Results 1  10
of
278
Topology Control in Wireless Ad Hoc and Sensor Networks
 ACM Computing Surveys
, 2005
"... Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal of thi ..."
Abstract

Cited by 304 (4 self)
 Add to MetaCart
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal of this technique is to control the topology of the graph representing the communication links between network nodes with the purpose of maintaining some global graph property (e.g., connectivity), while reducing energy consumption and/or interference that are strictly related to the nodes ’ transmitting range. In this article, we state several problems related to topology control in wireless ad hoc and sensor networks, and we survey stateoftheart solutions which have been proposed to tackle them. We also outline several directions for further research which we hope will motivate researchers to undertake additional studies in this field.
Does topology control reduce interference?
, 2004
"... Topology control in adhoc networks tries to lower node energy consumption by reducing transmission power and by confining interference, collisions and consequently retransmissions. Commonly low interference is claimed to be a consequence to sparseness of the resulting topology. In this paper we dis ..."
Abstract

Cited by 130 (10 self)
 Add to MetaCart
(Show Context)
Topology control in adhoc networks tries to lower node energy consumption by reducing transmission power and by confining interference, collisions and consequently retransmissions. Commonly low interference is claimed to be a consequence to sparseness of the resulting topology. In this paper we disprove this implication. In contrast to most of the related work—claiming to solve the interference issue by graph sparseness without providing clear argumentation or proofs—, we provide a concise and intuitive definition of interference. Based on this definition we show that most currently proposed topology control algorithms do not effectively constrain interference. Furthermore we propose connectivitypreserving and spanner constructions that are interferenceminimal.
Topology control meets sinr: the scheduling complexity of arbitrary topologies
 in Proceedings of ACM MobiHoc
, 2006
"... To date, topology control in wireless ad hoc and sensor networks—the study of how to compute from the given communication network a subgraph with certain beneficial properties—has been considered as a static problem only; the time required to actually schedule the links of a computed topology with ..."
Abstract

Cited by 103 (9 self)
 Add to MetaCart
(Show Context)
To date, topology control in wireless ad hoc and sensor networks—the study of how to compute from the given communication network a subgraph with certain beneficial properties—has been considered as a static problem only; the time required to actually schedule the links of a computed topology without message collision was generally ignored. In this paper we analyze topology control in the context of the physical SignaltoInterferenceplusNoiseRatio (SINR) model, focusing on the question of how and how fast the links of a resulting topology can actually be realized over time. For this purpose, we define and study a generalized version of the SINR model and obtain theoretical upper bounds on the scheduling complexity of arbitrary topologies in wireless networks. Specifically, we prove that even in worstcase networks, if the signals are transmitted with correctly assigned transmission power levels, the number of time slots required to successfully schedule all links of an arbitrary topology is proportional to the squared logarithm of the number of network nodes times a previously defined static interference measure. Interestingly, although originally considered without explicit accounting for signal collision in the SINR model, this static interference measure plays an important role in the analysis of link scheduling with physical link interference. Our result thus bridges the gap between static graphbased interference models and the physical SINR model. Based on these results, we also show that when it comes to scheduling, requiring the communication links to be symmetric may imply significantly higher costs as opposed to topologies allowing unidirectional links.
RealTime communication and coordination in embedded sensor networks
 PROCEEDINGS OF THE IEEE
, 2003
"... Sensor networks can be considered distributed computing platforms with many severe constraints including limited CPU speed, memory size, power, and bandwidth. Individual nodes in sensor networks are typically unreliable and the network topology dynamically changes, possibly frequently. Sensor networ ..."
Abstract

Cited by 96 (11 self)
 Add to MetaCart
Sensor networks can be considered distributed computing platforms with many severe constraints including limited CPU speed, memory size, power, and bandwidth. Individual nodes in sensor networks are typically unreliable and the network topology dynamically changes, possibly frequently. Sensor networks can also be considered a form of ad hoc network. However, here also many constraints in sensor networks are different or more severe. Sensor networks also differ because of their tight interaction with the physical environment via sensors and actuators. Due to all of these differences many solutions developed for general distributed computing platforms and for ad hoc networks cannot be applied to sensor networks. Many new and exciting research challenges exist. This paper discusses the state of the art and presents the key research challenges to be solved, some with initial solutions or approaches.
LowInterference Topology Control for Wireless Ad Hoc Networks
 ACM Wireless Networks
, 2005
"... supported by NSF CCR0311174. Abstract — Topology control has been well studied in wireless ad hoc networks. However, only a few topology control methods take into account the low interference as a goal of the methods. Some researchers tried to reduce the interference by lowering node energy consump ..."
Abstract

Cited by 79 (1 self)
 Add to MetaCart
supported by NSF CCR0311174. Abstract — Topology control has been well studied in wireless ad hoc networks. However, only a few topology control methods take into account the low interference as a goal of the methods. Some researchers tried to reduce the interference by lowering node energy consumption (i.e. by reducing the transmission power) or by devising low degree topology controls, but none of those protocols can guarantee low interference. Recently, Burkhart et al. [?] proposed several methods to construct topologies whose maximum link interference is minimized while the topology is connected or is a spanner for Euclidean length. In this paper we give algorithms to construct a network topology for wireless ad hoc network such that the maximum (or average) link (or node) interference of the topology is either minimized or approximately minimized. Index Terms — Topology control, interference, wireless ad hoc networks.
FLSS: A FaultTolerant Topology Control Algorithm for Wireless Networks
, 2004
"... Topology control algorithms usually reduce the number of links in a wireless network, which in turn decreases the degree of connectivity. The resulting network topology is more susceptible to system faults such as node failures and departures. In this paper, we consider kvertex connectivity of a wi ..."
Abstract

Cited by 71 (4 self)
 Add to MetaCart
Topology control algorithms usually reduce the number of links in a wireless network, which in turn decreases the degree of connectivity. The resulting network topology is more susceptible to system faults such as node failures and departures. In this paper, we consider kvertex connectivity of a wireless network. We first present a centralized algorithm, Faulttolerant Global Spanning Subgraph (FGSSk), which preserves kvertex connectivity. FGSSk is minmax optimal, i.e., FGSSk minimizes the maximum transmission power used in the network, among all algorithms that preserve kvertex connectivity. Based on FGSSk, we propose a localized algorithm, Faulttolerant Local Spanning Subgraph (FLSSk). It is proved that FLSSk preserves kvertex connectivity while maintaining bidirectionality of the network, and FLSSk is minmax optimal among all strictly localized algorithms. We then relax several widely used assumptions for topology control to enhance the practicality of FGSSk and FLSSk. Simulation results show that FLSSk is more powerefficient than other existing distributed/localized topology control algorithms.
Link scheduling in sensor networks: Distributed edge coloring revisited
 in INFOCOM
, 2005
"... Abstract — We consider the problem of link scheduling in a sensor network employing a TDMA MAC protocol. Our link scheduling algorithm involves two phases. In the first phase, we assign a color to each edge in the network such that no two edges incident on the same node are assigned the same color. ..."
Abstract

Cited by 53 (0 self)
 Add to MetaCart
(Show Context)
Abstract — We consider the problem of link scheduling in a sensor network employing a TDMA MAC protocol. Our link scheduling algorithm involves two phases. In the first phase, we assign a color to each edge in the network such that no two edges incident on the same node are assigned the same color. We propose a distributed edge coloring algorithm that needs at most (δ+1) colors, where δ is the maximum degree of the graph. To the best of our knowledge, this is the first distributed algorithm that can edge color a graph with at most (δ +1) colors. In the second phase, we map each color to a unique timeslot and attempt to identify a direction of transmission along each edge such that the hidden terminal and the exposed terminal problems are avoided. Next, considering topologies for which a feasible solution does not exist, we obtain a direction of transmission for each edge using additional timeslots, if necessary. Finally, we show that reversing the direction of transmission along every edge leads to another feasible direction of transmission. Using both the transmission assignments we obtain a TDMA MAC schedule which enables twoway communication between every pair of neighbors. For acyclic topologies, we show that at most 2(δ +1) timeslots are required. Through simulations we show that for sparse graphs with cycles the number of timeslots assigned is close to 2(δ +1).
A Robust Interference Model for Wireless Ad Hoc Networks
 5th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN
, 2005
"... Among the foremost goals of topology control in wireless adhoc networks is interference reduction. This paper presents a receivercentric interference model featuring two main advantages over previous work. First, it reflects the fact that interference occurs at the intended receiver of a message. ..."
Abstract

Cited by 47 (5 self)
 Add to MetaCart
(Show Context)
Among the foremost goals of topology control in wireless adhoc networks is interference reduction. This paper presents a receivercentric interference model featuring two main advantages over previous work. First, it reflects the fact that interference occurs at the intended receiver of a message. Second, the presented interference measure is robust with respect to addition or removal of single network nodes. Regarding both of these aspects our model intuitively corresponds to the behavior of interference in reality. Based on this interference model, we show that currently known topology control algorithms poorly reduce interference. Motivated by the observation that already onedimensional network instances display the intricacy of the considered problem, we continue to focus on the socalled highway model. Setting out to analyze the special case of the exponential node chain, we eventually describe an algorithm guaranteeing to achieve a 4 √ ∆approximation of the optimal connectivitypreserving topology in the general highway model. 1.
Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
 IEEE TRANSACTIONS ON MOBILE COMPUTING
, 2005
"... We study an efficient broadcast scheme in mobile ad hoc networks (MANETs). The objective is to determine a small set of forward nodes to ensure full coverage. We first study several methods that guarantee coverage when the local view of each node on its neighborhood information is updated in a time ..."
Abstract

Cited by 35 (2 self)
 Add to MetaCart
(Show Context)
We study an efficient broadcast scheme in mobile ad hoc networks (MANETs). The objective is to determine a small set of forward nodes to ensure full coverage. We first study several methods that guarantee coverage when the local view of each node on its neighborhood information is updated in a timely manner. Then we consider a general case where nodes move even during the broadcast process, making it impractical to maintain uptodate and consistent local views. A formal framework is used to model inaccurate local views in MANETs, where full coverage is guaranteed if three sufficient conditions, connectivity, link availability, and consistency, are met. Three solutions are proposed to satisfy those conditions. First, we give a minimal transmission range that maintains the connectivity of the virtual network constructed from local views. Then, we use two transmission ranges, one for neighborhood information collection and the other for actual data transmission, to form a buffer zone that guarantees the availability of logical links in the physical network. Finally, we propose a mechanism called aggregated local view to ensure consistent local views. By these, we extend Wu and Dai’s coverage condition for broadcasting in a network with mobile nodes. The effectiveness of the proposed scheme is confirmed via both performance analysis and simulation study.