PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks

Similar documents
6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Improving IEEE Power Saving Mechanism

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments

Random Asynchronous Wakeup Protocol for Sensor Networks

Journal of Wireless Sensor Networks. Topology control in Heterogeneous Wireless Sensor Network

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

Routing Protocols in MANETs

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks

Research Paper FAULT MANAGEMENT USING MODIFIED RAT FOR WIRELESS SENSOR NETWORKS Sathyapriya.L Jawahar A

Clustering Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks

Selective Backbone Construction for Topology Control in Ad Hoc Networks

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

CSMA based Medium Access Control for Wireless Sensor Network

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Topology control in MANET for efficient energy conservation

A Survey - Energy Efficient Routing Protocols in MANET

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

The General Analysis of Proactive Protocols DSDV, FSR and WRP

Performance Analysis of Aodv Protocol under Black Hole Attack

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Efficient Routing Algorithm for MANET using Grid FSR

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

3. Evaluation of Selected Tree and Mesh based Routing Protocols

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

A Distributed Weighted Cluster Based Routing Protocol for MANETs

Medium Access Control Protocols: scheduled schemes

Ad hoc and Sensor Networks Topology control

AODV-PA: AODV with Path Accumulation

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

A Literature survey on Improving AODV protocol through cross layer design in MANET

Performance Evaluation of Various Routing Protocols in MANET

A new contention-based MAC protocol for geographic forwarding in ad hoc and sensor networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

Performance Evaluation of MANET through NS2 Simulation

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Grid-Based Channel Resource Allocation and Access Scheduling Using Latin Squares in Wireless Mesh Networks

Dynamic bandwidth management for multihop wireless ad hoc networks

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

A Modified Version of DMAC Clustering Algorithm in MANET

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Heuristic Clustering Algorithms in Ad hoc Networks

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Power Aware Routing using Power Control in Ad Hoc Networks

Introduction to Mobile Ad hoc Networks (MANETs)

Energy Efficient EE-DSR Protocol for MANET

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS

On-demand Power Management for Ad Hoc Networks

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

CS551 Ad-hoc Routing

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

Zonal Rumor Routing for. Wireless Sensor Networks

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Computation of Multiple Node Disjoint Paths

Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes

2013, IJARCSSE All Rights Reserved Page 85

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Extending the Lifetime of Ad Hoc Wireless Networks

Recent Researches in Communications, Information Science and Education

AN OPTIMIZED CLUSTER BASED APPROACH FOR MULTI- SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS USING OWCA

Routing protocols in WSN

Figure 1. Clustering in MANET.

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Transcription:

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks Haixia Tan, Weilin Zeng and Lichun Bao Donald Bren School of Information and Computer Sciences University of California, Irvine, Irvine, CA 92697 {htan, wzeng, lbao}@ics.uci.edu Abstract. We propose a distributed and adaptive topology management algorithm, called PATM (Priority-based Adaptive Topology Management), that constructs and maintains a connected backbone topology based on a minimal dominating set of the network. PATM provides a succinct presentation of the network topology to routing protocols, and therefore reduces the control overhead in routing updates. Two optimizations are proposed to further reduce the topological information exchanges among the nodes by piggybacking topology updates in packets transmitted by each node, and adaptively adjusting the topology update intervals. The efficiency of the algorithm is validated by simulations based on (Dynamic Source Routing) protocol. The simulation results demonstrate that PATM not only significantly reduces the routing control overhead, but also substantially improves the network data forwarding performance.. Introduction Different from most cellular networks which are supported by a fixed, wired infrastructure, and scheduled by the central base stations, ad hoc networks are selforganizing, self-configuring wireless networks. Topology management has been proposed as an effective and efficient approach to performing some control functionalities in ad hoc networks. The main task of topology management is to select an appropriate subset of the original topological network graph. The backbone constructions are usually based on hierarchical clustering, which consists of selecting a set of clusterheads that covers every other node, and are connected with each other by means of gateways. Different clustering algorithms propose different criteria in selecting clusterheads and gateways [3][7][][6][8]. SPAN [2] adaptively elects coordinators according to the remaining energy and the number of pairs of neighbors a node can connect. GAF [] subdivides a sensor network into small grids, such that only one node in each grid is active at each point of time. PILOT [2] proposed to use a set of mobile nodes in the sensor network to bridge failing connections. In ASCENT [5], a node decides to join the backbone based on the number of neighbors and the data message loss probability at the node. STEM [4] also saves power by turning off a node s radio. It adaptively puts nodes to sleep and to wake up nodes only when they need to forward data. TMPO [6] proposes to construct and maintain a network backbone based on MDS (Minimal Dominating Set) and CDS (Connected Dominating Set) using only two-hop neighbor information. CEC [7] is another distributed, proactive clustering algorithm. In CEC, Clusterhead election is based on the lifetime of each node. The gateways are elected according to the node s degree. CEC is an improvement of Geographic Adaptive Fidelity (GAF []), which relies on location information.

Unlike TMPO, CEC, and WCA [8], On-Demand Cluster Formation (ODCF []) is a reactive, on-demand clustering algorithm. Adaptive Clustering (AC [3]) proposed to use clustering for different tasks, such as spatial reuse of bandwidth, Quality of Service (QoS) provisioning by resource allocation within clusters. We propose a novel hierarchical clustering algorithm, Priority-based Adaptive Topology Management (PATM), which is adaptive to the dynamic changes of topology, bandwidth resource availability and traffic loads. We show that cluster-based control mechanisms can significantly reduce the overhead in routing, while improving data forwarding services. In comparison with other clustering algorithms (such as GAF [], PILOT [2], and TMPO [6], etc.), PATM distinguishes itself by combining these features: () It does not require node position information or synchronization among nodes. (2) It does not need centralized control over the ad hoc network. Every node makes decisions based on its local information. (3) It proactively maintains a connected backbone, but without exchanging control messages periodically. Furthermore, topology updates are dramatically reduced using two optimizations. The first one is to piggyback the small control messages to the ongoing traffic. The second is to adapt the topology update intervals based on the network mobility. The rest of the paper is organized as follows. Section 2 describes PATM algorithm. Section 3 presents extensive simulation results by running with and without topology management using PATM. Section 4 summarizes this paper. 2. PATM 2. Priority Computation PATM is a distributed clustering algorithm for constructing the connected dominating set of the network by comparing the priorities of two-hop neighbors. The priority of a node, say i, is a function of the node s ID, current time slot number t, the remaining energy Ei and the moving speed of the node Si using the following formula: Pi = h( i, t, Ei, Si) which gives low priority at high speed or low energy situations. 2.2 Information Exchange PATM requires nodes in an ad hoc network directly exchange priority information of themselves and that of their one-hop neighbors. This change in the information exchange allows the nodes to adapt the interval of their priority computations according to the network traffic and mobility conditions, instead of carrying out the priority computation by other nodes periodically. When network traffic load or mobility varies at different parts of the network, nodes can be more active or passive in forming the backbone of the network. For example, when a region of the network carries very light traffic, PATM can increase the interval of priority updates, causing less control overhead, and more energy savings.

In addition to exchanging the priority information of the nodes, the clusterhead status of a node and its one-hop neighbors are also exchanged by broadcasts. i Pi i.type i Pi i.type j Pj j.type k Pk k.type Fig. Information in a PATM Update Packet j Pj j.type k Pk k.type N j N k - - - - Fig. 2 Node i s Neighbor Table As an example where node i has two one-hop neighbors j and k, that is, N i = {j, k}, node i broadcasts a packet with the information shown in Fig.. Similarly, node j broadcasts the information about itself and N j. So does node k. According to the neighbor information exchanged, every node acquires and maintains a neighbor table that stores the information about its one-hop and two-hop neighbors including the priority and the type of each node. Following the same example given in Fig., the content of node i s neighbor table is shown in Fig. 2. The last two rows in Fig. 3 is an abbreviation of all the one-hop neighbors of node j and k, which is dependent on the concrete topology of the network. The corresponding attributes of the members in the last two rows are omitted. 2.3 Clusterhead Election Without loss of generality, we describe PATM clusterhead election algorithm from node i s point of view. First, node i initializes its own type as host. Then it decides to become a clusterhead if either one of the following criteria are satisfied. () Node i has the highest priority in its one-hop neighborhood. (2) Node i has the highest priority in the one-hop neighborhood of one of its onehop neighbors. 2.4 Doorway and Gateway Election After the MDS is formed, the CDS is constructed in two steps. () If two clusterheads in the MDS are separated by three hops and there are no other clusterheads between them, a node with the highest priority on the shortest paths between them is elected as a doorway, and becomes a member of the CDS. (2) If two clusterheads or one clusterhead and one doorway are only two hops away, and there are no other clusterheads between them, one of the nodes between them with the highest priority becomes a gateway connecting the clusterhead to another clusterhead or the doorway to the clusterhead, and becomes a member of the CDS.

As an example, Fig. 3 (a) shows the topology of an ad hoc network. Fig. 3 (b) shows a possible result of applying topology management and forming the CDS. Fig. 3 Topology Management 2.5 Piggybacking Optimization In PATM, nodes in networks have to exchange routing control information to maintain the connectivity of the networks in mobile environments. Therefore, instead of sending out topology management update packets alone, we apply the piggybacking mechanism to the ongoing topology update packets whenever necessary. The outgoing packets are those sent by the network layer, which could be regular data packets, or routing control messages, such as Route Request (RREQ) and Route Reply (RREP) in. 2.6 Adaptation to Network Mobility The adaptation of PATM to network mobility is based on a key observation that the interval between re-computing the node priorities and sending topology updates is critical for the network performance. If the interval is too short, the control packet overhead will increase dramatically, and if the interval is too large, the CDS in PATM may not be able to catch up with the topology change. In PATM, the interval of recomputing the node priorities and updating neighbor information varies at different nodes. Each node determines its own interval value. The frequency of one-hop neighbor changes during the current update interval is taken as an indicator of the relative speed in deciding the next update interval in PATM. As shown before, every node maintains a neighbor table in PATM. The number of one-hop neighbor changes during the current interval Ti is used to update the next interval value Ti for topology updates. In addition, if node i has not received any packets from a one-hop neighbor for a certain period of time, this one-hop neighbor and its associated two-hop neighbors will be deleted from the table. Fig. 4-6 describe the essential functions of PATM using C-style pseudo-codes. Fig. 4 provides the initialization of various variables in PATM. Fig. 5 specifies the callback function after each update interval to adjust the next update interval. For convenience, the factors adjusting the interval value are given in the algorithm, which performs well in the simulations. However, they are tunable parameters. Fig. 6 provides the condition for piggybacking topology updates to the outgoing packets.

Init(i) { piggybacked = FALSE; 2 onehopchangenum = 0; 3 Ti = 0; 4 Schedule(Callback, Oi); } Fig. 4 Initialization in PATM Piggyback(i) { if (Current_time()-piggyback_time > Ti-2) { 2 Piggyback_topology( ); 3 piggyback_time = Current_time(); 4 piggybacked = TRUE; 5 } } Fig. 6 PATM Function for Piggyback Callback(i) { // Re-compute priority t = Current_time(); 2 Pi = h(i, t, Ei, Si); 3 if (!piggybacked) 4 Propagate_topology(); 5 piggybacked = FALSE; 6 Check_one_hop_nbr(); 7 if(onehopchangenum <= ) 8 Ti *= 2; 9 else if (onehopchangenum <= 4) 0 Ti *=.5; else if (onehopchangenum >= 8 && onehopchangenum <= 5) 2 Ti *= 0.75; 3 else if (onehopchangenum > 5) 4 Ti = 30; //Ti is 30 seconds. 5 onehopchangenum = 0; // Schedule the next callback. 6 Schedule(Callback, Ti); } Fig. 5 PATM Function for Maintenance Before any outgoing packet is sent down to the network interface, function Piggyback() is invoked to see if there is a topology update packet ready to piggyback. The variable piggyback_time records the time when a piggyback happens (Piggyback() line 3). To prevent the piggyback procedure from happening too frequently, piggybacking happens only if the time difference between the current time and piggyback_time is greater than a threshold (Piggyback line ). In addition, the same topology information does not have to be piggybacked in every outgoing packet because the transmission delay increases as the size of each packet increases (Piggyback() line 4 and Callback() line 3-4). If the topology information has not gotten an opportunity to be piggybacked during the period, node i will broadcast it in a separate control packet (Callback line 3-5) so as to guarantee the topology information is broadcast at least once in a period. In Fig. 5, function Check_one_hop_nbr() is not specified, but is used to check the validation of every element in N i. Variable onehopchangenum is used to record the number of one-hop neighborhood changes during the current update period. The variable is set to 0 in the initialization (Init() line 3) and at the beginning of each period (Callback line 5). Thereafter, every time when a one-hop neighbor is inserted or deleted from the neighbor table, the variable will be increased by. At the end of the period, the value of onehopchangenum is checked as the relative speed to adjust the length of the next period (Callback line 7-4).

3. Performance Evaluation 3. Simulation Environment We simulate PATM by combining with the Dynamic Source Routing protocol (), which is a reactive unicast ad hoc routing protocol, using NS-2 simulator [0]. The major control overhead of is caused by Route Request packets (RREQs) which are flooded in the network in search of paths to the destinations. Therefore, we modify the Route Request phase such that every node rebroadcasts an RREQ packet if the node is not a host. As a result, hosts are excluded from intermediate nodes for a routing path. We compare the performance of with three modified versions. Table summarizes the different characteristics of the four routing protocols. We also compare the performance of PATM with another clustering algorithm, SPAN [2]. Both protocols run over. Table. Characteristics of Protocols Protocol With piggyback? Topology adaptive? No No -PATM- No No -PATM-2 Yes No -PATM-3 Yes Yes We use the following metrics to show the performance of each protocol. () Normalized Control Overhead: the total number of control packets divided by the total number of data packets delivered to destinations. (2) Delivery Ratio: the total number of data packets delivered to destinations divided by the total number of data packets sent from sources. (3) Average Delay: the average delay of all the data packets delivered to destinations. (4) Goodput: the total number of data packets delivered to destinations during a simulation divided by the time span of the simulation. 3.2 Simulation Results First, scenarios with different offered load are simulated where the number of CBR sessions varies from 5 to 60. The maximum speed of the nodes is 20m/s. In -PATM- and -PATM-2, the value of the interval T is set to 20s for all the nodes.

Normalized Overhead 8 7 -PATM- 6 -PATM-2 5 -PATM-3 4 3 2 0 5 20 25 30 35 40 45 50 55 60 Delivery Ratio 0.9 -PATM- 0.8 -PATM-2 0.7 -PATM-3 0.6 0.5 0.4 0.3 0.2 5 20 25 30 35 40 45 50 55 60 Average Delay (s) 3.5 3 -PATM- 2.5 -PATM-2 2 -PATM-3.5 0.5 0 5 20 25 30 35 40 45 50 55 60 Fig. 7 Performance under Various Loads Fig. 7 shows the performance comparison under different metrics between the four protocols. It is apparent that the PATM-3 with piggybacking and adaptive update interval adjustment improves the delivery ratio, and reduces the routing overhead and average delay in most of the cases. Normalized Overhead 9 8 -PATM- 7 -PATM-2 6 -PATM-3 5 4 3 2 0 0 5 0 5 20 25 30 Maximum speed (m/s) Delivery Ratio 0.7 0.65 0.6 0.55 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0 5 0 5 20 25 30 Maximum speed (m/s) -PATM- -PATM-2 -PATM-3 Average Delay (s) 8 7 6 5 4 3 2 0 5 0 5 20 25 30 Maximum speed (m/s) -PATM- -PATM-2 -PATM-3 Fig. 8 Performance under Various Speeds In the second set of simulations, we fix the number of CBR sessions to 50 and vary the maximum speed of nodes from 0 to 30m/s. Fig. 8 show the performance of the four protocols under different speeds. -PATM-3 always performs the best among all the protocols, in both low mobility and high mobility scenarios. Normalized Overhead.2 -PATM 0.8 -SPAN 0.6 0.4 0.2 0 5 0 5 20 25 30 35 40 Goodput (pkt/s) 300 280 -PATM 260 -SPAN 240 220 200 80 60 5 0 5 20 25 30 35 40 Average Delay (s) 0.8 0.7 0.6 0.5 0.4 0.3 -PATM 0.2 -SPAN 0. 5 0 5 20 25 30 35 40 Fig. 9 Performance Comparison between PATM and SPAN Third, we compare PATM with SPAN. Here TCP flows are used to simulate data traffic. Each TCP flow lasts 900 seconds, which is the length of the whole simulation. Scenarios with different offered load are simulated where the number of TCP flows varies from 5 to 40. The maximum speed of the nodes is 20m/s. Fig. 0 shows the performance comparison, and PATM achieves smaller overhead and delay, and higher goodput. 4. Conclusions We have presented PATM, a highly efficient topology management approach based on dynamic node priorities and network mobility. PATM builds a backbone of

the original network for sufficient network connectivity and efficient data communication. We have applied it to routing protocols and have shown that it can reduce the control overhead significantly while improving the routing performance. Several optimizations have been applied in PATM such as update piggybacking, mobilityadaptive priority re-computation and topology information update. We show the application of PATM to the on-demand routing protocol. Simulation studies demonstrate that PATM can reduce the routing overhead dramatically while improving the routing performance, in a variety of mobility scenarios with different traffic load. References. Y. Xu, J. Heidemann, D. Estrin. Geography-informed energy conservation for ad hoc routing. Proc. of MobiCom 200, Rome, Italy, pp. 70-84, July 200. 2. T. Srinidhi, G. Sridhar, V. Sridhar, Topology management in ad hoc mobile wireless networks. Real-Time Systems Symposium, Work-in-Progress Session, Cancun, Mexico, December 3rd, 2003. 3. C.R. Lin, M. Gerla. Adaptive clustering for mobile wireless networks. IEEE Journal on Selected Areas in Communications, vol. 5, no. 7, pages 265-275, 997. 4. C. Schurgers, V. Tsiatsis, S. Ganeriwal, M. Srivastava. Topology management for sensor networks: exploiting latency and density. Proc. of the 3rd ACM MobiHoc, Lausanne, Switzerland, June 9-, 2002. 5. A. Cerpa, D. Estrin. ASCENT: Adaptive self-configuring sensor networks topologies. Proc. of IEEE INFOCOM, Jun. 2002. 6. L. Bao, J.J. Garcia-Luna_Aceves. Topology management in ad hoc networks. Proc. of the 4th ACM MobiHoc, Annapolis, Maryland, June -3, 2003. 7. Y. Xu, S. Bien. Topology control protocols to conserve energy in wireless ad hoc networks. Submitted for review to IEEE Transactions on Mobile Computing, January 2003. CENS Technical Report 0006. 8. M. Chatterjee, S.K. Das, D. Turgut. WCA: a weighted clustering algorithm for mobile ad hoc networks. ClusterComputing 5, pp. 93--204, 2002. 9. A. Amis, R. Prakash, T. Vuong, D.T. Huynh. MaxMin D-Cluster Formation in Wireless Ad Hoc Networks. Proc. of IEEE INFOCOM, March 2000. 0. NS notes and documentation. http://www.isi.edu/nsnam/ns.. Y. Yi, M. Gerla, T.J. Kwon. Efficient flooding in ad hoc networks using on-demand (passive) cluster formation. Proc. of the 3rd ACM MobiHoc, Lausanne, Switzerland, June 9-, 2002. 2. B. Chen, K. Jamieson, H. Balakrishnan, Robert Morris. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks. Wireless Networks: 8 (5): 48-494, September 2002.