Authorized licensed use limited to: Georgia State University. Downloaded on March 27, 2009 at 10:20 from IEEE Xplore. Restrictions apply.

Size: px
Start display at page:

Download "Authorized licensed use limited to: Georgia State University. Downloaded on March 27, 2009 at 10:20 from IEEE Xplore. Restrictions apply."

Transcription

1 Distributed Clustering for Ad Hoc Networks Stefano Basagni Center for Advanced Telecommunications Systems and Services (CATSS) Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Abstract A Distributed Clustering Algorithm (DCA) and a Distributed Mobility-Adaptive Clustering (DMAC) algorithm are presented that partition the nodes of a fully mobile network (ad hoc network) into clusters, thus giving the network a hierarchical organization. Nodes are grouped by following a new weight-based criterion that allows the choice of the nodes that coordinate the clustering process based onnode mobility-related parameters. The DCA is suitable for clustering \quasistatic" ad hoc networks. It is easy to implement and its time complexity is proven to be bounded by a network parameter that deps on the topology of the network rather than on its size, i.e., the invariant number of the network nodes. The DMAC algorithm adapts to the changes in the network topology due to the mobility of the nodes, and it is thus suitable for any mobile environment. Both algorithms are executed ateach node with the sole knowledge of the identity of the one hop neighbors, and induce on the network the same clustering structure. 1. Introduction Obtaining a hierarchical organization of a network is a well-known and important problem in the eld of wired networks. In the case of ad hoc networks, i.e., wireless networks in which possibly all nodes can be mobile, partitioning the nodes into groups (clusters ) is similarly important. For example, clustering may be used for controlling the spatial reuse of the shared channel (e.g., in terms of time division or frequency division schemes), for minimizing the amount of data to be exchanged in order to maintain routing and control This work was supported in part by the TxTEC Consortium 1998/1999 Fellowship. The author is also indebted to Marco Monguzzi for collaborating on an earlier version of the paper. information in a mobile environment, as well as for building and maintaining cluster-based virtual network architectures. The notion of cluster organization has been used for ad hoc networks since their appearance. In [1, 2,4, 5], a \fully distributed linked cluster architecture" is introduced mainly for hierarchical routing and to demonstrate the adaptability of the network to connectivity changes. With the advent ofmultimedia communications, the use of the cluster architecture for ad hoc networks has been revisited by Gerla et. al. [6, 7]. In these latter works the emphasis is toward the allocation of resources, namely, bandwidth and channel, to support multimedia trac in an ad hoc environment. In existing solutions for clustering of ad hoc networks, the clustering is performed in two phases: clustering set up and clustering maintenance. The rst phase is accomplished by choosing some nodes that act as coordinators of the clustering process (clusterheads). Then a cluster is formed by associating a clusterhead with some of its neighbors (i.e., nodes within the clusterhead's transmission range) that become the ordinary nodes of the cluster. The existing clustering algorithms dier on the criterion for the selection of the clusterheads. For example, in [2, 5, 7] the choice of the clusterheads is based on the unique identier (ID) associated to each node: the node with the lowest ID is selected as clusterhead, then the cluster is formed by that node and all its neighbors. The same procedure is repeated among the remaining nodes, until each node is assigned to a cluster. When the choice is based on the maximum degree (i.e., the maximum number of neighbors) of the nodes, the algorithm described in [6] is obtained. A common assumption for the clustering set up is that the nodes do not move while the cluster formation is in progress. This is a major drawback, since in real ad hoc situations, no assumptions can be made on the mobility of the nodes. Once the nodes are partitioned into clusters, the non

2 mobility assumption is released, and techniques are described on how to maintain the cluster organization in the presence of mobility (clustering maintenance). For instance, in [1, 2] a reorganization of the clusters, due to node mobility, is done periodically, just invoking the clustering process again (as at set up time). Of course, during the re-clustering process the network cannot rely on the cluster organization. Thus, this is a feasible solution only when the network does not need too many reorganizations. In [7] cluster maintenance in the presence of mobility is described where each node v decides locally whether to update its cluster or not. This decision is based on the knowledge of the v's one and two hop neighbors and on the knowledge of the local topology of v's neighbor with the largest degree. The resulting mobility-adaptive algorithm is thus dierent from the one used for the cluster formation (based on the nodes' IDs and on the knowledge of their one hop neighbors) and the obtained clustering has dierent properties with respect to the initial one. In this paper we are interested in either phases of the clustering process under the common perspective of some desirable clustering properties. Specically, given the wireless, mobile nature of ad hoc networks, the need arises for each ordinary node 1) to have at least a neighboring clusterhead (this will allow fast communications among any pairs of nodes), and 2) to be aliated with the \best" neighboring clusterhead. Moreover, 3) we do not want tohave neighboring clusterheads, so that the clusterheads are well scattered throughout the network. In the following we describe two algorithms for the set up and the set up/maintenance of a clustering organization of any adhocnetwork that have easy and ecient distributed implementations, and that satisfy the requirements described above. The rst algorithm, the Distributed Clustering Algorithm (DCA), is a common generalization of the algorithms for the (sole) clustering set up presented, e.g., in [1] and [7]. These previous approaches are generalized by allowing the choice of the clusterheads based on a generic weight (a real number 0) associated with each node: The bigger the weight of a node, the better that node for the role of clusterhead. The main advantage of this approach is that, by representing with the weights mobility-related parameters of the nodes, we can choose for the role of clusterhead those nodes that are better suited for that role. An interesting result here, is that the time complexity of the DCA is bounded by a network parameter that deps on the network topology (that may change due to nodes mobility) rather than on the size of the network, i.e., the invariant number of its nodes (as in [7]). Although our algorithm can be used in the presence of nodes' mobility (using, for instance, the periodical re-clustering as described in [1]), the DCA is mainly suitable for ad hoc networks whose nodes do not move ormove \slowly" (\quasi-static" networks). For (possibly highly) mobile networks weintroduce the Distributed Mobility-Adaptive Clustering (DMAC) algorithm. By executing the DMAC routines, each node reacts locally to any variation in the surrounding topology, changing its role (either clusterhead or ordinary node) accordingly. The DMAC is proven to meet the three requirements of ad hoc clustering regardless of the mobility of the nodes, thus creating and maintaining the same clusters produced by the DCA. Moreover, for our algorithm, we obtain the following properties, not available in previous solutions: As for the DCA, the selection of the clusterheads is based on the new weight-based criterion, thus having the possibility to express preferences on which nodes are better suited to be clusterheads. Nodes can move, even during the clustering set up. (DMAC is adaptive to the changes in the topology of the network, due to the mobility of the nodes or to node addition and/or removal.) A node decides its own role (clusterhead or ordinary node) solely knowing its current one hop neighbors (as opposed to the knowledge of one and two hop neighbors as required by previous algorithms). We conclude this section by stipulating some basic denitions and dening the problem of clustering more precisely. We model an ad hoc network by an undirected graph G =(V; E) in which V, jv j = n, is the set of (wireless) nodes and there is an edge fu; vg 2E if and only if u and v can mutually receive each others' transmission (this implies that all the links between the nodes are bidirectional). In this case we say that u and v are neighbors. The set of the neighbors of anodev 2 V will be denoted by,(v). Due to mobility, the graph can change in time. Every node v in the network is assigned a unique identier (ID). For simplicity, here we identify each node with its ID and we denote both with v. Finally, we consider weighted networks, i.e., a weight w v (a real number 0) is assigned to each node v 2 V of the network. For the sake ofsimplicity, in this paper we stipulate that each node has a dierent weight. As an example, the topology of a simple ad hoc network is shown in Figure 1 (a). Clustering an ad hoc network means partitioning its nodes into clusters, each one with a clusterhead and (possibly) some ordinary nodes. The choice of the clusterheads is here based on the weight associated to each

3 4 (9) 5 (8) 1 (6) 2 (3) (a) 3 (2) 8 (1) 6 (1) 7 (5) Figure 1. (a) An ad hoc network G with nodes v and their weights (w v ), 1 v 8, and(b)a correct clustering for G. node: the bigger the weight of a node, the better that node for the role of clusterhead. In order to meet the requirements imposed by the wireless, mobile nature of these networks, a clustering algorithm is required to partition the nodes of the network so that the following ad hoc clustering properties are satised: 1. Every ordinary node has at least a clusterhead as neighbor (dominance property). 2. Every ordinary node aliates with the neighboring clusterhead that has the bigger weight. 3. No two clusterheads can be neighbors (indepence property). Furthermore, given the possibly frequent changes in the network topology due to nodes' mobility, the algorithm is required to be executed at each node (i.e., the algorithm should be distributed ) with the sole knowledge of the topology local to each node. Figure 1 (b) illustrates a correct clustering for the ad hoc network of Figure 1 (a) (the clusterheads of each cluster are the squared nodes). 2. A Distributed Clustering Algorithm (DCA) The DCA is executed at each node with the sole knowledge of the executing node's unique identier, ID, its weight, and the IDs and the weights of its neighbors (namely, the algorithm is distributed and relies only on local information). We also make the following common operational assumptions: a) A message sent by a node is received correctly within a nite time (a step ) by all its neighbors, and b) Network topology does not change during the algorithm execution. 1 Except for the initial routine, the algorithm is message driven: a specic procedure will be executed at a node deping on the reception of the corresponding 1 A detailed discussion on how to release these assumptions can be found, e.g., in [7]. 4 (9) 5 (8) 1 (6) 2 (3) (b) 3 (2) 8 (1) 6 (1) 7 (5) message. We use only two types of messages: Ch(v), used by anodev to make its neighbors aware that it is going to be a clusterhead, and Join(v; u), with which anodev communicates to its neighbors that it will be part of the cluster whose clusterhead is node u. The main idea is that a node decides which role to assume only when all its neighbors with bigger weights have decided their own roles. Every node starts the execution of the algorithm at the same time, running the procedure Init. Only those nodes that have the biggest weight among all the nodes in their neighborhood will s a Ch message (\init nodes"). Given the nature of the weights (real numbers), there always exists at least a node v that transmits the message Ch(v). All the other nodes just wait to receive a message. Then, we have the following two message triggered procedures: On receiving Ch. On receiving a Ch message from a neighbor u, nodev checks if it has received from all its neighbors z such that w z >w u, a Join(z; x) message. In this case, v will not receiveach message from these z, and u is the node with the biggest weight in v's neighborhood that has sent ach message. Thus, v joins u, and quits the algorithm execution (it already knows the cluster to which it belongs, i.e., its clusterhead). If there is still at least a node z, w z >w u, that has not sent a message yet, node v records that u sent a Ch message, and keeps waiting for a message from z. On receiving Join. On receiving a Join(u; t) message, node v checks if it has previously sent ach message. If this is the case, it checks if node u wants to join v's cluster (v = t). Then, if all v's neighbors z such that w z <w v have communicated their willingness to join a cluster, v quits the execution of the DCA. Notice that, in this case, node v does not care about its neighbors y (if any) such that w y >w v, because these nodes have surely joined a node x such that w x >w v (thus permitting v to be a clusterhead). If node v has not sent ach message, before deciding what its role is going to be, it needs to know what all the nodes z such that w z >w v have decided for themselves. If v has received a message from all such nodes, then it checks the nature of the messages received. If they are all Join messages, this means that all those neighbors z have decided to join a cluster as ordinary nodes. This implies that now v is the node with the biggest weight among the nodes (if any) that have still to decide what to do. In this case, v will be a clusterhead. At this point, v also checks if each neighbor y such that w y <w v has already joined another cluster. If this is the case, v quits the algorithm execution: it will be the clusterhead of a cluster with a single node. Alternatively, ifv has received at least a Ch message from z, then it joins

4 the cluster of the neighbor with the biggest weight that sentach message, and quits the execution of the DCA (a node always quits the algorithm execution as soon as it ss a Join message). As mentioned earlier, in order to decide whether it is going to be a clusterhead or an ordinary node, each node waits for the decision of all the neighboring nodes with bigger weight. This \waiting time" of each node can be dened as a function of the distance of a node from one of the init nodes. Clearly, this \blocking distance," D b, deps on the current topology of the network rather than on the number n of the nodes of the network. By the total ordering induced on the nodes by their weights, and through a simple inductive argument, we can prove the following result: Theorem 1 Each node of the network ss exactly one message within D b +1 steps. Since every ordinary node quits the execution of the DCA after sing a message, and since each clusterhead quits it as soon as it has received a Join from his neighboring ordinary nodes, it follows that: Corollary 1 The DCA terminates within D b +1 steps. This upper bound on the time complexity of the DCA improves on the O(n) upper bound presented in [7] in all those cases in which D b n. The following corollary states the (optimal, since each node needs to s at least a message) message complexity of the DCA. Corollary 2 The DCA message complexity is n. Detailed proofs, numerical results, and the proofs of correctness and of other properties of DCA-based clustering can be found in [3]. 3. DMAC: Distributed and Mobility- Adaptive Clustering In this section we describe a distributed algorithm for the set up and the maintenance of a cluster organization in the presence of nodes' mobility that satises the three ad hoc clustering properties. The main difference with the DCA outlined in the previous section consists in the fact that here we do not assume that during the clustering process the nodes of the network need not to move. This makes this algorithm suitable for both the clustering set up and its maintenance, which was not available in previous solutions. Adaptation to changes in the network topology is now made possible by letting each node to properly \react" not only to the reception of a message from other nodes, but also to the failure of a link with another node (possibly caused by a node failure, or by nodes' movements) or to the presence of a new link. In the description of the procedures of our Distributed and Mobility-Adaptive Clustering (DMAC) algorithm, we still assume that a message sent byanode is received correctly within a nite time (a step) by all its neighbors. We also assume that each node knows its own ID, its weight, its role (if it has already decided to be a clusterhead or an ordinary node) and the ID, the weight and the role of all its neighbors (if they have already decided their role). When a node has not yet decided what its role is going to be, it is considered as an ordinary node. Except for the procedure that each node executes as soon as it starts the clustering operations, as in the case of DCA, the algorithm is message driven. Here, we use the same two types of messages used in the DCA (namely, Ch(v) and Join(v; u)). In the following we use Cluster (v) and Clusterhead to indicate the set of nodes in the cluster whose clusterhead is v and the clusterhead of a node's cluster, respectively. Finally, v's boolean variable Ch (v) is set to true if v has sent a Ch message. Furthermore, we assume that: Every node is made aware of the failure of a link, or of the presence of a new link by a service of a lower level (this will trigger the execution of the corresponding procedure); The procedures of DMAC (M-procedures, for short) are \atomic," i.e., they are not interruptible; At clustering set up or when a node is added to the network its variables Clusterhead, Ch (,), and Cluster (,) are initialized to nil, false and ;, respectively. The following is the description of the six M-procedures as executed at each node v. Init. At the clustering set up, or when a node v is added to the network, it executes the procedure Init in order to determine its own role. If among its neighbors there is at least a clusterhead with bigger weight, then v will join it. Otherwise it will be a clusterhead. Notice that a neighbor with a bigger weight that has not decided its role yet (this may happen at the clustering set up, or when two or more nodes are added to the network at the same time), will eventually s a message (every node executes the Init procedure). If this message is a Ch message, then v will aliate with the new clusterhead. procedure Init ; if fz 2,(v) :w z >w v ^ Ch (z)g 6= ; then x := max wz>w v fz : Ch (z)g; s Join(v,x);

5 ; Clusterhead := x else s Ch(v); Ch (v) :=true; Clusterhead := v; Cluster (v) :=fvg Link failure. Whenever made aware of the failure of the link with a node u, node v checks if its own role is clusterhead and if u used to belong to its cluster. If this is the case, v removes u from Cluster (v). If v is an ordinary node, and u was its own clusterhead, then it is necessary to determine a new role for v. To this aim, v checks if there exists at least a clusterhead z 2,(v) such that w z >w v. If this is the case, then v joins the clusterhead with the bigger weight, otherwise it becomes a clusterhead. procedure Link failure (u); ; if Ch (v) and (u 2 Cluster (v)) then Cluster (v) :=Cluster (v) nfug else if Clusterhead = u then if fz 2,(v) :w z >w v ^ Ch (z)g 6= ; then else x := max wz>w v fz : Ch (z)g; s Join(v,x); Clusterhead := x s Ch(v); Ch (v) :=true; Clusterhead := v; Cluster (v) :=fvg New link. When node v is made aware of the presence of a new neighbor u, itchecks if u is a clusterhead. If this is the case, and if w u is bigger than the weight ofv's current clusterhead, than, indepently of its own role, v aliates with u. procedure New link (u); ; if Ch (u) then if (w u >w Clusterhead ) then s Join(v,u); Clusterhead := u; if Ch (v) then Ch (v) :=false On receiving Ch(u). When a neighbor u becomes a clusterhead, on receiving the corresponding Ch message, node v checks if it has to aliate with u, i.e., it checks whether w u is bigger than the weight of v's clusterhead or not. In this case, indepently of its current role, v joins u's cluster. On receiving Ch(u); ; if (w u >w Clusterhead s Join(v,u); Clusterhead := u; ) then if Ch (v) then Ch (v) :=false On receiving Join(u,z). On receiving the message Join(u,z), the behavior of node v deps on whether it is a clusterhead or not. In the armative, v has to check if either u is joining its cluster (z = v: in this case, u is added to Cluster (v)) or if u belonged to its cluster and is now joining another cluster (z 6= v: in this case, u is removed from Cluster (v)). If v is not a clusterhead, it has to check ifu was its clusterhead. Only if this is the case, v has to decide its role: It will join the biggest clusterhead x in its neighborhood such that w x >w v if such a node exists. Otherwise, it will be a clusterhead. On receiving Join(u; z); ; if Ch (v) then if z = v then Cluster (v) :=Cluster (v) [fug else if u 2 Cluster (v) then Cluster (v) :=Cluster (v) nfug else if Clusterhead = u then if fz 2,(v) :w z >w v ^ Ch (z)g 6= ; then x := max wz >w v fz : Ch (z)g; s Join(v,x); Clusterhead := x else s Ch(v); Ch (v) :=true; Clusterhead := v; Cluster (v) :=fvg We conclude this section by showing that by using the M-procedures we obtain and maintain for any ad hoc network a clustering that always satises the ad hoc clustering properties listed in the Introduction. Theorem 2 Using the M-procedures, any ad hoc network is (maintained) clustered in such a way that the ad hoc clustering properties are always satised. Proof We start by noticing that it is easy to check from the code of the Init procedure that as soon as a node has executed this procedure, it is always assigned a role which is consistent with the clustering properties. We proceed by showing that by executing the M- procedures in reaction to changes in the network topology, the nodes assume/change their roles so that the ad hoc clustering properties are always satised.

6 1. That each ordinary node v does not aliate with more that one clusterhead is evident by noticing that anytime it ss a Join(v; u) message its variable Clusterhead is initialized (only) to u. That v aliates with at least a clusterhead derives from the fact that when it has to decide its role, and there are clusterheads with bigger weights among its neighbors, or when a switch to another cluster is required, the ordinary node v always looks for the clusterhead with the biggest weight and aliates with it. This can be easily checked in the codes of: the Init procedure (then branch); the Link Failure and the On receiving Join(u; z) procedures (when the link with its clusterhead u is broken, or the clusterhead u is joining another node, v looks for another clusterhead; of course, if no clusterhead is available, it will be a clusterhead), and the New Link and the On receiving Ch(u) procedures (if u is the new clusterhead on the block, if node v needs to aliate with u, it does so by executing the then branch of the innermost if). Thus, there is no case in which an ordinary node v remains without a clusterhead. 2. At the clustering set up, or when a node is added to the (already clustered) network, or when its current clusterhead moves away, a node always aliates with the clusterhead with the biggest weight (if there is no such clusterhead, it will become a clusterhead itself), so that the second ad hoc clustering property is always satised (see the code of procedures Init, Link Failure and On receiving Join). The other cases to consider are when an ordinary node v switches from a cluster to another, or when v is a clusterhead that resigns to join the cluster of a new neighboring clusterhead. In these cases, the second property is guaranteed by the procedures New Link and On Receiving Ch, where node v switches to u's cluster only if w u >w Clusterhead. 3. Each time a node becomes a clusterhead, i.e., it transmits a Ch message (see the else branch of the if in the Init procedure, the else branch of the innermost if in the Link Failure procedure, and the same branch in the On receiving Join procedure), it does so because there is no other neighboring clusterhead with which it can aliate. The other cases that remain to be checked are when either a clusterhead v has one of its neighbors that becomes a clusterhead, or a clusterhead moves into its neighborhood, and the weight of the new neighbor does not force v to aliate with it. In both these cases, the third ad hoc clustering property is guaranteed by the execution of the else branch. Thus, the three properties for ad hoc clustering are always satised. 4. Conclusions This paper presented two distributed algorithms, DCA and DMAC, for the ecient partitioning of the nodes of an ad hoc wireless network into clusters with a clusterhead and some ordinary nodes. This is a practically important task, especially for all those network algorithms/applications that assume a mobilityadaptive hierarchical organization of the network. A new weight-based criterion is introduced for the cluster formation that allows the choice of the clusterheads based on node mobility-related parameters, not available in previous clustering algorithms. The proposed algorithms need only knowledge of the local topology at each node (one hop neighbors), and allows each ordinary node to have direct access to at least a clusterhead, thus guaranteeing fast inter- and intra-cluster communication between each pair of nodes. The DCA is easy to implement and its time complexity isproven to be bounded by a network parameter that deps on the possibly changing topology of the ad hoc network rather than on n, the invariant size of the network. The DMAC combines easiness of implementation with full adaptation to the mobility of the nodes, even during clustering set up. References [1] D. J. Baker and A. Ephremides. The architectural organization of a mobile radio network via a distributed algorithm. IEEE Transactions on Communications, COM-29(11):1694{1701, November [2] D. J. Baker, A. Ephremides, and J. A. Flynn. The design and simulation of a mobile radio network with distributed control. IEEE Journal on Selected Areas in Communications, SAC-2(1):226{237, January [3] S. Basagni. Distributed and mobility-adaptive clustering for ad hoc networks. Technical Report UTD/EE-02-98, Erik Jonsson School of Engineering and Computer Science, The University oftexas at Dallas, July [4] A. Ephremides. Design concepts for a mobile-user radio network. Computers & Electrical Engineering, 10(3):127{135, [5] A. Ephremides, J. E. Wieselthier, and D. J. Baker. A design concept for reliable mobile radio networks with frequency hopping signaling. Proceedings of the IEEE, 75(1):56{73, January [6] M. Gerla and J. T.-C. Tsai. Multicluster, mobile, multimedia radio network. Wireless Networks, 1(3):255{265, [7] C. R. Lin and M. Gerla. Adaptive clustering for mobile wireless networks. Journal on Selected Areas in Communications, 15(7):1265{1275, September 1997.

Distributed Clustering for Ad Hoc Networks

Distributed Clustering for Ad Hoc Networks Distributed Clustering for Ad Hoc Networks Stefano Basagni Center for Advanced Telecommunications Systems and Services (CATSS) Erik Jonsson School of Engineering and Computer Science EC33 The University

More information

Distributed and Mobility-Adaptive Clustering for Ad Hoc Networks

Distributed and Mobility-Adaptive Clustering for Ad Hoc Networks Treasures at UT Dallas Eric Jonsson School of Engineering and Computer Science 7-1998 Distributed and Mobility-Adaptive Clustering for Ad Hoc Networks Stefano Basagni For more information about this item

More information

Distributed and Mobility-Adaptive Clustering for Multimedia Support in Multi-Hop Wireless Networks

Distributed and Mobility-Adaptive Clustering for Multimedia Support in Multi-Hop Wireless Networks Distributed and Mobility-Adaptive Clustering for Multimedia Support in Multi-Hop Wireless Networks Stefan0 Basagni Center for Advanced Telecommunications Systems and Services (CATSS) Erik Jonsson School

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

A Modified Version of DMAC Clustering Algorithm in MANET

A Modified Version of DMAC Clustering Algorithm in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.133

More information

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices Stefano Basagni Dept. of Electrical and Computer Engineering Northeastern University E-mail: basagni@ece.neu.edu Chiara Petrioli

More information

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Al-Baadani, Faris., Yousef, S., Tapaswi, S., Patnaik, K. K., and Cole, M Faculty

More information

Traffic-based, mobility-aware clustering for IEEE a UWB networks

Traffic-based, mobility-aware clustering for IEEE a UWB networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Traffic-based, mobility-aware clustering for IEEE 802.15.4a UWB networks Luca De Nardis, Daniele Domenicali

More information

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture

More information

Self-Stabilizing construction of Bounded Size Clusters

Self-Stabilizing construction of Bounded Size Clusters Self-Stabilizing construction of Bounded Size Clusters Colette Johnen LRI, Univ. Paris-Sud, CNRS F-9105 Orsay Cedex, France colette@lri.fr Le Huy Nguyen LRI, Univ. Paris-Sud, CNRS F-9105 Orsay Cedex, France

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Overlapping Clusters Algorithm in Ad hoc Networks

Overlapping Clusters Algorithm in Ad hoc Networks Overlapping Clusters Algorithm in Ad hoc Networks Nevin Aydin Istanbul Arel University Dept. of Industrial Engineering 34295 Sefakoy-Istanbul, Turkey Email: nevinaydin@arel.edu.tr Farid Naït-Abdesselam

More information

An On-Demand Weighted Clustering Algorithm (WCA) for Ad hoc Networks

An On-Demand Weighted Clustering Algorithm (WCA) for Ad hoc Networks An On-Demand Weighted Clustering Algorithm (WCA) for Ad hoc Networks Mainak Chatterjee, Sajal K. Das and Damla Turgut Center for Research in Wireless Mobility and Networking (CReWMaN) Department of Computer

More information

arxiv: v2 [cs.ds] 25 Jan 2017

arxiv: v2 [cs.ds] 25 Jan 2017 d-hop Dominating Set for Directed Graph with in-degree Bounded by One arxiv:1404.6890v2 [cs.ds] 25 Jan 2017 Joydeep Banerjee, Arun Das, and Arunabha Sen School of Computing, Informatics and Decision System

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

2014, IJARCSSE All Rights Reserved Page 597

2014, IJARCSSE All Rights Reserved Page 597 Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Mobility Based

More information

A Novel Distributed Clustering Algorithm for Mobile Ad-hoc Networks

A Novel Distributed Clustering Algorithm for Mobile Ad-hoc Networks Journal of Computer Science 4 (2): 161-166, 2008 ISSN 1549-3636 2008 Science Publications A Novel Distributed Clustering Algorithm for Mobile Ad-hoc Networks 1 Sahar Adabi, 2 Sam Jabbehdari, 1 Amirmasoud

More information

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET MPBCA: Mobility Prediction Based Clustering Algorithm for MANET Rani.V.G Associate Professor Research and Development Center Bharathiar University Coimbatore, India ranikhans@gmail.com Dr.M.Punithavalli

More information

21. Distributed Algorithms

21. Distributed Algorithms 21. Distributed Algorithms We dene a distributed system as a collection of individual computing devices that can communicate with each other [2]. This denition is very broad, it includes anything, from

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

A distributed algorithm for minimum weight spanning trees

A distributed algorithm for minimum weight spanning trees A distributed algorithm for minimum weight spanning trees R. G. Gallager, P. A. Humblet and P. M. Spira Prepared by: Guy Flysher and Amir Rubinshtein Preface In this document we will review Gallager,

More information

A Novel Weighted Clustering Algorithm Based On Mobility For Mobile Ad Hoc Networks

A Novel Weighted Clustering Algorithm Based On Mobility For Mobile Ad Hoc Networks A Novel Weighted Clustering Algorithm Based On Mobility For Mobile Ad Hoc Networks Amir Massoud Bidgoli 1, Mohammad Shayesteh 2 1 MIEEE, PHD Manchester University, Islamic Azad University-North Tehran

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Networks. 1 Introduction

Networks. 1 Introduction Bluetrees-Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks Gergely V. ZBruba, Stefan0 Basagni, and Imrich Chlamtac Center for Advanced Telecommunications Systems and Services (CATSS) Erik

More information

A Survey on One-Hop Clustering Algorithms in Mobile Ad Hoc Networks

A Survey on One-Hop Clustering Algorithms in Mobile Ad Hoc Networks J Netw Syst Manage (2009) 17:183 207 DOI 10.1007/s10922-009-9-7 A Survey on One-Hop Clustering Algorithms in Mobile Ad Hoc Networks Suchismita Chinara Æ Santanu Kumar Rath Published online: 9 May 2009

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

A simple correctness proof of the MCS contention-free lock. Theodore Johnson. Krishna Harathi. University of Florida. Abstract

A simple correctness proof of the MCS contention-free lock. Theodore Johnson. Krishna Harathi. University of Florida. Abstract A simple correctness proof of the MCS contention-free lock Theodore Johnson Krishna Harathi Computer and Information Sciences Department University of Florida Abstract Mellor-Crummey and Scott present

More information

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD CAR-TR-728 CS-TR-3326 UMIACS-TR-94-92 Samir Khuller Department of Computer Science Institute for Advanced Computer Studies University of Maryland College Park, MD 20742-3255 Localization in Graphs Azriel

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

A Static Tasks Assignment For Grid Computing

A Static Tasks Assignment For Grid Computing A Static Tasks Assignment For Grid Computing Meriem Meddeber Department of Mathematic and Computer Science University of Mascara Algeria, 29000 Email: m.meddeber@yahoo.fr Belabbas Yagoubi Department of

More information

Relation between Functional Complexity, Scalability and Energy Efficiency in WSNs

Relation between Functional Complexity, Scalability and Energy Efficiency in WSNs Relation between Functional Complexity, Scalability and Energy Efficiency in WSNs Merim Dzaferagic, Nicholas Kaminski, Irene Macaluso, and Nicola Marchetti CONNECT, Trinity College Dublin, Ireland, E-mail:

More information

On Demand Routing in Large Ad Hoc Wireless Networks with Passive Clustering

On Demand Routing in Large Ad Hoc Wireless Networks with Passive Clustering On Demand Routing in Large Ad Hoc Wireless Networks with Passive Clustering Mario Gerla, Taek Jin Kwon and Guangyu Pei Computer Science Department University of California, Los Angeles Los Angeles, CA,

More information

forward packets do not forward packets

forward packets do not forward packets Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson

More information

Optimal Subcube Fault Tolerance in a Circuit-Switched Hypercube

Optimal Subcube Fault Tolerance in a Circuit-Switched Hypercube Optimal Subcube Fault Tolerance in a Circuit-Switched Hypercube Baback A. Izadi Dept. of Elect. Eng. Tech. DeV ry Institute of Technology Columbus, OH 43209 bai @devrycols.edu Fiisun ozgiiner Department

More information

Distributed Graph Routing for WirelessHART Networks

Distributed Graph Routing for WirelessHART Networks Graph Routing for WirelessHART Networks Venkata P Modekurthy Department of Computer Science Wayne State University Detroit, MI, USA Abusayeed Saifullah Department of Computer Science Wayne State University

More information

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM SERGIY I. BUTENKO, CLAYTON W. COMMANDER, AND PANOS M. PARDALOS Abstract. In this paper, a Broadcast Scheduling Problem (bsp) in a time division multiple

More information

Interference Minimization in Topology Control for Ad Hoc Networks

Interference Minimization in Topology Control for Ad Hoc Networks Minimization in Topology Control for Ad Hoc Networks Srinath.K, Venkataramanan.P, Mary Anita Rajam Department of Computer Science and Engineering, College of Engineering, Guindy, Anna University, Chennai,

More information

A New Adaptive Distributed Routing Protocol using d-hop Dominating Sets for Mobile Ad Hoc Networks

A New Adaptive Distributed Routing Protocol using d-hop Dominating Sets for Mobile Ad Hoc Networks A New Adaptive Distributed Routing Protocol using d-hop Dominating Sets for Mobile Ad Hoc Networks Zhengnan Shi and Pradip K Srimani Dept of Computer Science Clemson University Clemson, South Carolina

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Tilings of the Euclidean plane

Tilings of the Euclidean plane Tilings of the Euclidean plane Yan Der, Robin, Cécile January 9, 2017 Abstract This document gives a quick overview of a eld of mathematics which lies in the intersection of geometry and algebra : tilings.

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

A Message Passing Strategy for Decentralized. Connectivity Maintenance in Multi-Agent Surveillance

A Message Passing Strategy for Decentralized. Connectivity Maintenance in Multi-Agent Surveillance A Message Passing Strategy for Decentralized Connectivity Maintenance in Multi-Agent Surveillance Derya Aksaray Boston University, Boston, MA, 225 A. Yasin Yazıcıoğlu 2 Massachusetts Institute of Technology,

More information

Dynamic Allocation of Clustering Technique in Ad Hoc Wireless Networks

Dynamic Allocation of Clustering Technique in Ad Hoc Wireless Networks Dynamic Allocation of Clustering Technique in Ad Hoc Wireless Networks *I-Shyan Hwang and **Chiung-Ying Wang *Department of Computer Engineering and Science Yuan-Ze University, Chung-Li, Taiwan, 3226 **Department

More information

Routing algorithms. Jan Lönnberg, 51101M. October 2, Based on G. Tel: Introduction to Distributed Algorithms, chapter 4.

Routing algorithms. Jan Lönnberg, 51101M. October 2, Based on G. Tel: Introduction to Distributed Algorithms, chapter 4. Routing algorithms Jan Lönnberg, 51101M October 2, 2002 Based on G. Tel: Introduction to Distributed Algorithms, chapter 4. 1 Contents Introduction Destination-based routing Floyd-Warshall (single processor)

More information

A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks

A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks Mary Wu 1, ChongGun Kim 1 1*, HeeJoo park 1 Dept. of Computer Eng., Yeungnam Univ., Korea Dept. of Cyber Security., Kyungil

More information

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita

More information

Fair and Flexible Budget-Based Clustering

Fair and Flexible Budget-Based Clustering Fair and Flexible Budget-Based Clustering Fehmi Ben Abdesslem, Artur Ziviani, Marcelo Dias de Amorim, and Petia Todorova UPMC Univ Paris 6, Paris, France. Emails: {fehmi,amorim}@rp.lip6.fr National Laboratory

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department

More information

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Peng-Jun Wan Khaled M. Alzoubi Ophir Frieder Abstract Connected dominating set (CDS) has been proposed as virtual backbone

More information

New strategies and extensions in weighted clustering algorithms for mobile Ad Hoc networks

New strategies and extensions in weighted clustering algorithms for mobile Ad Hoc networks Available online at www.sciencedirect.com Procedia Computer Science 19 (2013 ) 297 304 The 4 th International Conference on Ambient Systems, Networks and Technologies (ANT 2013) New strategies and extensions

More information

(a) (b) Figure 1: Bipartite digraph (a) and solution to its edge-connectivity incrementation problem (b). A directed line represents an edge that has

(a) (b) Figure 1: Bipartite digraph (a) and solution to its edge-connectivity incrementation problem (b). A directed line represents an edge that has Incrementing Bipartite Digraph Edge-connectivity Harold N. Gabow Tibor Jordan y Abstract This paper solves the problem of increasing the edge-connectivity of a bipartite digraph by adding the smallest

More information

Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem

Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem David Glickenstein November 26, 2008 1 Graph minors Let s revisit some de nitions. Let G = (V; E) be a graph. De nition 1 Removing

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

A Mutual Exclusion Algorithm for Ad Hoc Mobile Networks. Texas A&M University. fjennyw, welch,

A Mutual Exclusion Algorithm for Ad Hoc Mobile Networks. Texas A&M University.   fjennyw, welch, A Mutual Exclusion Algorithm for Ad Hoc Mobile Networks Jennifer Walter Jennifer L. Welch Nitin Vaidya Department of Computer Science Texas A&M University College Station, T 7784- E-mail: fjennyw, welch,

More information

Decreasing a key FIB-HEAP-DECREASE-KEY(,, ) 3.. NIL. 2. error new key is greater than current key 6. CASCADING-CUT(, )

Decreasing a key FIB-HEAP-DECREASE-KEY(,, ) 3.. NIL. 2. error new key is greater than current key 6. CASCADING-CUT(, ) Decreasing a key FIB-HEAP-DECREASE-KEY(,, ) 1. if >. 2. error new key is greater than current key 3.. 4.. 5. if NIL and.

More information

Constraint Optimisation Problems. Constraint Optimisation. Cost Networks. Branch and Bound. Dynamic Programming

Constraint Optimisation Problems. Constraint Optimisation. Cost Networks. Branch and Bound. Dynamic Programming Summary Network Search Bucket Elimination Soft Soft s express preferences over variable assignments Preferences give dierent values over variable assignment A student can follow only one class at a time

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Simplicial Cells in Arrangements of Hyperplanes

Simplicial Cells in Arrangements of Hyperplanes Simplicial Cells in Arrangements of Hyperplanes Christoph Dätwyler 05.01.2013 This paper is a report written due to the authors presentation of a paper written by Shannon [1] in 1977. The presentation

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Multi-hop Clustering Based on Neighborhood Benchmark in Mobile Ad-hoc Networks

Multi-hop Clustering Based on Neighborhood Benchmark in Mobile Ad-hoc Networks Multi-hop Clustering Based on Neighborhood Benchmark in Mobile Ad-hoc Networks Stephen S. Yau and Wei Gao Department of Computer Science and Engineering Arizona State University, Tempe, AZ 85287-89, USA

More information

On the Complexity of Broadcast Scheduling. Problem

On the Complexity of Broadcast Scheduling. Problem On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

A Bintree Representation of Generalized Binary. Digital Images

A Bintree Representation of Generalized Binary. Digital Images A intree Representation of Generalized inary Digital mages Hanspeter ieri gor Metz 1 inary Digital mages and Hyperimages A d-dimensional binary digital image can most easily be modelled by a d-dimensional

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

A Simplied NP-complete MAXSAT Problem. Abstract. It is shown that the MAX2SAT problem is NP-complete even if every variable

A Simplied NP-complete MAXSAT Problem. Abstract. It is shown that the MAX2SAT problem is NP-complete even if every variable A Simplied NP-complete MAXSAT Problem Venkatesh Raman 1, B. Ravikumar 2 and S. Srinivasa Rao 1 1 The Institute of Mathematical Sciences, C. I. T. Campus, Chennai 600 113. India 2 Department of Computer

More information

Associativity based cluster formation and cluster management in ad hoc networks

Associativity based cluster formation and cluster management in ad hoc networks Associativity based cluster formation and cluster management in ad hoc networks Arvind Ramalingam, Sundarpremkumar Subramani, and Karthik Perumalsamy School of Computer Science and Engineering, Anna University,

More information

Limiting the Impact of Mobility on Ad Hoc Clustering

Limiting the Impact of Mobility on Ad Hoc Clustering Limiting the Impact of Mobility on Ad Hoc Clustering Rituparna Ghosh, and Stefano Basagni Dept. of Electrical and Computer Engineering, Northeastern University Boston, MA, U.S.A. rghosh@ece.neu.edu, basagni@ece.neu.edu

More information

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor Scheduling Aperiodic Tasks in Dynamic Priority Systems Marco Spuri and Giorgio Buttazzo Scuola Superiore S.Anna, via Carducci 4, 561 Pisa, Italy Email: spuri@fastnet.it, giorgio@sssup.it Abstract In this

More information

Number Theory and Graph Theory

Number Theory and Graph Theory 1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com

More information

Checks and Balances - Constraint Solving without Surprises in Object-Constraint Programming Languages: Full Formal Development

Checks and Balances - Constraint Solving without Surprises in Object-Constraint Programming Languages: Full Formal Development Checks and Balances - Constraint Solving without Surprises in Object-Constraint Programming Languages: Full Formal Development Tim Felgentreff, Todd Millstein, Alan Borning and Robert Hirschfeld Viewpoints

More information

A Distributed Weighted Cluster Based Routing Protocol for MANETs

A Distributed Weighted Cluster Based Routing Protocol for MANETs Wireless Sensor Network, 2011, 3, 54-60 doi:10.4236/wsn.2011.32006 Published Online February 2011 (http://www.scirp.org/journal/wsn) A Distributed Weighted Cluster Based Routing Protocol for MANETs Abstract

More information

Simplicity is Beauty: Improved Upper Bounds for Vertex Cover

Simplicity is Beauty: Improved Upper Bounds for Vertex Cover Simplicity is Beauty: Improved Upper Bounds for Vertex Cover Jianer Chen, Iyad A. Kanj, and Ge Xia Department of Computer Science, Texas A&M University, College Station, TX 77843 email: {chen, gexia}@cs.tamu.edu

More information

Calculation of extended gcd by normalization

Calculation of extended gcd by normalization SCIREA Journal of Mathematics http://www.scirea.org/journal/mathematics August 2, 2018 Volume 3, Issue 3, June 2018 Calculation of extended gcd by normalization WOLF Marc, WOLF François, LE COZ Corentin

More information

On total domination and support vertices of a tree

On total domination and support vertices of a tree On total domination and support vertices of a tree Ermelinda DeLaViña, Craig E. Larson, Ryan Pepper and Bill Waller University of Houston-Downtown, Houston, Texas 7700 delavinae@uhd.edu, pepperr@uhd.edu,

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Universal Timestamp-Scheduling for Real-Time Networks. Abstract

Universal Timestamp-Scheduling for Real-Time Networks. Abstract Universal Timestamp-Scheduling for Real-Time Networks Jorge A. Cobb Department of Computer Science Mail Station EC 31 The University of Texas at Dallas Richardson, TX 75083-0688 jcobb@utdallas.edu Abstract

More information

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS Neha Jain 1, Manasvi Mannan 2 1 Research Scholar, Electronics and Communication Engineering, Punjab College Of

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc Networks

Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc Networks Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc Networks Mingqiang Xue Inn-Inn Er, Winston K.G. Seah, Networking Department, Institute for Infocomm Research Heng Mui Keng Terrace,

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

A Synchronous Self-Stabilizing Minimal Domination Protocol in an Arbitrary Network Graph

A Synchronous Self-Stabilizing Minimal Domination Protocol in an Arbitrary Network Graph A Synchronous Self-Stabilizing Minimal Domination Protocol in an Arbitrary Network Graph Z. Xu, S. T. Hedetniemi, W. Goddard, and P. K. Srimani Department of Computer Science Clemson University Clemson,

More information

Worst-case running time for RANDOMIZED-SELECT

Worst-case running time for RANDOMIZED-SELECT Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case

More information

A Fast Recursive Mapping Algorithm. Department of Computer and Information Science. New Jersey Institute of Technology.

A Fast Recursive Mapping Algorithm. Department of Computer and Information Science. New Jersey Institute of Technology. A Fast Recursive Mapping Algorithm Song Chen and Mary M. Eshaghian Department of Computer and Information Science New Jersey Institute of Technology Newark, NJ 7 Abstract This paper presents a generic

More information

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks Haixia Tan, Weilin Zeng and Lichun Bao Donald Bren School of Information and Computer Sciences University of California,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Edge Colorings of Complete Multipartite Graphs Forbidding Rainbow Cycles

Edge Colorings of Complete Multipartite Graphs Forbidding Rainbow Cycles Theory and Applications of Graphs Volume 4 Issue 2 Article 2 November 2017 Edge Colorings of Complete Multipartite Graphs Forbidding Rainbow Cycles Peter Johnson johnspd@auburn.edu Andrew Owens Auburn

More information

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information