A Practical Low Interference Topology Control for Mobile Ad hoc Networks

Size: px
Start display at page:

Download "A Practical Low Interference Topology Control for Mobile Ad hoc Networks"

Transcription

1 A Practical Low Interference Topology Control for Mobile Ad hoc Networks Xiang Yu, Xinming Zhang, Can Que, Qiong Liu Department of Computer Science and Technology University of Science and Technology of China Anhui Province-MOST Co-Key Laboratory of High Performance Computing and Its Application Hefei, , PRChina Abstract The interference imposes a potential negative impact on the performance of a wireless network A device is interfered if it receives a transmission not intended for it In this paper, we introduce an explicit computation model of node interference based on its actual inducement on the physical layer We prove that there exists an optimal algorithm to solve the corresponding topology control problem, constructing a network topology with minimum node interference We also investigate the bad performance of existing methods of solving it and propose a revised algorithm, namely Low Interference-amount Neighborhood Tree (LINT), based on a new link cost metric The simulation results illustrate that our model is able to reduce node interference effectively and maintain the network performance Keywords-Interference; MANETs; Topology control I INTRODUCTION A mobile ad hoc network (MANET) [1] is a collection of wireless mobile devices that self-configure to form a network without aid of any pre-established infrastructure In a MANET, the packets transmitted by a wireless device are often received unconsciously by others in its vicinity, which possibly cause signal interferences at these valid neighbors, share their limited bandwidth, and even bring collisions and data retransmissions at the MAC layer Consequently, the network throughput degrades and the end-end delay increases In MANETs, each device can selectively decide which device to communicate either by adjusting its transmission power or its antenna direction Obviously, keeping relatively limited direct neighbors is helpful to speed up the routing protocols in addition to possibly alleviating the interference among simultaneous transmissions, and also possibly save the energy consumption How to construct such a topology depicted above is the central task of topology control In previous work, it has been well studied in conserving energy consumption and claimed implicitly to solve the interference issue [2] [3] [4] [5] Unfortunately, none of them take into account the explicit definition of interference and effectively confine interference at a low level, proven by Burkhart [6] This paper is partially supported by the National Natural Science Foundation of China under rant No and ; the National rand Fundamental Research 973 Program of China under rant No2006CB303006; the Open Foundation of Anhui Province Key Laboratory Proceedings of Software of the in Sixth Computing International and Communication Conference on Networking (ICN'07) [6] started a totally fresh realm named interferenceefficient topology control, which establishes an interference computation model and then employs the topology control methods well studied previously But his definition of interference is based on the number of nodes affected by communication over a given link, therefore it is argued that such sender-centric perspective hardly reflects real-world interference and performs badly in certain cases In this paper, different from previous studies, we firstly account for the credible and theoretical cause of interfering and being interfered through signal to noise ratio or SINR, and define interference amount of a node as the number of hidden neighbors located in a certain distinct contributing interference to it According to our new model, a topology control problem with interference amount consideration is raised, which is to find a structure such that the most interference suffered by nodes is minimized while the network connectivity constraint is satisfied Whether its optimal solution exists is also under discussion For the worse performance of existing algorithm in certain cases, we propose a heuristic algorithm, Low Interferenceamount Neighborhood Tree (LINT), based on the new interference measurement metric Its performances are verified via simulations Simulation results indicate that compared with the well known link-interference based algorithm, LINT works better in general cases The remainder of the paper is organized as follows We introduce the related works in Section II In Section III, the new interference computation model is presented after analysis of interference inducement, which supports rationality of optimality and algorithm LINT in Section IV Finally, the simulation results and conclusions are presented in the in Section V, VI, respectively IIRELATED WORKS In this section, we discuss related works in the field of topology control with special focus on the issue of interference Reducing interference effects is one of the main goals of topology control besides direct energy conservation by restriction of transmission power Burkhart et al [6] presents a traffic-independent model and defines the interference of a link e=(u, v) as the cardinality of the set of nodes covered by two disks centers at u and v with radius, denoted as coverage set of link e,cov(e) This model, named as link-interference via coverage is chosen

2 from the assumption that, whenever a link (u, v) is used for a send-receive transaction all nodes whose distance to node u or node v is less than will be affected in a way [7] extends this work and proposes node-interference via coverage model The interference of a node u is defined as the imum coverage set of links, incident on u However, coverage model is based on the question how many other nodes can be disturbed by a given communication node or link, thus considered to be an issue at the sender instead of at the receiver, where message collisions actually prevent proper reception Secondly, its weakness is that only introduction of one addition node might lead the interference valued pushed up from a small constant to the imum possible value This behavior contrasts to the intuition that a single additional node represents one addition packet source potentially causing collisions Moreover, neglect of the case that a particular node might be influenced by multiple communication links with small coverage set, might lead discontented results of the proposed algorithms [6] as indicated in Section IV in detail An attempt to correct for this deficiency is made in [8], where an alternative, receiver-centric, interference model is introduced In this model, node u will be interfered by v whose distance to v is less than R v, its distance to reach the farthest neighbor, or { v R v } formally It is denoted as node-interference via transmission model Under the assumption that only symmetric edges are considered, it can be proved that that nodes set mentioned above equivalent to{ v R u } Unfortunately, one fatal drawback is that previous works consider the interference range equals to the transmission range According to the theoretical analysis of actual cause of interference in reference [9], interference range differs from transmission range generally and hidden terminals located within the 178d distance (d denotes the communication distance) of the receiver are also disturbing sources, which is neglected in previous works at all times Researches mistake nodes within the transmission range for the only hidden interfering nodes III NEWORK AND INTERFERENCE MODEL Summarily, interference-efficient topology control is to find a sub-graph H from the original graph to minimize interference while preserving fixed properties Thus such definitions should be explicit and reasonable, that is (i) construction of structure, (ii) interference measurement mechanism, and (iii) properties maintained A Network Model In this paper, a wireless ad hoc network is modeled as a well-known Unit Disk raph (UD) [10] with vertices in V representing network nodes, and the edges E representing communication links In the original communication graph = (V, E ), an edge (u, v) exists iff the Euclidean distance between such a pair is at most the imum transmission range R In order to prevent existing basic communication between neighboring nodes from becoming unacceptably cumbersome [11], only symmetric edges are considered First, we point out the inconsistency in pervious topology control works among reducing interference, conserving energy and also preserving symmetric edges using the omnidirectional antennas Previous studies claims that power consumption and interference reduction can be jointly achieved through topology control under the assumption of symmetric edges Nevertheless, any symmetric method must contain Nearest Neighbor Forest structure, which may have Ω( n) larger interference than the optimal topology proven in [8] Thus who claim interference efficiency may be dubious Using directional antennas, where the transmission is omnidirectional, but the reception is directional, is capable to prevent the inconsistency depicted above Adaptively adjusting both its transmission power and antennas direction according to different receivers would be complex, so the transmission power of any device is taken fixed, and nodes only adjust the direction of antennas to reflect its neighbors in our formulation And in the resulting topology H, reducing interference but not conserving energy consumption is our main issue in this paper Although it may contradict the primary aim of topology control energy conservation, it reflects another perspective of modeling and its development under the power adjustment is our future work B Measurement of Interference Intuitionally, a node in the network is interfered by others, if messages are received but not intended for it [12] This interpretation is our foundation of new metric of interference measurement From the perspective of the physical layer, a signal arriving at a receiver is assumed to be valid if the SINR is above a certain threshold T SINR We assume a transmission to a receiver with transmitter-receiver d meters and at the same time, an interfering node r meters away from the receiver starts another transmission According to analysis in [9], under the assumption of homogeneous radios and TWO-RAY ROUND pathloss model, a crucial conclusion is made that interference range is 4 TSNR d, with an approximation value 178 d when T SNR is set to 10 for instance Previous researchers mistake nodes within the transmission range for the only hidden interfering ones Distinctly, for a node, all active neighbors within its interference range are potential interfering sources Consequently, interference amount, defined as the imum cardinality of active interference neighbors set, is our new interference measurement metric Compared to the existed model, implicit but threatening neighbors are considered at the first time by us Definition 1 iven a structure H=(V,E), the interference neighbors set of a node u communicating with v in, denoted as INei ( u ), is defined as follows:

3 INei 4 ( u) = { w V w D( w, TSNR )}, where D(u,r) denotes the set of nodes located in the circular area centered at node u with radius r, and the communication distance If node u communicates with neighbors over multiple links, how much interference u may experience from other irrelevant nodes in the worst case is what we would like to know Definition 2 iven a topology H=(V,E), the interference amount of node u, denoted as IA(u), equals to the imum value of INei ( u ) incident on link (u, v), ie, IA( u)= INei ( u) Interference amount of the topology, E denoted as IA(H), is defined as u VIA( u) Notice that IA(H) is our metric to measure the interference of a network in the following sections Obviously, INei ( u ) includes all the threatening neighbors who may inflict interference potentially, while link (u, v) is active, thus IA( u) = INei ( u) gives an upper bound of E interference suffered by this node Moreover, this receivercentric model is based on the strict definition of interference, directly measuring the level of being interfered It is our main contribution in this paper C Properties Maintained Finally, we mainly discuss the connectivity property in this paper Connectivity is crucial since any working networks rely on it Our task is to fulfill the connectivity while reducing the interference amount possibly, denoted by MIN_IFAMOUNT Whether an optimal solution exists is also under discussion in Section IV IV LOW INTERFERENCE-AMOUNT TOPLOLOIES A Optimality In this section, firstly, we give an optimal solution to MIN_IFAMOUNT and prove it Note that the node interference now depends on the final topology H, which introduces a level difficulty compared with link interference studied previously To construct a topology with interference amount as low as possible, surprisingly, we observe that an analogy exists between our solution and MST after assigning weights to links Definition 3 iven a structure H, weight of link e= (u, v), denoted as W(e), equals to imal value of INei ( u ) and INei vu ( u ), ie, W( e)=( INei ( u), INei vu ( v ) ) It is not so obvious to obtain the conclusion that, the minimum spanning tree (MST) still produces the optimal network topology (OPT) with the minimal interference The edge weight in MST process is defined above Lemma iven a structure H, for any edge f, the inequation W( f ) IA( H) is correct Proof Consider the interference amount of structure H, denoted as IA(H) Obviously, for any node u V, H IA( u) IA( H) Now that the structure is connected, it is obvious that one link f adjacent to u and v ensures such that W( f)=( INei ( u), INei vu( v) ) ( INei ( u), INei ( v) ) uw E uw vw E INei uw ( u) = IA( u) Clearly, uw E IA( H) Putting these INei vw ( v) = IA( v) vw E properties together, we have W( f ) IA( H) Note that if node u maintains IA( u) = IA( H), (, ) E st W( ) = IA( H) H We can now prove that MST correctly finds the optimal solution to MIN-IFAMOUNT problem, thus construct a topology with least interference Theorem MST produces an optimal topology for MIN- IFAMOUNT problem Proof Assume the MST is not optimal and OPT is an optimal topology That is to say, IA(OPT) < IA(MST) Consider the edge with the highest weight in MST, e = (u, v) By the Lemma above, since e has the highest weight in MST, then W( e )=IA(MST) The link e does not belong to OPT, otherwise it contradict with optimality And the weights of all links in OPT is less than the weight of link e This means a connected graph can be constructed with using links whose weight is less than W(e), and this violates the process of MST Since an optimal solution is given with a polynomial time complexity, any comparison merely concentrating on interference amount is meaningless by reason of the unfair measuring criteria In what follows, for the worse performance in some cases, a polynomial time but approximate algorithm is proposed based on the metric interference cost B Interference Cost Metric It can be shown that the work presented in reference [6] performs badly when a particular node is interfered by multiple links with smaller link interference For example, consider seven nodes with equal imum transmission power distributed in a square area as shown in Fig1(a) Fig1(b) gives a topology in which the links that interfere with the least number of nodes are selected, as proposed in [6] The number associated with each node indicates the interference level of the node in the topology (ie, the number of communication links contributing interference to the node, differs from ours) We find that node o is the one interfered mostly in this graph Now consider another possible one in Fig1(c), in which link is selected instead of cd In this topology, node o is still the node interfered mostly, but this time it is interfered by four links, instead of five as in Fig1(b) Thus the proposed algorithm in [6] may not find a sub-graph with nodes suffering vw

4 from low interference, thus failing in finding the minimum interference level structure edges is 6, so (o,c) instead of (c,d) is added and the worse results are avoided b a c o d f e b( 2) o( 5) f(2) e( 2) b( 2) o( 4) f(3) (a) (b) (c) Figure 1 Two topologies with nine nodes (a)a network with seven nodes (b) A topology with five links interfering with node o (c) A topology with four links interfering with node o Moreover, since adding one edge e to a topology may cause different levels of interference to each node v cov( e) For nodes with higher interference level, including edge e will result in higher incremental of contention to them even though e may interfere fewer number of nodes in the network In other words, it is the main deficiency that nodes influence never participate into the process of edge chosen Contrarily, our proposed solution inspires concerns with establishing a feedback mechanism to avoid such phenomena mentioned above in a way To measure the interference increment caused by such an edge included into the topology, we map node s influence into link, named as interference cost on link as follows Definition 4 iven a structure and an active link e=(u, v), link interference cost, denoted as IC(e), is defined as cardinality of the union set of interference neighbors of nodes within the link s coverage set, ie, IC( e= ) IC( ) = INei wx ( w) w cov( ) wx E,where cov( ) is the coverage set of link (u, v), representing the nodes located in the region D(u, d(u, v)) or D(v, d(v, u)) produced by the communication link (u, v) b( 3) 7 f(3) f(3) 6 6 e( 3) 6 o( 6) 6 b( 3) o( 6) b( 3) e( 3) f(3) o( 6) e( 3) C LINT Algorithm Accordingly, a heuristic algorithm is proposed, namely, Low Interference amount Neighborhood Tree (LINT) LINT is then compared to LIFE in [6], which also aim at the problem above but may perform badly sometimes illustrated above Note that the framework of two algorithms is similar, except that link interference cost substitute for link interference via coverage in [6] The main idea of LINT is to add an edge with the least interference cost for each pair of nodes that is not connected Starting from the edge with minimum value, in each iteration of the algorithm an edge (u, v) is proceeded If node u and v are already connected, (u, v) is just ignored or otherwise it will be added to the resulting topology After adding, update the interference amount of node w cov() and also interference cost of remaining edges in As a result, the topology constructed by LINT maintains the connectivity of the original network with the least possible interference amount The overall time complexity is polynomial through simple analysis Tab 2 Algorithm LINT INPUT: a set of nodes V, the imum transmission radius R OUTPUT: graph H Function LINT: create the original graph with R E H =Φ while E Φ e=(u,v) E with the minimum interference cost if u and v are not connected in H then E H = E H {e} update the interference amount of node w cov(e) update the interference cost of related links end if E = E \{e} end while H =(V, E H ) END 6 6 c(3) 7 d( 3) (a) (b) (c) Figure 2 An illustrated example Based on the observations above, if more than one edge can be selected to connected two connected components, the edge which interferes to the node with the largest interference cost should be avoided As a example, in Fig 2(a), the edges (a,b), (b,c), (d,e), (e,f), (o,f) are included into the resulting topology Till now, the smallest cost of remaining candidate V SIMULATION STUDIES A Simulation Environment and Parameters In this section, we conducted extensive simulations to study and compare the performance of the proposed topology control algorithm LINT with Burkhart s LIFE in [6] The networks are constructed by randomly distributing nodes in a square area Without loss of generality, the mean result is derived from 20 networks, randomly generated with

5 different number of nodes N and the imum transmission range R In order to measure the interference reduction quantitatively, interference amount reduction ratio R IA is defined as 1 2 R IA= 100% I( H2) I( H ) I( H ), where I( H1) denotes the interference amount of the topology generated by LIFE, and I( H 2) represents the interference amount of the resulting structure constructed by LINT with the metric defined in Definition 4 The total interference amount of a structure H, is formulated as TI( H) = IA( u) u V H Approximate estimation of the throughput is another parameter concerned Since the static instinct of topology control, we calculate the independent set (ISet) of a structure instead Then in a way, Thr( H ) ( ISet ) i i and the curves is flat, for the reason of fewer edges in and no guarantee of connectivity For instance, the value is about 30 in our simulations when R is 10 Figure 4 Total Interference amount for LINT and LIFE (R =10) B Topology Comparison First of all, to evaluate the average performance between the proposed LINT and LIFE, we put different number of nodes N from 20 to 80 with the increment 5 and the imum transmission range R is set from 5 to 15 with the increment 25 Ratio RIA% R=5 R=10 R= Number of Nodes Figure 3 Interference amount improvement ratio for LINT Fig 3 depicts the interference amount reduction ratio R IA of LINT in comparison to LIFE The results show that R IA is positive, with approximate peak value 1182% in our simulation We find that R IA improves as R and N increase, because the choices of paths between any two nodes of the network also increase Hence, our revised mechanism may work more efficiently A critical observation is that when R t equals to a value 15 and the density of nodes is large, in our simulation, it has little influence on R IA because such a value R has great probability to include all the possible neighbors in the resulting topology In the same way, when N is less than a fixed value, determined by R, R IA equals to 0 nearly Figure 5 Throughput for LINT and LIFE (R =10) Fig 4 and Fig 5 illustrate the performance comparisons of LINT and LIFE simultaneously in terms of total interference amount TI( H) and throughput Thr( H ) with the transmission range 10 Note that when N is less than 30, meaninglessness occurs due to disconnectivity These results above demonstrate that LINT can significantly reduce the interference amount for a given network while the total interference amount and the throughput are still maintained, far from degradation The difference between topologies of resulting graph is depicted distinctly in Fig6 Another group is illustrated in Fig7 We plot the circles on vertices to demonstrate whose adjacent links are varied in the process of choosing links For example, node A suffers the most interference amount 15 in the resulting topology computed by LIFE Due to edges chosen in a marginal distinct, node B with only interference 13 is the greatest Simultaneously, the total interference amount is 303 and 299, respectively while two throughputs are all 27 An observation is that LINT choose edges in a marginal district to avoid more nodes interfered by the communicating neighbors, which is illustrated in Section IV, thus we can get the conclusion that LINT can reduce interference amount correspondingly

6 VI CONCLUSIONS Topology control draws considerable attentions recently in wireless ad hoc networks for interference reduction In this paper, we propose a new interference computation model that aims to reflect the interference inducement on the physical layer The advantages of this model are twofold: On the one hand this definition corresponds to the intuition due to its receiver-centricity On the other hand, it accords with the real cause of interfering quantitatively Then we investigate the corresponding topology control problem of minimizing the interference of the constructed structure, namely, MIN_IFAMOUNT, and optimally solve it in Section IV Additionally, in order to correct the drawback of algorithms proposed in [6], link interference cost as the metric is applied The results via simulation show that, compared with existing version LIFE, the revised algorithm LINT outperforms on the fact that interference amount can be reduced up, while the total interference and the throughput of the network are still not degraded As a future work, we would like to analyze the approximation of the optimal solution to LINT, and apply the interference measurement mechanism into routing protocols Additionally, our crucial interference computation model, may require to be reconsidered under transmitting power adaptation and reestimated in a more practical and reasonable way B A Figure 6 Topology generated by LIFE and LINT Figure 7 Topology generated by LIFE and LINT REFERENCES [1] I Chalmtac, M Conti, J J N Liu, Mobile ad hoc networking: imperatives and challenges, Journal of Ad hoc Networks, 1(1): 13-64, Jan 2003 [2] L Hu, Topology control for multihop packet radio networks, IEEE Trans on Communications, Vol 41, pp , 1993 [3] RRamanathan, R Rosales-Hain, Topology control of multihop wireless networks using transmit power adjustment, Proc of IEEE Infocom, pp90-100, 2000 [4] V Rodoplu, TH Meng, Minimum energy mobile wireless networks, IEEE JSelect Areas Communications, Vol17, no8, pp , 1999 [5] X Li, Y Wang, W Song, Applications of k-local mst for topology control and broadcasting in wireless ad hoc networks, IEEE Transactions on Parallel and Distributed Systems, 2004 [6] M Burkhart, Pvon Richenbach, R Wattenhofer, A Zollinger, Does topology control reduce interference?, Proc of ACM MobiHoc, 2004 [7] K Moaveni, X Li, Low-Interference Topology Control for Wireless Ad Hoc Networks, Ad Hoc & Sensor Wireless Networks, Vol 1, pp 41-64, 2005 [8] Pvon Richenband, S Schmid, R Wattenhofer, A Zollinger, A robust interference model for wireless ad-hoc networks, Proc of IPDPS, 2005 [9] K Xu, M erla, S Bae, Effectiveness of RTS/CTS handshake in IEEE based ad hoc networks, Journal of Ad Hoc Networks, 2003,1(1): [10] BN Clark, CJ Colbourn, DS Johnson, Unit Disk raphs, Discrete Mathematics, 86: , 1990 [11] R Prakash, Unidirectional Links Prove Costly in Wireless Ad-Hoc Networks, Proc of the 3rd Int Workshop on Discreet Algorithms and Methods for Mobile Computing and Communications (DIALM), 1999 [12] XM Zhang, Q Liu, D Shi, YZ Liu, X Yu, An Average Link Interference-aware Routing Protocol for Mobile Ad hoc Networks, Proc of 3rd International Conference on Wireless and Mobile Communications, March 2007

A Robust Interference Model for Wireless Ad-Hoc Networks

A Robust Interference Model for Wireless Ad-Hoc Networks A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach, Stefan Schmid, Roger Wattenhofer, Aaron Zollinger {vonrickenbach, schmiste, wattenhofer, zollinger}@tik.ee.ethz.ch Computer

More information

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Overview What is Topology Control? Context related work Explicit interference model Interference

More information

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs Vijaya Lekshmi. S.V, E.P.Prakash PG Scholar, Assistant Professor Department of CSE SNS College of Engineering

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Localized Topology Control for Minimizing Interference under Physical Model

Localized Topology Control for Minimizing Interference under Physical Model Available online at www.sciencedirect.com Procedia Engineering 16 (2011 ) 144 150 International Workshop on Automobile, Power and Energy Engineering Localized Topology Control for Minimizing Interference

More information

Interference Minimization in Topology Control for Ad Hoc Networks

Interference Minimization in Topology Control for Ad Hoc Networks Minimization in Topology Control for Ad Hoc Networks Srinath.K, Venkataramanan.P, Mary Anita Rajam Department of Computer Science and Engineering, College of Engineering, Guindy, Anna University, Chennai,

More information

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department

More information

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee

More information

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,

More information

A Survey On Interference In Wireless Ad-Hoc Networks

A Survey On Interference In Wireless Ad-Hoc Networks A Survey On Interference In Wireless Ad-Hoc Networks S.K.Manju Bargavi Research Scholar, Anna University of Technology Coimbatore, India. Dr. G.P.Rajamani Principal, King College of Technology Namakkal,

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p. Title A joint routing and scheduling algorithm for efficient broadcast in wireless mesh networks Author(s) Chiu, HS; Yeung, KL Citation The 2 IEEE Wireless Communications and Networking Conference (WCNC),

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Shuhui Yang, Jie Wu, and Fei Dai Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 Department

More information

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

More information

Experimental comparison of algorithms for interference control in ad-hoc wireless networks

Experimental comparison of algorithms for interference control in ad-hoc wireless networks Experimental comparison of algorithms for interference control in ad-hoc wireless networks Stavros Athanassopoulos and Christos Kaklamanis and Evi Papaioannou and Constantinos Tsantilas Research Academic

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Power Aware Metrics for Wireless Sensor Networks

Power Aware Metrics for Wireless Sensor Networks Power Aware Metrics for Wireless Sensor Networks Ayad Salhieh Department of ECE Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren Schwiebert Department of Computer Science Wayne State University

More information

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo 18-858 Japan {yamin, speng}@k.hosei.ac.jp

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

On minimum m-connected k-dominating set problem in unit disc graphs

On minimum m-connected k-dominating set problem in unit disc graphs J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Localized Topology Control for Heterogeneous Wireless Sensor Networks

Localized Topology Control for Heterogeneous Wireless Sensor Networks Localized Topology Control for Heterogeneous Wireless Sensor Networks Xiang-Yang Li Wen-Zhan Song Yu Wang 2 The paper studies topology control in heterogeneous wireless sensor networks, where different

More information

Link Scheduling in Multi-Transmit-Receive Wireless Networks

Link Scheduling in Multi-Transmit-Receive Wireless Networks Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology

More information

Algorithms for Minimum m-connected k-dominating Set Problem

Algorithms for Minimum m-connected k-dominating Set Problem Algorithms for Minimum m-connected k-dominating Set Problem Weiping Shang 1,2, Frances Yao 2,PengjunWan 3, and Xiaodong Hu 1 1 Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing, China

More information

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME 44 PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME Ibrahim Saidu a, *,Idawaty Ahmad a,b, Nor Asila Waty Abdul Hamid a,b and Mohammed waziri Yusuf b a Faculty of Computer Science

More information

Power Aware Routing using Power Control in Ad Hoc Networks

Power Aware Routing using Power Control in Ad Hoc Networks Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY 2007 1333 Multicast Communications in Ad Hoc Networks Using Directional Antennas: A Lifetime-Centric Approach Y. Thomas Hou, Senior Member,

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Polynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks. Technical Report

Polynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks. Technical Report Polynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 EECS

More information

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Flávio V. C. Martins, cruzeiro@dcc.ufmg.br Frederico P. Quintão, fred@dcc.ufmg.br Fabíola G. Nakamura fgnaka@dcc.ufmg.br,fabiola@dcc.ufam.edu.br

More information

Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks

Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks Akshaye Dhawan, Michelle Tanco, Aaron Yeiser Department of Mathematics and Computer Science Ursinus College

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

WIRELESS broadband networks are being increasingly

WIRELESS broadband networks are being increasingly 1960 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 11, NOVEMBER 2006 Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks Mansoor Alicherry,

More information

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs R. Madhanmohan Assistant Professor, Department of Computer Science and Engineering, Annamalai University, Annamalai nagar, Tamilnadu, India ABSTRACT A MANET

More information

Approximability Results for the p-center Problem

Approximability Results for the p-center Problem Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center

More information

On the Complexity of Broadcast Scheduling. Problem

On the Complexity of Broadcast Scheduling. Problem On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)

More information

Time-Bounded Essential Localization for Wireless Sensor Networks

Time-Bounded Essential Localization for Wireless Sensor Networks IEEE TRANSACTIONS ON NETWORKING 1 Time-Bounded Essential Localization for Wireless Sensor Networks Wei Cheng, Member, IEEE, Nan Zhang, Member, IEEE, Xiuzhen Cheng, Senior Member, IEEE, Min Song, Senior

More information

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Biljana Stojkoska, Ilinka Ivanoska, Danco Davcev, 1 Faculty of Electrical Engineering and Information

More information

Maximal Independent Set

Maximal Independent Set Chapter 4 Maximal Independent Set In this chapter we present a first highlight of this course, a fast maximal independent set (MIS) algorithm. The algorithm is the first randomized algorithm that we study

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

Consistency and Set Intersection

Consistency and Set Intersection Consistency and Set Intersection Yuanlin Zhang and Roland H.C. Yap National University of Singapore 3 Science Drive 2, Singapore {zhangyl,ryap}@comp.nus.edu.sg Abstract We propose a new framework to study

More information

Proposal of interference reduction routing for ad-hoc networks

Proposal of interference reduction routing for ad-hoc networks Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication P.Deepa 1, Dr. P.S.K Patra 2 1 Department of Computer Science and Engineering, 2 Head of the Department, Agni College of

More information

Optimally-balanced Hash Tree Generation in Ad Hoc Networks

Optimally-balanced Hash Tree Generation in Ad Hoc Networks African Journal of Information and Communication Technology, Vol. 6, No., September Optimally-balanced Hash Tree Generation in Ad Hoc Networks V. R. Ghorpade, Y. V. Joshi and R. R. Manthalkar. Kolhapur

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

Control Frame Shaping in Power Controlled and Directional MAC Protocols

Control Frame Shaping in Power Controlled and Directional MAC Protocols Ad Hoc & Sensor Wireless Networks Vol., pp. 1 26 Reprints available directly from the publisher Photocopying permitted by license only 27 Old City Publishing, Inc. Published by license under the OCP Science

More information

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS American Journal of Applied Sciences 11 (7): 1059-1064, 2014 ISSN: 1546-9239 2014 K.S. Kumar et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1059.1064

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

A CSP Search Algorithm with Reduced Branching Factor

A CSP Search Algorithm with Reduced Branching Factor A CSP Search Algorithm with Reduced Branching Factor Igor Razgon and Amnon Meisels Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84-105, Israel {irazgon,am}@cs.bgu.ac.il

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks

Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks Jie Wu and Fei Dai Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Department of Electrical

More information