Homework 10 Solutions Part A 1. How many nonisomorphic subgraphs does W 4 have? W 4 is the wheel graph obtained by adding a central vertex and 4 additional "spoke" edges

More information

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Wen-Zhan Song Yu Wang Xiang-Yang Li Ophir Frieder ABSTRACT We propose several novel localized algorithms to construct energy

More information

arxiv: v2 [cs.cg] 24 Jul 2011

arxiv: v2 [cs.cg] 24 Jul 2011 Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract arxiv:116.855v2 [cs.cg] 24 Jul 211 What is the minimum angle α > such that given any set of α-directional antennas (that

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Routing on Overlay Graphs in Mobile Ad Hoc Networks

Routing on Overlay Graphs in Mobile Ad Hoc Networks Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming

More information

Improved algorithms for constructing fault-tolerant spanners

Improved algorithms for constructing fault-tolerant spanners Improved algorithms for constructing fault-tolerant spanners Christos Levcopoulos Giri Narasimhan Michiel Smid December 8, 2000 Abstract Let S be a set of n points in a metric space, and k a positive integer.

More information

ROUTING is an important issue that affects wireless

ROUTING is an important issue that affects wireless 1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,

More information

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department

More information

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem Ahmad Biniaz Anil Maheshwari Michiel Smid September 30, 2013 Abstract Let P and S be two disjoint sets of n and m points in the

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

Technische Universität München Zentrum Mathematik

Technische Universität München Zentrum Mathematik Technische Universität München Zentrum Mathematik Prof. Dr. Dr. Jürgen Richter-Gebert, Bernhard Werner Projective Geometry SS 208 https://www-m0.ma.tum.de/bin/view/lehre/ss8/pgss8/webhome Solutions for

More information

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,

More information

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994)

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994) Discrete Comput Geom 12:29-34 (1994) G 6i try 9 1994 Springer-Verlag New York Inc. On the Number of Minimal 1-Steiner Trees* B. Aronov, 1 M. Bern, 2 and D. Eppstein 3 Computer Science Department, Polytechnic

More information

Simultaneous Diagonal Flips in Plane Triangulations

Simultaneous Diagonal Flips in Plane Triangulations @ _ d j 5 6 5 6 Simultaneous Diagonal Flips in Plane Triangulations Prosenjit Bose Jurek Czyzowicz Zhicheng Gao Pat Morin David R. Wood Abstract Simultaneous diagonal flips in plane triangulations are

More information

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

More information

Interleaving Schemes on Circulant Graphs with Two Offsets

Interleaving Schemes on Circulant Graphs with Two Offsets Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical

More information

Voronoi Diagrams and Delaunay Triangulations. O Rourke, Chapter 5

Voronoi Diagrams and Delaunay Triangulations. O Rourke, Chapter 5 Voronoi Diagrams and Delaunay Triangulations O Rourke, Chapter 5 Outline Preliminaries Properties and Applications Computing the Delaunay Triangulation Preliminaries Given a function f: R 2 R, the tangent

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Approximating geometric bottleneck shortest paths

Approximating geometric bottleneck shortest paths Approximating geometric bottleneck shortest paths Prosenjit Bose Anil Maheshwari Giri Narasimhan Michiel Smid Norbert Zeh February 18, 2004 Abstract In a geometric bottleneck shortest path problem, we

More information

Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

More information

On-line Steiner Trees in the Euclidean Plane

On-line Steiner Trees in the Euclidean Plane On-line Steiner Trees in the Euclidean Plane Noga Alon Yossi Azar Abstract Suppose we are given a sequence of n points in the Euclidean plane, and our objective is to construct, on-line, a connected graph

More information

Basic Euclidean Geometry

Basic Euclidean Geometry hapter 1 asic Euclidean Geometry This chapter is not intended to be a complete survey of basic Euclidean Geometry, but rather a review for those who have previously taken a geometry course For a definitive

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

Topology Homework 3. Section Section 3.3. Samuel Otten

Topology Homework 3. Section Section 3.3. Samuel Otten Topology Homework 3 Section 3.1 - Section 3.3 Samuel Otten 3.1 (1) Proposition. The intersection of finitely many open sets is open and the union of finitely many closed sets is closed. Proof. Note that

More information

The 3-Steiner Root Problem

The 3-Steiner Root Problem The 3-Steiner Root Problem Maw-Shang Chang 1 and Ming-Tat Ko 2 1 Department of Computer Science and Information Engineering National Chung Cheng University, Chiayi 621, Taiwan, R.O.C. mschang@cs.ccu.edu.tw

More information

Localized Topology Control for Heterogeneous Wireless Sensor Networks

Localized Topology Control for Heterogeneous Wireless Sensor Networks Localized Topology Control for Heterogeneous Wireless Sensor Networks XIANG-YANG LI Illinois Institute of Technology WEN-ZHAN SONG Washington State University and YU WANG University of North Carolina at

More information

The Full Survey on The Euclidean Steiner Tree Problem

The Full Survey on The Euclidean Steiner Tree Problem The Full Survey on The Euclidean Steiner Tree Problem Shikun Liu Abstract The Steiner Tree Problem is a famous and long-studied problem in combinatorial optimization. However, the best heuristics algorithm

More information

ONLINE ROUTING IN TRIANGULATIONS

ONLINE ROUTING IN TRIANGULATIONS ONLINE ROUTING IN TRIANGULATIONS PROSENJIT BOSE AND PAT MORIN Abstract. We consider online routing algorithms for routing between the vertices of embedded planar straight line graphs. Our results include

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

Delaunay Triangulations. Presented by Glenn Eguchi Computational Geometry October 11, 2001

Delaunay Triangulations. Presented by Glenn Eguchi Computational Geometry October 11, 2001 Delaunay Triangulations Presented by Glenn Eguchi 6.838 Computational Geometry October 11, 2001 Motivation: Terrains Set of data points A R 2 Height ƒ(p) defined at each point p in A How can we most naturally

More information

Graphs and Discrete Structures

Graphs and Discrete Structures Graphs and Discrete Structures Nicolas Bousquet Louis Esperet Fall 2018 Abstract Brief summary of the first and second course. É 1 Chromatic number, independence number and clique number The chromatic

More information

Competitive Online Routing in Geometric Graphs

Competitive Online Routing in Geometric Graphs Competitive Online Routing in Geometric Graphs Prosenjit Bose and Pat Morin School of Computer Science, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario, Canada, K1S 5B6. Abstract We consider

More information

Does Topology Control Reduce Interference?

Does Topology Control Reduce Interference? Does Topology Control Reduce Interference? Martin Burkhart, Pascal von Rickenbach, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 809 Zurich, Switzerland {bumartin, pascalv}@student.ethz.ch,

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Robust Position-based Routing for Wireless Ad Hoc Networks

Robust Position-based Routing for Wireless Ad Hoc Networks Robust Position-based Routing for Wireless Ad Hoc Networks Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li Department of Computer Science Illinois Institute of Technology Abstract We consider a wireless

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

408 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 14, NO. 4, APRIL Geometric Spanners for Wireless Ad Hoc Networks

408 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 14, NO. 4, APRIL Geometric Spanners for Wireless Ad Hoc Networks 408 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 14, NO. 4, APRIL 2003 Geometric Spanners for Wireless Ad Hoc Networks Khaled Alzoubi, Xiang-Yang Li, Member, IEEE, Yu Wang, Member, IEEE,

More information

Survey on Position-Based Routing 1

Survey on Position-Based Routing 1 Survey on Position-Based Routing 1 Filipe Araújo and Luís Rodrigues Universidade de Lisboa {filipius,ler}@di.fc.ul.pt Abstract In this paper we review position-based routing for wireless ad hoc and for

More information

A Robust Interference Model for Wireless Ad-Hoc Networks

A Robust Interference Model for Wireless Ad-Hoc Networks A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach, Stefan Schmid, Roger Wattenhofer, Aaron Zollinger {vonrickenbach, schmiste, wattenhofer, zollinger}@tik.ee.ethz.ch Computer

More information

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks Receiver Based Multicasting Protocol for Wireless Sensor Networks Madesha M Assistant Professor, Department of CSE Sahyadri College of Engineering and Management Chaya D Lecturer, Department of CSE H.M.S

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

arxiv: v5 [cs.dm] 9 May 2016

arxiv: v5 [cs.dm] 9 May 2016 Tree spanners of bounded degree graphs Ioannis Papoutsakis Kastelli Pediados, Heraklion, Crete, reece, 700 06 October 21, 2018 arxiv:1503.06822v5 [cs.dm] 9 May 2016 Abstract A tree t-spanner of a graph

More information

Ice-Creams and Wedge Graphs

Ice-Creams and Wedge Graphs Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract What is the minimum angle α > such that given any set of α-directional antennas (that is, antennas each of which can communicate

More information

arxiv: v2 [cs.dc] 28 Feb 2018

arxiv: v2 [cs.dc] 28 Feb 2018 Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &

More information

Crossing Families. Abstract

Crossing Families. Abstract Crossing Families Boris Aronov 1, Paul Erdős 2, Wayne Goddard 3, Daniel J. Kleitman 3, Michael Klugerman 3, János Pach 2,4, Leonard J. Schulman 3 Abstract Given a set of points in the plane, a crossing

More information

Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths

Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Master Thesis Patrick Schnider July 25, 2015 Advisors: Prof. Dr. Emo Welzl, Manuel Wettstein Department of

More information

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 Reading: Today s materials is presented in part in Computational Geometry: Algorithms and Applications (3rd

More information

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks Kamrul Islam, Selim G Akl, and Henk Meijer School of Computing, Queen s University Kingston,

More information

arxiv:cs/ v1 [cs.dc] 22 Nov 2006

arxiv:cs/ v1 [cs.dc] 22 Nov 2006 arxiv:cs/0611117v1 [cs.dc] 22 Nov 06 Abstract 2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing Mark Miyashita Mikhail Nesterenko Department of Computer Science Kent State University

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information