+ All Categories
Home > Documents > A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 ·...

A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 ·...

Date post: 10-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
14
1 A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop Networks Li (Erran) Li Joseph Y. Halpern Department of Computer Science Department of Computer Science Cornell University Cornell University [email protected] [email protected] Paramvir Bahl Yi-Min Wang Microsoft Research Microsoft Research [email protected] [email protected] Roger Wattenhofer ETH Zurich [email protected] Abstract— The topology of a wireless multi-hop network can be con- trolled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based distributed topology-control (CBTC) algorithm. This algorithm does not assume that nodes have GPS information available; rather it depends only on directional information. Roughly speaking, the basic idea of the algorithm is that a node transmits with the minimum power required to ensure that in every cone of de- gree around , there is some node that can reach with power . We show that taking is a necessary and sufficient condition to guar- antee that network connectivity is preserved. More precisely, if there is a path from to when every node communicates at maximum power then, if , there is still a path in the smallest symmetric graph contain- ing all edges such that can communicate with using power . On the other hand, if , connectivity is not necessarily preserved. We also propose a set of optimizations that further reduce power consump- tion and prove that they retain network connectivity. Dynamic reconfigu- ration in the presence of failures and mobility is also discussed. Simulation results are presented to demonstrate the effectiveness of the algorithm and the optimizations. I. I NTRODUCTION Multi-hop wireless networks, such as radio networks [11], ad- hoc networks [16], and sensor networks [4], [18], are networks where communication between two nodes may go through mul- tiple consecutive wireless links. Unlike wired networks, which typically have a fixed network topology (except in case of fail- ures), each node in a wireless network can potentially change the network topology by adjusting its transmission power to con- trol its set of neighbors. The primary goal of topology control is to design power-efficient algorithms that maintain network connectivity and optimize performance metrics such as network This is a revised and extended version of “Analysis of a cone-based topology- control algorithm for wireless multi-hop networks”, which appeared in Proceed- ings of ACM Principles of Distributed Computing (PODC), 2001, and includes results from “Distributed topology control for power efficient operation in mul- tihop wireless ad hoc networks”, by R. Wattenhofer, L. Li, P. Bahl, and Y. M. Wang, which appeared in Proceedings of IEEE INFOCOM, 2001. The work of Halpern and Li was supported in part by NSF under grants grants IRI-96-25901, IIS-0090145, and NCR97-25251, and ONR under grants N00014-00-1-03-41, N00014-01-10-511, and N00014-01-1-0795. The work of Wattenhofer was supported in part by the National Compe- tence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National Science Foundation under grant number 5005-67322. lifetime and throughput. As pointed out by Chandrakasan et. al [2], network protocols that minimize energy consumption are key to the successful usage of wireless sensor networks. To sim- plify deployment and reconfiguration in the presence of failures and mobility, distributed topology-control algorithms that uti- lize only local information and allow asynchronous operations are particularly attractive. The topology-control problem can be formalized as follows. We are given a set of possibly mobile nodes located in the plane. Each node is specified by its coordinates, ( , ), at any given point in time. Each node has a power function where gives the minimum power needed to establish a communication link to a node at distance away from . As- sume that the maximum transmission power is the same for every node, and the maximum distance for any two nodes to communicate directly is , i.e. . If every node transmits with power , then we have an induced graph where (where is the Euclidean distance between and ). Although this model is not always appropriate, Rodouplu and Meng [23] argue that it does capture various radio propagation environments. It is undesirable to have nodes transmit with maximum power for two reasons. First, since the power required to transmit be- tween nodes increases as the th power of the distance between them, for some [22], it may require less power for a node to relay messages through a series of intermediate nodes to than to transmit directly to . Second, the greater the power with which a node transmits, the greater the likelihood of the transmission interfering with other transmissions. Our goal in performing topology control is to find an undi- rected 1 subgraph of such that (1) consists of all the nodes in but has fewer edges, (2) if and are connected in , they are still connected in , and (3) a node can trans- mit to all its neighbors in using less power than is required to transmit to all its neighbors in . Since minimizing power consumption is so important, it is desirable to find a graph Directed links complicate the design of routing and MAC protocols [19].
Transcript
Page 1: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

1

A Cone-Based Distributed Topology-ControlAlgorithm for Wireless Multi-Hop Networks

Li (Erran) Li� Joseph Y. Halpern�

Department of Computer Science Department of Computer ScienceCornell University Cornell University

[email protected] [email protected]

Paramvir Bahl Yi-Min WangMicrosoft Research Microsoft Research

[email protected] [email protected]

Roger Wattenhofer�

ETH [email protected]

Abstract— The topology of a wireless multi-hop network can be con-trolled by varying the transmission power at each node. In this paper,we give a detailed analysis of a cone-based distributed topology-control(CBTC) algorithm. This algorithm does not assume that nodes have GPSinformation available; rather it depends only on directional information.Roughly speaking, the basic idea of the algorithm is that a node � transmitswith the minimum power ���� required to ensure that in every cone of de-gree � around �, there is some node that � can reach with power ����. Weshow that taking � � ���� is a necessary and sufficient condition to guar-antee that network connectivity is preserved. More precisely, if there is apath from � to � when every node communicates at maximum power then, if� � ����, there is still a path in the smallest symmetric graph �� contain-ing all edges ��� � such that � can communicate with using power ����.On the other hand, if � ����, connectivity is not necessarily preserved.We also propose a set of optimizations that further reduce power consump-tion and prove that they retain network connectivity. Dynamic reconfigu-ration in the presence of failures and mobility is also discussed. Simulationresults are presented to demonstrate the effectiveness of the algorithm andthe optimizations.

I. INTRODUCTION

Multi-hop wireless networks, such as radio networks [11], ad-hoc networks [16], and sensor networks [4], [18], are networkswhere communication between two nodes may go through mul-tiple consecutive wireless links. Unlike wired networks, whichtypically have a fixed network topology (except in case of fail-ures), each node in a wireless network can potentially change thenetwork topology by adjusting its transmission power to con-trol its set of neighbors. The primary goal of topology controlis to design power-efficient algorithms that maintain networkconnectivity and optimize performance metrics such as network

This is a revised and extended version of “Analysis of a cone-based topology-control algorithm for wireless multi-hop networks”, which appeared in Proceed-ings of ACM Principles of Distributed Computing (PODC), 2001, and includesresults from “Distributed topology control for power efficient operation in mul-tihop wireless ad hoc networks”, by R. Wattenhofer, L. Li, P. Bahl, and Y. M.Wang, which appeared in Proceedings of IEEE INFOCOM, 2001.

�The work of Halpern and Li was supported in part by NSF under grantsgrants IRI-96-25901, IIS-0090145, and NCR97-25251, and ONR under grantsN00014-00-1-03-41, N00014-01-10-511, and N00014-01-1-0795.

�The work of Wattenhofer was supported in part by the National Compe-tence Center in Research on Mobile Information and Communication Systems(NCCR-MICS), a center supported by the Swiss National Science Foundationunder grant number 5005-67322.

lifetime and throughput. As pointed out by Chandrakasan et. al[2], network protocols that minimize energy consumption arekey to the successful usage of wireless sensor networks. To sim-plify deployment and reconfiguration in the presence of failuresand mobility, distributed topology-control algorithms that uti-lize only local information and allow asynchronous operationsare particularly attractive.

The topology-control problem can be formalized as follows.We are given a set � of possibly mobile nodes located in theplane. Each node � � � is specified by its coordinates, (����,����),at any given point in time. Each node � has a power function� where ���� gives the minimum power needed to establish acommunication link to a node � at distance � away from �. As-sume that the maximum transmission power ���� is the samefor every node, and the maximum distance for any two nodesto communicate directly is �, i.e. ���� � ����. If everynode transmits with power ����, then we have an induced graph�� � ��� where � ��� ��� ��� �� � �� (where ��� ��is the Euclidean distance between � and �). Although this modelis not always appropriate, Rodouplu and Meng [23] argue that itdoes capture various radio propagation environments.

It is undesirable to have nodes transmit with maximum powerfor two reasons. First, since the power required to transmit be-tween nodes increases as the �th power of the distance betweenthem, for some � � � [22], it may require less power for a node� to relay messages through a series of intermediate nodes to� than to transmit directly to �. Second, the greater the powerwith which a node transmits, the greater the likelihood of thetransmission interfering with other transmissions.

Our goal in performing topology control is to find an undi-rected1 subgraph � of �� such that (1) � consists of all thenodes in �� but has fewer edges, (2) if � and � are connectedin ��, they are still connected in �, and (3) a node � can trans-mit to all its neighbors in � using less power than is requiredto transmit to all its neighbors in ��. Since minimizing powerconsumption is so important, it is desirable to find a graph �

�Directed links complicate the design of routing and MAC protocols [19].

Page 2: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

2

satisfying these three properties that minimizes the amount ofpower that a node needs to use to communicate with all itsneighbors. Furthermore, for a topology control algorithm to beuseful in practice, it must be possible for each node � in thenetwork to construct its neighbor set ���� � ����� �� � ��in a distributed fashion. Finally, if �� changes to ��

� due tonode failures or mobility, it must be possible to reconstruct aconnected �� without global coordination.

In this paper we consider a cone-based topology-control (CBTC)algorithm, and show that it satisfies all these desiderata. Mostprevious papers on topology control have utilized position infor-mation, which usually requires the availability of GPS at eachnode. There are a number of disadvantages with using GPS.In particular, the acquisition of GPS location information in-curs a high delay, and GPS does not work in indoor environ-ments or cities. By way of contrast, the cone-based algorithmrequires only the availability of directional information. That is,it must be possible to estimate the direction from which anothernode is transmitting. Techniques for estimating direction with-out requiring position information are available, and discussedin the IEEE antenna and propagation community as the Angle-of-Arrival problem. The standard way of doing this is by usingmore than one directional antenna (see [12]). Specifically, thedirection of incoming signals is determined from the differencein their arrival times at different elements of the antenna. 2

The cone-based algorithm takes as a parameter an angle .A node � then tries to find the minimum power ���� such thattransmitting with ���� ensures that in every cone of degree around �, there is some node that � can reach. We show thattaking � ���� is necessary and sufficient to preserve connec-tivity. That is, we show that if � ����, then there is a pathfrom � to � in �� iff there is such a path in �� (for all possiblenode locations) and that if � ����, then there exists a graph�� that is connected while �� is not. Moreover, we proposeseveral optimizations and show that they preserve connectivity.Finally, we discuss how the algorithm can be extended to dealwith dynamic reconfiguration and asynchronous operations.

There were a number of papers on topology control prior toour work; as we said earlier, all assume that position informa-tion is available. Hu [9] describes an algorithm that does topol-ogy control using heuristics based on a Delauney triangulationof the graph. There seems to be no guarantee that the heuristicspreserve connectivity. Ramanathan and Rosales-Hain [21] de-scribe a centralized spanning tree algorithm for achieving con-nected and biconnected static networks, while minimizing themaximum transmission power. (They also describe distributedalgorithms that are based on heuristics and are not guaranteedto preserve connectivity.) Rodoplu and Meng [23] propose adistributed position-based topology control algorithm that pre-serves connectivity; their algorithm is improved by Li and Halpern[13]. Other researchers working in the field of packet radio net-works, wireless ad hoc networks, and sensor networks have alsoconsidered the issue of power efficiency and network lifetime,but have taken different approaches. For example, Hou and Li[8] analyze the effect of adjusting transmission power to reduce

�Of course, if GPS information is available, a node can simply piggyback itslocation to its message and the required directional information can be calculatedfrom that.

interference and hence achieve higher throughput as comparedto schemes that use fixed transmission power [24]. Heinzelmanet al. [7] describe an adaptive clustering-based routing protocolthat maximizes network lifetime by randomly rotating the roleof per-cluster local base stations (cluster-head) among nodeswith higher energy reserves. Chen et al. [3] and Xu et al. [30]propose methods to conserve energy and increase network life-time by turning off redundant nodes. Wu et al. [29] and Monkset al. [15] describe their power controlled MAC protocols to re-duce energy consumptions and increase throughput. They dothis through power control of unicast packets, but make no at-tempt at reducing the power consumption of broadcast packets.

After the initial publication of our results on CBTC [27], [14],there appeared a number of papers proposing different localizedtopology-control algorithms [28], [26], [10]. CBTC was the firstalgorithm that simultaneously achieved a variety of useful prop-erties, such as symmetry, sparseness, and good routes; some ofthe recent topology also aim to simultaneously achieve a num-ber of properties, most notably [26] and [10]. CBTC was alsothe first topology-control algorithm that did not require GPS in-formation, but used only angle-of-arrival information. The onlyimprovement towards this end that we are aware of is the XTCtopology-control algorithm [28]. The XTC algorithm is some-what similar in spirit to the SMECN algorithm [13], in that itremoves an edge �� �� if, according to some path-loss model,there is a two-hop path from � to � which nevertheless requiresless energy than the direct path.

The rest of the paper is organized as follows. Section II presentsthe basic cone-based algorithm and shows that � ���� isnecessary and sufficient for connectivity. Section III describesseveral optimizations to the basic algorithm and proves their cor-rectness. Section IV extends the basic algorithm so that it canhandle the reconfiguration necessary to deal with failures andmobility. Section V describes network simulation results thatshow the effectiveness of the basic approach and the optimiza-tions. Section VI summarizes this paper.

II. THE BASIC CONE-BASED TOPOLOGY CONTROL

ALGORITHM

We consider three communication primitives: broadcast, send,and receive, defined as follows:� bcast�� ��� is invoked by node � to send message � withpower �; it results in all nodes in the set �������� ��� � ��receiving �.� send�� �� �� is invoked by node � to sent message � to �with power �. This primitive is used to send unicast messages,i.e. point-to-point messages.� recv��� �� is used by � to receive message � from �.We assume that when � receives a message � from �, it knowsthe reception power �� of message �. This is, in general, lessthan the power � with which � sent the message, because ofradio signal attenuation in space. Moreover, we assume that,given the transmission power � and the reception power � �, � canestimate ����� ���. This assumption is reasonable in practice.

For ease of presentation, we first assume a synchronous model;that is, we assume that communication proceeds in rounds, gov-erned by a global clock, with each round taking one time unit.(We deal with asynchrony in Section IV.) In each round each

Page 3: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

3

node � can examine the messages sent to it, compute, and sendmessages using the bcast and send communication primitives.The communication channel is reliable. We later relax this as-sumption, and show that the algorithm is correct even in an asyn-chronous setting.

The basic Cone-Based Topology-Control (CBTC) algorithmis easy to explain. The algorithm takes as a parameter an an-gle . Each node � tries to find at least one neighbor in everycone of degree centered at �. Node � starts running the al-gorithm by broadcasting a “Hello” message using low transmis-sion power, and collecting Ack replies. It gradually increasesthe transmission power to discover more neighbors. It keeps alist of the nodes that it has discovered and the direction in whichthey are located. (As we said in the introduction, we assume thateach node can estimate directional information.) It then checkswhether each cone of degree contains a node. This check iseasily performed: the nodes are sorted according to their anglesrelative to some reference node (say, the first node from which� received a reply). It is immediate that there is a gap of morethan between the angles of two consecutive nodes iff there is acone of degree centered at � which contains no nodes. If thereis such a gap, then � broadcasts with greater power. This contin-ues until either � finds no -gap or � broadcasts with maximumpower.

Figure 1 gives the basic CBTC algorithm. In the algorithm, a“Hello” message is originally broadcasted using some minimalpower ��. In addition, the power used to broadcast the messageis included in the message. The power is then increased at eachstep using some function Increase. As in [13] (where a similarfunction is used, in the context of a different algorithm), in thispaper, we do not investigate how to choose the initial power � �,nor do we investigate how to increase the power at each step. Wesimply assume some function Increase such that Increase������ ���� for sufficiently large �. If transmission power can beset continuously in [0,����], one can set Increase��� � �� forfast convergence. If the initial choice of �� is less than the totalpower actually needed, then it is easy to see that this guaranteesthat �’s estimate of the transmission power needed to reach anode � will be within a factor of 2 of the minimum transmissionpower actually needed to reach �. If transmission power canonly be set to several discrete values, Increase��� can be set toeach value in increasing order. We adopt the latter approach inour simulation.

Upon receiving a “Hello” message from �, node � respondswith an Ack message. Upon receiving the Ack from �, node �adds � to its set �� of neighbors and adds �’s direction dir����(measured as an angle relative to some fixed angle) to its set�� of directions. The test gap- ���� tests if there is a gapgreater than in the angles in ��. (We take gap- ���� � ��if ���� � �.)

We use the following notation throughout the paper:� ����� is the final set of discovered neighbors computed bynode � at the end of running CBTC( ).� ���� is the corresponding final power.� �� � ��� �� � � � � � � � ������.� �� � ����, where � consists of all nodes in the networkand � is the symmetric closure of ��; that is, �� �� � � iffeither �� �� � �� or �� �� � ��.

CBTC( )

�� � �; //the set of discovered neighbors of ��� � �; //the directions from which the Acks have come�� � ��;

while �� � ���� and gap- ���� do�� � ������������;bcast�� �� �“Hello”, ���� and gather Acks;�� � �� �� � � discovered�;�� � �� �dir���� � � discovered�

Fig. 1. The basic cone-based algorithm running at each node �.

� cone��� ��� is the cone of degree which is bisected bythe line ����, as in Figure 2.� ����

� ��� is the set of nodes inside cone��� ���.� circ�� �� is the circle centered at � with radius �.� rad���� is the distance ��� �� of the neighbor � farthest from� in �����; that is, ��rad����� � ����.� rad��� is the distance ��� �� of the neighbor � farthest from� in �.

�� ��������������

����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

������������������u’ v’α/2

α/2

Fig. 2. cone���� �� ��

Note that the �� relation is not symmetric. As the followingexample shows, it is possible that �� �� � �� but �� �� �� ��.

Example II.1: Suppose that � � ��� �� �� �� ��. (SeeFigure 3.) Further suppose that ���� �� � �. Choose � with� � � � ���� and place �� �� �� so that (1) � ����� �� ����� � �� � � ��, (2) � ����� � � ����� � �� �(so that � ����� � � ����� � ��), (3) � ����� � � (so that� ������ � � ������ � ��� �) and (4) ���� ��� � ���.Note that, given � and the positions of �� and �, the positionsof ��, ��, and �� are determined. Since � ����� � � ����� �� �����, it follows that ���� �� � ���� �� � � � ���� ���;similarly ���� �� � � � ���� ���. (Here and elsewhere weuse the fact that, in a triangle, larger sides are opposite largerangles.) Assume ��� � � ����. ������ � ��� �� ���,since there is no -gap with this neighbor set. ����� � ����,since � has to reach maximum power. Thus, �� ��� � ��, but��� �� �� ��.Example II.1 shows the need for taking the symmetric closure incomputing ��. Although ��� �� � ��, there would be no pathfrom �� to � if we considered just the edges determined by ��,

Page 4: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

4

����

����

������

������

��������

������

������

2π/3−ε

2π/3−ε π/3+ε

π/3+ε

π/3

π/3−επ/3−ε

π/3

u

2

1

u

R vu u3 0

Fig. 3. �� may not be symmetric.

without taking the symmetric closure. (The fact that � ���in this example is necessary. As we shall see in Section III-B,taking the symmetric closure is not necessary if � ���.)As we have already observed, each node � knows the powerrequired to reach all nodes � such that �� �� � �: it is justthe max of ���� and the power required by � to reach each ofthe nodes � from which it received a “Hello” message. (As wesaid earlier, if � receives a “Hello” from �, since it includes thepower used to transmit it, � can determine the power requiredfor � to reach �.)

We now prove the two main results of this paper: (1) if �����, then �� preserves the connectivity of �� and (2) if �����, then �� may not preserve the connectivity of ��. Thefollowing lemma will be used in the proof of (1).

Lemma II.1: If � ����, and � and � are nodes in � suchthat �� �� � � (that is, �� �� is an edge in the graph ��,so that ��� �� � �), then either �� �� � � or there exist�� �� � � such that (a) ���� ��� � ��� ��, (b) either �� � � or�� ��� � �, and (c) either � � � � or �� ��� � �.Proof: If �� �� � �, we are done. Otherwise, it must be thecase that ��� �� � �� �rad���� rad����. Thus, both � and �terminate CBTC( ) with no -gap. It follows that ���� �������� �� � and ���� �������� �� �. Choose � ����� ��� ����� such that � ��� is minimal. (See Figure 4.) Sup-pose without loss of generality that � is in the halfplane above��. If � is actually located in cone�� ��� ��, since ��� �� �rad��� � ��� ��, it follows that ��� �� � ��� ��. For other-wise, the side �� would be at least as long as any other side inthe triangle ���, so that � ��� would have to be at least as largeas any other angle in the triangle. But since � ��� � ��, thisis impossible. Thus, taking �� � � and �� � �, the lemma holdsin this case. So we can assume without loss of generality that� �� ���� ��� �� (and, thus, that ���� ��� �� ������ ��). Let � be the first node in ����� that a ray that starts at ��would hit as it sweeps past �� going counterclockwise. By con-struction, � is in the half-plane below �� and � ��� � .

Similar considerations show that, without loss of generality,we can assume that ���� ��� �������� � �, and that thereexist two points � � � ����� such that (a) � is in the halfplaneabove ��, (b) � is in the halfplane below ��, (c) at least one of �and � is inside cone�� ��, and (d) � ��� � . See Figure 4.

����

���

�����������

���

���

Only black points

have radius d

are actual nodes.z

v

y

wu

x tw

u

d

dt

All circles

Fig. 4. Illustration for the proof of Lemma II.1.

If ��� �� � ��� ��, then the lemma holds with �� � � and�� � �, so we can assume that ��� �� � ��� ��. Similarly,we can assume without loss of generality that ��� �� � �. Wenow prove that ��� �� and ��� �� cannot both be greater thanor equal to �. This will complete the proof since, for example, if��� �� � �, then we can take �� � � and �� � � in the lemma.

Suppose, by way of contradiction, that ��� ��� � and ��� ��� �. Let � be the intersection point of circ�� �� and circ�� ��that is closest to �. Recall that at least one of � and � is insidecone�� ��. As we show in Appendix A, since node � mustbe outside (or on) both circles circ�� �� and circ�� ��, we have� ��� � � ��� (see the closeup on the far right side of Figure 4).

Since ��� �� � ��� �� � ��� �� � �, and ��� �� � �, itfollows that � ��� � ��. Thus,

� ��� � � ��� � ��� � � ��� �� and� ��� � � �� � ���

and so� ��� �� � � �� � ��� and

� ��� � ��� � ������

Since � ��� � � ���, we have that

� ��� � ��� � ������ (1)

By definition of �, � ��� � �� � �����, so � ��� � �������� � ������ � ��. Thus, it must be the case that � ������ ��, so � � ���� ��.

Arguments identical to those used to derive (1) (replacing therole of � and � by � and �, respectively) can be used to showthat

� ��� � ��� � ������ (2)

From (1) and (2), we have

� ��� � ���� ���� � ������ ���� �� � ����� �� � ����� �� � ����

Page 5: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

5

Since � ��� � ��� � � ����, we have that ���� � �� � ����� �� � ���� Thus,

� ������� � ��� � �� � ��� � ����� � ������ � �����

Since � ��� � ���� � ����, it easily follows that � ��� ����. As we showed earlier, � ��� � � ��� � ��. Therefore,� ��� � ��� � ����. This is a contradiction.

Theorem II.2: If � ����, then �� preserves the connec-tivity of ��; � and � are connected in �� iff they are connectedin ��.Proof: Since �� is a subgraph of ��, it is clear that if � and �are connected in ��, they must be connected in ��.

We now prove the converse. Order the edges in � by length.We proceed by induction on the the rank of the edge in the or-dering to show that if �� �� � �, then there is a path from � to� in ��. For the base case, if �� �� is the shortest edge in �,then it is immediate from Lemma II.1 that �� �� � �. For notethat, by construction, if �� �� � � and ���� ��� � ��� ��,then ��� ��� � � and is a shorter edge than �� ��. For theinductive step, suppose that �� �� is the �th shortest edge in� and, by way of contradiction, that �� �� is not in �. ByLemma II.1, there exist �� �� � � such that (a) ���� ��� ���� ��, (b) either � � �� or �� ��� � �, and (c) either � � � �

or �� ��� � �. As we observed, it follows that ��� ��� � �.Since ���� ��� � ��� ��, by the inductive hypothesis, it followsthat there is an path from �� to �� in ��. Since � is symmetric,it is immediate that there is also a path from � to � in ��. Itimmediately follows that if � and � are connected in ��, thenthere is a path from � to � in ��.

The proof of Theorem II.2 gives some extra information, whichwe cull out as a separate corollary:

Corollary II.3: If � ����, and � and � are nodes in �such that �� �� � �, then either �� �� � � or there exists apath �� � � � �� such that �� � �, �� � �, �� ���� � �, and��� ���� � ��� ��, for � � � � � � �.

Next we prove that degree ���� is a tight upper bound; if �����, then CBTC( ) does not necessarily preserve connectivity.

Theorem II.4: If � ����, then CBTC( ) does not neces-sarily preserve connectivity.Proof: Suppose � ���� � for some � � �. We con-struct a graph �� � ���� such that CBTC( ) does notpreserve the connectivity of this graph. � has eight nodes:�� �� �� �� �� �� �� ��. (See Figure 5.) We call �� �� �� ��the �-cluster, and �� �� �� �� the �-cluster. The constructionhas the property that ���� ��� � � and for ! � � � � ,we have ���� �� � �, ���� �� � �, and ��� ��� � � if ! � �. That is, the only edge between the �-cluster andthe �-cluster in �� is ��� ���. However, in ��, the ��� ���edge disappears, so that the u-cluster and the v-cluster are dis-connected.

In Figure 5, � and �� are the intersection points of the cir-cles of radius � centered at �� and ��, respectively. Node ��is chosen so that � ������ � ���. Similarly, �� is chosen sothat � ������ � ��� and �� and �� are on opposite sides of theline ����. Because of the right angle, it is clear that, whatever���� ��� is, we must have ���� ��� � ���� ��� � �; simi-larly, ���� ��� � � whatever ���� ��� is. Next, choose �� so

���

���

���

���

���

���

����

���

���

All circleshave radius R

Only black pointsare actual nodes.

s

s’

v1

v0

u1u0

3u

v3

v2

u2

Fig. 5. A disconnected graph if � � ���� � �.

that � ������ � ���� �� and ���� comes after ���� as a raysweeps around counterclockwise from ����. It is easy to see that���� ��� � �, whatever ���� ��� is, since � ������ � ���.For definiteness, choose �� so that ���� ��� � ���. Node �� ischosen similarly. The key step in the construction is the choiceof �� and ��. Note that � ������ � ����. Let �� be a pointon the line through �� parallel to ���� slightly to the left of ��

such that � ������ � . Since � ���� �, it is possible tofind such a node ��. Since ���� �

�� � ���� ��� � � by con-

struction, it follows that ���� ��� � � and ���� ��� � �. Itis clearly possible to choose ���� ��� sufficiently small so that���� ��� � �. The choice of �� is similar.

It is now easy to check that when �� runs CBTC( ), it willterminate with ����� � �� ����� ��� ���� � �; similarlyfor ��. Thus, this construction has all the required properties.

III. OPTIMIZATIONS

In this section, we describe three optimizations to the basicalgorithm. We prove that these optimizations allow some of theedges to be removed while still preserving connectivity.

A. The shrink-back operation

In the basic CBTC( ) algorithm, � is said to be a boundarynode if, at the end of the algorithm, � still has an -gap. Notethat this means that, at the end of the algorithm, a boundarynode broadcasts with maximum power. An optimization wouldbe to add a shrinking phase at the end of the growing phaseto allow each boundary node to broadcast with less power, ifit can do so without reducing its cone coverage. To make thisprecise, given a set dir of directions (angles) and an angle ,define cover��dir� � �" � for some "� � dir, �" "�� ����� � ���. We modify CBTC( ) so that, at each iteration, anode in �� is tagged with the power used the first time it wasdiscovered. Suppose that the power levels used by node � duringthe algorithm were �� � � � ��. If � is a boundary node, �� is themaximum power ����. A boundary node successively removes

Page 6: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

6

nodes tagged with power ��, then ����, and so on, as long astheir removal does not change the coverage. That is, let dir , �� � � � �, be the set of directions found with all power levels � orless, then the minimum such that cover��dir� � cover��dir��is found. Let � �

���� consist of all the nodes in ����� taggedwith power � or less. Let � �

� � ��� �� � � � �������, and let

�� be the symmetric closure of � �

�. Finally, let ��� � ���

��.Theorem III.1: If � ����, then ��

� preserves the connec-tivity of ��.Proof: It is easy to check that the proof of Theorem II.2 de-pended only on the cone coverage of each node, so it goes throughwithout change. In more detail, given any two nodes � and � in���, if ��� �� � � � � and and �� �� �� �

�, then either both �and � did not use power sufficient to reach distance � in the ba-sic CBTC algorithm or one or both of them used enough powerto reach distance � but then shrank back. In either case, nodes �and � must still have neighbors in � �

���� and � ����� fully cov-

ering the cones �#���� �� and �#���� ��, respectively,since any shrink-back operation can only remove those neigh-bors that provide redundant cone coverage. Thus, the proof ofLemma II.1 goes through with no change. The remainder of theargument follows exactly the same lines as that of the proof ofTheorem II.2.

Note that this argument actually shows that we can removeany nodes from �� that do not contribute to the cone coverage.However, our interest here lies in minimizing the power neededfor broadcast, not in minimizing the number of nodes in � �.There may be some applications where it helps to reduce thedegree of a node; in this case, removing further nodes may be auseful optimization.

B. Asymmetric edge removal

As shown by Example II.1, in order to preserve connectivity,it is necessary to add an edge �� �� to � if �� �� � ��, evenif �� �� �� ��. In Example II.1, � ���. This is not anaccident. As we now show, if � ���, not only don’t we haveto add an edge �� �� if �� �� � ��, we can remove an edge�� �� if �� �� � �� but �� �� �� ��. Let �

� � ��� �� ��� �� � �� and �� �� � ���. Thus, while � is the smallestsymmetric set containing ��, �

� is the largest symmetric setcontained in ��. Let ��

� � ���� �.

Theorem III.2: If � ���, then ��� preserves the connec-

tivity of ��.Proof: We start by proving the following lemma, which strength-ens Corollary II.3.

Lemma III.3: If � ���, and � and � are nodes in � suchthat �� �� � �, then either �� �� � �� or there exists a path�� � � � �� such that �� � �, �� � �, �� ���� � ��, and��� ���� � ��� ��, for � � � � � � �.Proof: Order the edges in � by length. We proceed by stronginduction on the rank of an edge in the ordering. Given an edge�� �� � � of rank � in the ordering, if �� �� � ��, we aredone. If not, as argued in the proof of Lemma II.1, there must bea node � � ���� ��������. Since � ���, the argumentin the proof of Lemma II.1 also shows that ��� �� � ��� ��.Thus, �� �� � � and has lower rank in the ordering of edges.Applying the induction hypothesis, the lemma holds for �� ��.

This completes the proof.

Lemma III.3 shows that if �� �� � �, then there is a pathconsisting of edges in �� from � to �. This is not good enoughfor our purposes; we need a path consisting of edges in �

� . Thenext lemma shows that this is also possible.

Lemma III.4: If � ���, and � and � are nodes in � suchthat �� �� � ��, then there exists a path �� � � � �� such that�� � �, �� � �, �� ���� � �

� , for � � � � � � �.Proof: Order the edges in �� by length. We proceed by stronginduction on the rank of an edge in the ordering. Given an edge�� �� � �� of rank � in the ordering, if �� �� � �

� , we aredone. If not, we must have �� �� �� ��. Since �� �� � �,by Lemma III.3, there is a path from � to � consisting of edgesin �� all of which have length smaller than ��� ��. If any ofthese edges is asymmetric, i.e. in �� �

� , we can apply theinductive hypothesis to replace the edge by a path consistingonly of edges in �

� . By the symmetry of �� , such a path from

� to � implies a path from � to �. This completes the inductivestep.

The proof of Theorem III.2 is now immediate from Lem-mas III.3 and III.4.

To implement asymmetric edge removal, the basic CBTC needsto be enhanced slightly. After finishing CBTC( ), a node � mustsend a message to each node � to which it sent an Ack messagethat is not in �����, telling � to remove � from ����� whenconstructing �

� . It is easy to see that the shrink-back optimiza-tion discussed in Section III-A can be applied together with theremoval of these asymmetric edges.

There is a tradeoff between using CBTC(����) and usingCBTC(���) with asymmetric edge removal. ��rad���� ���) willbe no greater than ���� �� if the �������� function is the same,links are reliable, and Acks responding to one “Hello” mes-sage are received before the next one is sent. However, thepower �������� ��� with which � needs to transmit may begreater than ���� ��, since � may need to reach nodes � suchthat � � �� ����� but � �� �� �����. In contrast, if � ���,then asymmetric edge removal allows � to still use ���� �� andmay allow � to use power less than ��� ��. Our experimentalresults confirm this. See Section V.

C. Pairwise edge removal

The final optimization aims at further reducing the transmis-sion power of each node. In addition to the directional informa-tion, this optimization requires two other pieces of information.First, each node � is assigned a unique integer ID denoted ID�,and that ID� is included in all of �’s messages. Second, althougha node � does not need to know its exact distance from its neigh-bors, given any pair of neighbors � and �, node � needs to knowwhich of them is closer. This can be achieved as follows. Re-call that a node grows its radius in discrete steps. It includes itstransmission power level in each of the “Hello” messages. Eachdiscovered neighbor node also includes its transmission powerlevel in the Ack. When � receives messages from nodes �� and��, it can deduce which of �� and �� is closer based on the trans-mission and reception powers of the messages.

Page 7: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

7

Even after the shrink-back operation and possibly asymmetricedge removal, there are many edges that can be removed whilestill preserving connectivity. For example, if three edges form atriangle, we can clearly remove any one of them while still main-taining connectivity. In this section, we improve on this resultby showing that if there is an edge from � to �� and from � to��, then we can remove the longer edge even if there is no edgefrom �� to ��, as long as ���� ��� � �� ���� ��� ��� ����.Note that a condition sufficient to guarantee that ���� ��� ��� ���� ��� ��� ���� is that � ����� � �� (since the longestedge will be opposite the largest angle).

To make this precise, we use the notion of an edge ID. Eachedge �� �� is assigned an edge ID � ��� �� � � �, �, ��, where � � ��� ��, � � ����ID�, ID�, and � � � ��ID�, ID).Edge IDs are compared lexicographically, so that � ! �� �� � !� ��� iff either (a) � �, (b) � � and ! � ! �, or (c) � �, ! � !�, and � � ��.

Definition III.5: If � and � are neighbors of �, � ��� � ��,and � ��� �� � � �����, then �� �� is a redundant edge.As the name suggests, redundant edges are redundant, in that itis possible to remove them while still preserving connectivity.The following theorem proves this.

Theorem III.6: For � ����, all redundant edges can beremoved while still preserving connectivity.Proof: Let ��

� consist of all the non-redundant edges in �.We show that if �� �� � � ��

� , then there is a path from� to � consisting only of edges in ��

� . Clearly, this suffices toprove the theorem.

Let �� �� �� be a listing of the redundant edges (i.e,those in � ��

� ) in increasing lexicographic order of edgeID. We prove, by induction on �, that for every redundant edge�� � ��� ��� there is a path from �� to �� consisting of edges in��� . For the base case, consider �� � ��� ���. By definition,

there must exist an edge ��� ��� such that � ������ � ��and � ���� ��� � � ���� ���. Since �� is the redundant edgewith the smallest edge ID, ��� ��� cannot be a redundant edge.Since � ������ � ��, it follows that ���� ��� � ���� ���. If��� ��� � �, then ��� ��� � ��

� (since ��� ��� is the short-est redundant edge) and ��� ��� ��� ��� is the desired path ofnon-redundant edges. On the other hand, if �� � ��� �� � then,since ���� ��� � ���� ��� � � and � ����, by Corol-lary II.3, there exists a path from �� to �� consisting of edges in� all shorter than ���� ���. Since none of these edges can beredundant edge, this gives us the desired path.

For the inductive step, suppose that for every � � � ��� ���,� � ! � �, we have found a path $ �

� between �� and�� , which contains no redundant edges. Now consider � ��� ��. Again, by definition, there exists another edge �� ��with � ��� �� � � ��� �� and � ��� � ��. If �� ��is a redundant edge, it must be one of ��’s, where ! � �.Moreover, if the path $ (from Corollary II.3) between � and� contains a redundant edge �� , we must have ��� � � ��� andso ! � �. By connecting �� �� with $ and replacingevery redundant edge �� on the path with $ �

� , we obtain a path$ � between � and � that contains no redundant edges. This

completes the proof.

Although Theorem III.6 shows that all redundant edges can beremoved, this doesn’t mean that all of them should necessarilybe removed. For example, if we remove some edges, the pathsbetween nodes become longer, in general. Since some over-head is added for each link a message traverses, having feweredges can affect network throughput. In addition, if routes areknown and many messages are being sent using point-to-pointcommunication between different senders and receivers, havingfewer edges is more likely to cause congestion. Since we wouldlike to reduce the transmission power of each node, we removeonly redundant edges with length greater than the longest non-redundant edges. We call this optimization the pairwise edgeremoval optimization.

IV. DEALING WITH RECONFIGURATION, ASYNCHRONY,AND FAILURES

In a multi-hop wireless network, nodes can be mobile. Evenif nodes do not move, nodes may die if they run out of energy.In addition, new nodes may be added to the network. We need amechanism to detect such changes in the network. This is doneby the Neighbor Discovery Protocol (NDP). A NDP is usually asimple beaconing protocol for each node to tell its neighbor thatit is still alive. The beacon includes the sending node’s ID andthe transmission power of the beacon. A neighbor is consideredfailed if a pre-defined number of beacons are not received for acertain time interval % . A node � is considered a new neighborof � if a beacon is received from � and no beacon was receivedfrom � during the previous % interval.

The question is what power a node should use for beaconing.Certainly a node � should broadcast with sufficient power toreach all of its neighbors in � (or �

� , if � ���). Aswe will show, if � uses a beacon with power ��rad���� —thepower needed for � to reach all its neighbors in �, then this issufficient for reconfiguration to work with the basic cone-basedalgorithm (possibly combined with asymmetric edge removal if � ���, in which case we can use power ��rad����)).

We define three basic events:� A join���� event happens when node � detects a beacon fromnode � for the first time;� A &�������� event happens when node � misses some prede-termined number of beacons from node �;� An aChange���� event happens when � detects that �’s an-gle with respect to � has changed. (Note this could be due tomovement by either � or �.)

Our reconfiguration algorithm is very simple. It is convenientto assume that each node is tagged with the power used whenit was first discovered, as in the shrink-back operation. (This isnot necessary, but it minimizes the number of times that CBTCneeds to be rerun.)� If a leave���� event happens, and if there is an -gap afterdropping dir���� from ��, node � reruns CBTC( ) (as in Fig-ure 1), starting with power ��rad����� (i.e., taking �� � ��rad�����).� If a join���� event happens, � computes dir���� and the powerneeded to reach �. As in the shrink-back operation, � thenremoves nodes, starting with the farthest neighbor nodes andworking back, as long as their removal does not change the cov-erage.

Page 8: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

8

� If an aChange���� event happens, node � modifies the set�� of directions appropriately. If an -gap is then detected,then CBTC( ) is rerun, again starting with power ��rad�����.Otherwise, nodes are removed, as in the shrink-back operation,to see if less power can be used.

In general, there may be more than one change event that isdetected at a given time by a node �. (For example, if � moves,then there will be in general several leave, !# � and aChangeevents detected by �.) If more than one change event is detectedby �, we perform the changes suggested above as if the eventsare observed in some order, as long as there is no need to rerunCBTC. If CBTC needs to be rerun, it deals with all changessimultaneously.

Intuitively, this reconfiguration algorithm preserves connec-tivity. We need to be a little careful in making this precise, sinceif the topology changes frequently enough, the reconfigurationalgorithm may not ever catch up with the changes, so there maybe no point at which the connectivity of the network is actuallypreserved. Thus, what we want to show is that if the topologyever stabilizes, so that there are no further changes, then thereconfiguration algorithm eventually results in a graph that pre-serves the connectivity of the final network, as long as there areperiodic beacons. It should be clear that the reconfiguration al-gorithm guarantees that each cone of degree around a node �is covered (except for boundary nodes), just as the basic algo-rithm does. Thus, the proof that the reconfiguration algorithmpreserves connectivity follows immediately from the proof ofTheorem II.2.

While this reconfiguration algorithm works in combinationwith the basic algorithm CBTC( ) and in combination with theasymmetric edge removal optimization, we must be careful incombining it with the other optimizations discussed in Section III.In particular, we must be very careful about what power a nodeshould use for its beacon. For example, if the shrink-back oper-ation is performed, using the power to reach all the neighbors in��� does not suffice. For suppose that the network is temporarily

partitioned into two subnetworks �� and ��; for every pair ofnodes �� � �� and �� � ��, the distance ���� ��� � �. Sup-pose that �� is a boundary node in �� and �� is a boundary nodein ��, and that, as a result of the shrink-back operation, both � �

and �� use power ' � � ����. Further suppose that later nodes�� and �� move closer together so that ���� ��� � �. If ' � isnot sufficient power for �� to communicate with ��, then theywill never be aware of each other’s presence, since their bea-cons will not reach each other, so they will not detect that thenetwork has become reconnected. Thus, network connectivityis not preserved.

This problem can be solved by having the boundary nodesbroadcast with the power computed by the basic CBTC( ) al-gorithm, namely ���� in this case. Similarly, with the pair-wise edge removal optimization, it is necessary for �’s beaconto broadcast with ��rad����, i.e., the power needed to reach allof �’s neighbors in �, not just the power needed to reach all of�’s neighbors in ��

� . It is easy to see that this choice of beaconpower guarantees that the reconfiguration algorithm works.

It is worth noting that a reconfiguration protocol works per-fectly well in an asynchronous setting. In particular, the syn-chronous model with reliable channels that has been assumed

up to now can be relaxed to allow asynchrony and both com-munication and node failures. Now nodes are assumed to com-municate asynchronously, messages may get lost or duplicated,and nodes may fail (although we consider only crash failures:either a node crashes and stops sending messages, or it followsits algorithm correctly). We assume that messages have uniqueidentifiers and that mechanisms to discard duplicate messagesare present. Node failures result in leave events, as do lost mes-sages. If node � gets a message after many messages havingbeen lost, there will be a join event corresponding to the earlierleave event.

V. EXPERIMENTAL RESULTS

How effective is our algorithm and its optimizations as com-pared to other approaches? Before we answer this question, letus briefly review existing approaches. To our knowledge, amongthe topology-control algorithms in the literature [24], [8], [9],[21], [23], only Rodoplu and Meng’s algorithm [23] attempts tooptimize for energy efficiency while maintaining network con-nectivity. Following [13], we refer to Rodoplu and Meng’s algo-rithm as the MECN algorithm (for minimum-energy communi-cation network). The algorithms in [24], [8], [9] try to maximizenetwork throughput; they do not guarantee network connectiv-ity. Ramanathan and Rosales-Hain [21] have considered mini-mizing the maximum transmission power of all nodes by usingcentralized MST algorithms. However, their distributed heuris-tic algorithms do not guarantee network connectivity. Since weare only interested in algorithms that preserve connectivity andare energy efficient, it seems that the only relevant algorithmin the literature is the MECN algorithm. However, since theSMECN algorithm outperforms MECN [13], we will compareour algorithm with SMECN only.

We refer to the basic algorithm as CBTC, and to our completealgorithm with all applicable optimizations as OPT-CBTC.3 Fur-thermore, we also make the comparison with the no-topology-control case, where each node always uses the maximum trans-mission power to send a packet (we refer to this approach asMaxPower). In the case of no-topology-control, the reason wechoose maximum power is that it guarantees that there will beno network partitions due to insufficient transmission power.

A. Simulation Environment

The topology-control algorithms – CBTC, SMECN and Max-Power – are implemented in the ns-2 network simulator [20], us-ing the wireless extension developed at Carnegie Mellon [6]. Wegenerated 20 random networks, each with 200 nodes. Each nodehas a maximum transmission range of ��� meters and initial en-ergy of 0.5 Joule. The nodes are placed uniformly at randomin a rectangular region of 1500 by 1500 meters. Although therehave been some papers on realistic topology generation [31],[1], most of them have focused on the Internet setting. Sincelarge multihop wireless networks such as sensor networks areoften deployed in a somewhat random fashion (for example, anairplane may drop sensors over some geographical region), webelieve that assuming nodes are placed uniformly at random isnot an unreasonable assumption.�For brevity, we will omit the parameter � in our presentation when it is clear

from the context.

Page 9: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

9

We assume the two-ray propagation model for terrestrial com-munication [22]. A transmission from node � to node � takespower ��� �� � ���� ��

� for some constant � at node �, where� � � is the path-loss exponent of outdoor radio propagationmodels, and ��� �� is the distance between � and �. The modelhas been shown to be close to reality in many environment set-tings [22]. Finally, we take the following parameter settings,which are chosen to simulate the 914MHz Lucent WaveLANDSSS radio interface:� the carrier frequency is ���MHz;� the transmission raw bandwidth 2MHz;� antennas are omni-directional with 0dB gain, and the antennais placed ��� meters above a node;� the receive threshold is ��dBW;� the carrier sense threshold is ���dBW;� the capture threshold is ��dB.

In order to simulate the effect of power control in the neighbor-discovery process, we made changes to the physical layer of thens-2 simulation code to support eight discrete power levels. Thisseems to be more in keeping with current practice. For example,currently the Aironet PC4800 supports five transmission-powerlevels. Eight power levels seems sufficient to provide a realis-tic simulation of the kind of scenarios that arise in practice. Inour simulation, power level 8 gives the maximum transmissionrange of 250 meters. The Increase function in Figure 1 movesfrom one power level to the next higher level. For the “Hello”packet in the CBTC algorithm, the transmission power level iscontrolled by the algorithm itself. Specifically, as we discussedin Section IV, node � broadcasts using the final power �� (asdetermined by the Increase function in Figure 1). For point-to-point transmissions from a node �, the minimum power levelneeded to reach all of �’s neighbors is used. We do not usedifferent power levels for different neighbors because there is adelay associated with changing power levels in practice (in theorder of 10 milliseconds [5] for certain wireless radio hardware),which some applications may not be able to tolerate.

To simulate interference and collision, we choose the WaveLAN-I [25] CSMA/CA MAC protocol. Since topology control by it-self does not provide routing, we used the AODV [17] routingprotocol in our simulation.

To simulate the network application traffic, we use the fol-lowing application scenario: we choose 60 connections, i.e. 60source-destination pairs. All the source and destination nodesare distinct. For each of these 60 connections in sequence, thesource (if it is still alive) sends constant bit rate (CBR) traffic toits destination. The sending rate is 2 packets/sec and the packetsize is 512 bytes. This traffic pattern seems to generate sufficientload in the network for our evaluation. We do not expect that theresults would be qualitatively different if fewer or more connec-tions were used. We use the same 60 connections in all ourexperiments. Since we conduct the experiments in 20 randomnetworks, there is no need to randomize over the connections aswell.

B. Network Topology Characteristics

Before comparing CBTC with SMECN and MaxPower throughdetailed network simulation, we first examine the topology graphsthat result from using each of these approaches in the 20 random

networks described previously.Figure 6 illustrates how CBTC and the various optimizations

improve network topology using the results from one of the ran-dom networks. Figure 6(a) shows a topology graph produced byMaxPower. Figures 6(b) and (c) show the corresponding graphsproduced by CBTC(���) and CBTC(����), respectively. Wecan see that both CBTC(���) and CBTC(����) allow nodesin the dense areas to automatically reduce their transmission ra-dius. Figures 6(d) and (e) illustrate the graphs after the shrink-back operation is performed. Figure 6(f) shows the graph for � ��� as a result of the shrink-back operation and the asym-metric edge removal. Figures 6(g) and (h) show the topologygraphs after all applicable optimizations. We can see that theoptimizations are very effective in further reducing the trans-mission radius of nodes.

Table I compares the network graphs resulted from the cone-based algorithm parameterized by � ��� and � ����,in terms of average node degree and average radius. It alsoshows the corresponding results for SMECN and MaxPower.The results are averaged over the 20 random networks men-tioned earlier. As expected, using a larger value of resultsin a smaller node degree and radius. However, as we discussedin Section III-B, there is a tradeoff between using CBTC(���)and CBTC(����). Using the basic algorithm, we have rad��� ��� ����� � rad��� �� � �����. After applying asymmetric edgeremoval with � ���, the resulting radius is 176.6. Hence,asymmetric edge removal can result in significant savings. Afterapplying all applicable optimizations, both � ��� and ����� end up with very similar results in terms of both averagenode degree and average radius. However, there are secondaryadvantages to setting � ����. In general, CBTC(����) willterminate sooner than CBTC(���) and so expend less powerduring its execution (since ���� �� � ���� ��). Thus, if recon-figuration happens frequently, the advantage of using CBCT(����)over CBCT(���) in terms of reduction on power consumptioncan be significant.

The sixth row (MaxPower) gives the performance numbersfor the case where each node uses the maximum transmissionpower of ������. We can see that using topology control cutsdown the average degree by a factor of more than 3 (3.8 vs.15.0) and the average radius by a factor of more than 2 (113.1or 110.7 vs. 250). This clearly demonstrates the effectiveness ofour topology-control algorithms.

The last row shows the results for SMECN. Recall that SMECNrequires GPS position information, while the CBTC algorithmsrely on only directional information. So our objective in thecomparison is to study how well CBTC performs with the lackof distance information. The average radius numbers in Table Ishow that the performance of OPT-CBTC is in fact very closeto (and slightly better than) that of SMECN (113.1 vs. 115.8).Note that SMECN does achieve a smaller average node degree(2.7 vs. 3.7). However, with SMECN, each node typically hasmore nodes within its radius that are not its neighbors. Thisis because for a node � to be considered a neighbor of � inSMECN, direct transmission has to take less energy than anytwo-hop path. Two-hop paths are less desirable than single-hoppaths, they occupy the media for twice as long as one-hop trans-missions. On the other hand, although OPT-CBTC reduces the

Page 10: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

10

199

198

197

196

195

194

193

192

191

190

189

188

187

186

185

184

183

182

181

180

179

178

177

176

175

174

173

172

171

170

169

168

167

166

165

164

163162

161

160

159

158

157

156

155

154

153

152

151

150

149

148

147

146

145

144

143

142

141

140

139

138

137

136

135

134

133

132

131

130

129

128

127

126

125

124

123

122

121

120

119

118

117 116

115

114

113

112

111

110

109

108

107

106

105

104

103

102

101

100

99

98

97

96

95

94

93

92

91

90

89

88

87

86

85

84

83

82

81

80

7978

77

76

75

74

73

72

71

70

69

68

67

66

65

64

63

62

61

60

59

58

57

56

55

54

53

52

51

50

49

48

47

46

45

44

43

42

41

40

39

38

37

36

35

34

33

32

31

30

29

28

27

26

25

24

23

22

21

20

19

18

17

16

15

14

13

12

11

10

9

8

7

6

5

4

3

2

1

0

199

198

197

196

195

194

193

192

191

190

189

188

187

186

185

184

183

182

181

180

179

178

177

176

175

174

173

172

171

170

169

168

167

166

165

164

163162

161

160

159

158

157

156

155

154

153

152

151

150

149

148

147

146

145

144

143

142

141

140

139

138

137

136

135

134

133

132

131

130

129

128

127

126

125

124

123

122

121

120

119

118

117 116

115

114

113

112

111

110

109

108

107

106

105

104

103

102

101

100

99

98

97

96

95

94

93

92

91

90

89

88

87

86

85

84

83

82

81

80

7978

77

76

75

74

73

72

71

70

69

68

67

66

65

64

63

62

61

60

59

58

57

56

55

54

53

52

51

50

49

48

47

46

45

44

43

42

41

40

39

38

37

36

35

34

33

32

31

30

29

28

27

26

25

24

23

22

21

20

19

18

17

16

15

14

13

12

11

10

9

8

7

6

5

4

3

2

1

0

(a) no topology control (b) ����������

199

198

197

196

195

194

193

192

191

190

189

188

187

186

185

184

183

182

181

180

179

178

177

176

175

174

173

172

171

170

169

168

167

166

165

164

163162

161

160

159

158

157

156

155

154

153

152

151

150

149

148

147

146

145

144

143

142

141

140

139

138

137

136

135

134

133

132

131

130

129

128

127

126

125

124

123

122

121

120

119

118

117 116

115

114

113

112

111

110

109

108

107

106

105

104

103

102

101

100

99

98

97

96

95

94

93

92

91

90

89

88

87

86

85

84

83

82

81

80

7978

77

76

75

74

73

72

71

70

69

68

67

66

65

64

63

62

61

60

59

58

57

56

55

54

53

52

51

50

49

48

47

46

45

44

43

42

41

40

39

38

37

36

35

34

33

32

31

30

29

28

27

26

25

24

23

22

21

20

19

18

17

16

15

14

13

12

11

10

9

8

7

6

5

4

3

2

1

0

199

198

197

196

195

194

193

192

191

190

189

188

187

186

185

184

183

182

181

180

179

178

177

176

175

174

173

172

171

170

169

168

167

166

165

164

163162

161

160

159

158

157

156

155

154

153

152

151

150

149

148

147

146

145

144

143

142

141

140

139

138

137

136

135

134

133

132

131

130

129

128

127

126

125

124

123

122

121

120

119

118

117 116

115

114

113

112

111

110

109

108

107

106

105

104

103

102

101

100

99

98

97

96

95

94

93

92

91

90

89

88

87

86

85

84

83

82

81

80

7978

77

76

75

74

73

72

71

70

69

68

67

66

65

64

63

62

61

60

59

58

57

56

55

54

53

52

51

50

49

48

47

46

45

44

43

42

41

40

39

38

37

36

35

34

33

32

31

30

29

28

27

26

25

24

23

22

21

20

19

18

17

16

15

14

13

12

11

10

9

8

7

6

5

4

3

2

1

0

(c) ���������� (d) ���������� � shrink-back

199

198

197

196

195

194

193

192

191

190

189

188

187

186

185

184

183

182

181

180

179

178

177

176

175

174

173

172

171

170

169

168

167

166

165

164

163162

161

160

159

158

157

156

155

154

153

152

151

150

149

148

147

146

145

144

143

142

141

140

139

138

137

136

135

134

133

132

131

130

129

128

127

126

125

124

123

122

121

120

119

118

117 116

115

114

113

112

111

110

109

108

107

106

105

104

103

102

101

100

99

98

97

96

95

94

93

92

91

90

89

88

87

86

85

84

83

82

81

80

7978

77

76

75

74

73

72

71

70

69

68

67

66

65

64

63

62

61

60

59

58

57

56

55

54

53

52

51

50

49

48

47

46

45

44

43

42

41

40

39

38

37

36

35

34

33

32

31

30

29

28

27

26

25

24

23

22

21

20

19

18

17

16

15

14

13

12

11

10

9

8

7

6

5

4

3

2

1

0

199

198

197

196

195

194

193

192

191

190

189

188

187

186

185

184

183

182

181

180

179

178

177

176

175

174

173

172

171

170

169

168

167

166

165

164

163162

161

160

159

158

157

156

155

154

153

152

151

150

149

148

147

146

145

144

143

142

141

140

139

138

137

136

135

134

133

132

131

130

129

128

127

126

125

124

123

122

121

120

119

118

117 116

115

114

113

112

111

110

109

108

107

106

105

104

103

102

101

100

99

98

97

96

95

94

93

92

91

90

89

88

87

86

85

84

83

82

81

80

7978

77

76

75

74

73

72

71

70

69

68

67

66

65

64

63

62

61

60

59

58

57

56

55

54

53

52

51

50

49

48

47

46

45

44

43

42

41

40

39

38

37

36

35

34

33

32

31

30

29

28

27

26

25

24

23

22

21

20

19

18

17

16

15

14

13

12

11

10

9

8

7

6

5

4

3

2

1

0

(e) ���������� � shrink-back (f) ���������� � shrink-back

� asymmetric edge removal

199

198

197

196

195

194

193

192

191

190

189

188

187

186

185

184

183

182

181

180

179

178

177

176

175

174

173

172

171

170

169

168

167

166

165

164

163162

161

160

159

158

157

156

155

154

153

152

151

150

149

148

147

146

145

144

143

142

141

140

139

138

137

136

135

134

133

132

131

130

129

128

127

126

125

124

123

122

121

120

119

118

117 116

115

114

113

112

111

110

109

108

107

106

105

104

103

102

101

100

99

98

97

96

95

94

93

92

91

90

89

88

87

86

85

84

83

82

81

80

7978

77

76

75

74

73

72

71

70

69

68

67

66

65

64

63

62

61

60

59

58

57

56

55

54

53

52

51

50

49

48

47

46

45

44

43

42

41

40

39

38

37

36

35

34

33

32

31

30

29

28

27

26

25

24

23

22

21

20

19

18

17

16

15

14

13

12

11

10

9

8

7

6

5

4

3

2

1

0

199

198

197

196

195

194

193

192

191

190

189

188

187

186

185

184

183

182

181

180

179

178

177

176

175

174

173

172

171

170

169

168

167

166

165

164

163162

161

160

159

158

157

156

155

154

153

152

151

150

149

148

147

146

145

144

143

142

141

140

139

138

137

136

135

134

133

132

131

130

129

128

127

126

125

124

123

122

121

120

119

118

117 116

115

114

113

112

111

110

109

108

107

106

105

104

103

102

101

100

99

98

97

96

95

94

93

92

91

90

89

88

87

86

85

84

83

82

81

80

7978

77

76

75

74

73

72

71

70

69

68

67

66

65

64

63

62

61

60

59

58

57

56

55

54

53

52

51

50

49

48

47

46

45

44

43

42

41

40

39

38

37

36

35

34

33

32

31

30

29

28

27

26

25

24

23

22

21

20

19

18

17

16

15

14

13

12

11

10

9

8

7

6

5

4

3

2

1

0

(g) ���� ���������� (h) ��� �����������

Fig. 6. The network graphs after different optimizations.

Page 11: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

11

Average Node Degree Average radius

Basic � ���� 8.8 205.4 � ��� 10.9 220.6

with #�� � ���� 8.3 194.3 � ��� 10.1 209.4

with #�� � ��� 6.9 176.6with #�� and #�� � ��� 6.7 171.8with all optimizations (OPT-CBTC) � ���� 3.8 110.7

� ��� 3.7 113.1MaxPower N/A 15.0 250SMECN N/A 2.7 115.8

TABLE I

AVERAGE DEGREE AND RADIUS OF THE CONE-BASED TOPOLOGY-CONTROL ALGORITHM WITH DIFFERENT � AND OPTIMIZATIONS ( ��–SHRINK-BACK,

��–ASYMMETRIC EDGE REMOVAL).

power demand of nodes as much as SMECN does, SMECN hasthe additional property of preserving minimum-energy paths. Ifa different power level can be used for each neighbor, and theamount of unicast traffic is significantly greater than the amountof neighbor broadcast traffic, using SMECN can be beneficial.

C. Network Performance Analysis

We next use detailed network simulations to evaluate the al-gorithms in terms of energy consumption, number of deliveredpackets, and latency. Since the two CBTC settings � ����and � ��� produced similar network graphs (as shown inTable I), we consider only � ��� in the remaining exper-iments. 4 We simulate CBTC, MaxPower, and SMECN usingthe same traffic pattern and random networks for performancemeasurements. As the power available to a node is decreasedafter each packet reception or transmission, nodes in the sim-ulation die over time. After a node dies, the network must bereconfigured. In our simulation, the NDP beacons trigger thereconfiguration protocol. The beacons are sent once per secondfor SMECN and CBTC, and each of them is jittered randomlybefore it is actually sent to avoid synchronization effects. ForCBTC and OPT-CBTC, the beacons use power ��rad���� ���.For SMECN, the beacons use the appropriate power level ascomputed by SMECN’s neighbor discovery process. Note thatno beacon is required in the MaxPower approach. For simplic-ity, we do not simulate node mobility, although some of the ef-fects of mobility—that is, the triggering of the reconfigurationprotocol—can already be observed when nodes run out of en-ergy. In the rest of this section, we compare the performanceof CBTC, OPT-CBTC, SMECN, and MaxPower. All results areaveraged over the 20 random networks described in Section V-A.

C.1 Energy Consumption

We investigate the energy consumption of the three approachesin terms of the number of traffic sources alive and the averagetransmission power levels over time. As can be seen from Fig-ure 7, OPT-CBTC has the best performance. CBTC performs

�Since we use only a few discrete power levels, there is no significant benefitin using � � ����.

worse than the SMECN algorithm, but uses only directional in-formation. MaxPower has significantly worse performance thanthe other algorithms. Figure 7(a) shows the number of trafficsources that remain alive over time. We can see that when almostall the traffic sources in MaxPower are dead at time 600, about��� and �� of the traffic sources are still alive in SMECN andCBTC, respectively, and more than ��� of the traffic sourcesare still alive in OPT-CBTC. The basic CBTC algorithm doesnot perform as well as OPT-CBTC, but it still performs muchbetter than MaxPower.

Next, we consider how the transmission power evolves overtime as nodes die over time. Figure 7(b) shows the averagepower level averaged over all nodes. The “average power level”at time � is computed by considering, for each node � still aliveat time �, the minimum power currently needed for � to reach allits neighbors (recall that this is the power that � uses in the sim-ulation to send all messages except the NDP “Hello” beacons),and then averaging this number over all nodes still alive. ForMaxPower, the average power is constant over time because themaximum power is always used. The curves show that, whilethe average power level of CBTC and SMECN increases rapidlyover time as more nodes die, the power level of OPT-CBTC in-creases rather slowly and remains much lower.

C.2 Total Number of Packets Delivered and Latency

We collected packet delivery and latency statistics at the endof our simulation. SMECN, CBTC and OPT-CBTC were able todeliver 1.66, 1.44, and 2.94 times the amount of packets deliv-ered by MaxPower, respectively, throughout the simulation. Thestatistics for packet delivery and the number of traffic sourcesstill alive together show that it is undesirable to transmit withlarge radius because it increases energy consumption and causesunnecessary interference, and consequently decreases through-put. The average packet latencies in decreasing order are 271,170, 126 and 79 msec for MaxPower, OPT-CBTC, CBTC andSMECN, respectively. MaxPower has the highest latency dueto its low spatial reuse of the spectrum. That is, a successfultransmission by MaxPower reserves a large physical area. Anynode that hears the transmission within this area backs off anddoes not transmit itself. Therefore, the larger the area reserved,

Page 12: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

12

0

10

20

30

40

50

60

0 200 400 600 800 1000 1200

Num

ber

of tr

affi

c so

urce

s th

at r

emai

n al

ive

Time

CBTCMaxPower

OPT-CBTCSMECN

1

2

3

4

5

6

7

8

0 200 400 600 800 1000 1200

Ave

rage

pow

er le

vels

Time

CBTCMaxPower

OPT-CBTCSMECN

(a) Number of traffic sources that remain alive (b) Average power levels

Fig. 7. Performance comparison through detailed network simulation.

the fewer nodes can transmit at any particular time. OPT-CBTChas higher latency than CBTC and SMECN because it typicallytakes longer routes due to the use of lower transmission power.

VI. CONCLUSION

We have analyzed the distributed cone-based algorithm andproved that ���� is a tight upper bound on the cone degree forthe algorithm to preserve connectivity. We have also presentedthree optimizations to the basic algorithm—the shrink-back op-eration, asymmetric edge removal, and pairwise edge removal—and proved that they improve performance while still preservingconnectivity. Finally, we showed that there is a tradeoff betweenusing CBTC( ) with � ���� and � ���, since using � ��� allows an additional optimization, which can havea significant impact on reducing the transmission radius. Thealgorithm extends easily to deal with reconfiguration and asyn-chrony. Most importantly, simulation results show that it is veryeffective in reducing power demands and increases the overallthroughput.

Since the focus of this paper has been on reducing energyconsumption, we conclude with some discussion of this goal.Reducing energy consumption has been viewed as perhaps themost important design metric for topology control. There aretwo standard approaches to doing this: (1) reducing the trans-mission power of each node as much as possible; (2) reduc-ing the total energy consumption through the preservation ofminimum-energy paths in the underlying network. These twoapproaches may conflict: reducing the transmission power re-quired by each node may not result in minimum-energy pathsor vice versa. Furthermore, there are other metrics to consider,such as network throughput and network lifetime. Reducing en-ergy consumption tends to increase network lifetime. (This isparticularly true if the main reason that nodes die is loss of bat-tery power.) However, there is no guarantee that it will. Forexample, using minimum-energy paths for all communicationmay result in hot spots and congestion, which in turn may drainbattery power and lead to network partition. Using approach(1) in this case may do better. If topology control is not donecarefully, network throughput can be hurt. As we have alreadypointed out, eliminating edges may result in more congestionand hence worse throughput, even if it saves power in the short

run. The right tradeoffs to make are very much application de-pendent. Therefore, an algorithm that adapts to the specific ap-plication setting is much needed. Reconfiguration in response tonode mobility and failure consumes precious energy resources.Fast convergence of topology control is critical to keep the net-work functioning well. It would be interesting to investigatehow much mobility CBTC can handle. We hope to explore theseissues in more detail in future work.

REFERENCES

[1] K. Calvert, M. Doar, and E. W. Zegura. Modeling internet topology. IEEECommunications Magazine, 35(6):160–163, June 1997.

[2] A. Chandrakasan, R. Amirtharajah, S. H. Cho, J. Goodman, G. Konduri,J. Kulik, W. Rabiner, and A. Wang. Design considerations for distributedmicrosensor systems. In Proc. IEEE Custom Integrated Circuits Confer-ence (CICC), pages 279–286, May 1999.

[3] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris. Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wire-less networks. In Proc. seventh Annual ACM/IEEE International Con-ference on Mobile Computing and Networking (MobiCom), pages 85–96,2001.

[4] L. P. Clare, G. J. Pottie, and J. R. Agre. Self-organizing distributed sensornetworks. In Proc. SPIE Conf. on Unattended Ground Sensor Technolo-gies and Applications, pages 229–237, April 1999.

[5] J. Gomez, A. T. Campbell, M. Naghshineh, and C. Bisdikian. Conservingtransmission power in wireless ad hoc networks. In Proc. InternationalConference on Network Protocols (ICNP), pages 24–34, November 2001.

[6] CMU Monarch Group. Wireless and mobility extensions to ns-2.http://www.monarch.cs.cmu.edu/cmu-ns.html, October 1999.

[7] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless micro-sensor networks. InProc. IEEE Hawaii Int. Conf. on System Sciences, pages 4–7, January2000.

[8] T.-C. Hou and V. O. K. Li. Transmission range control in multihop radionetworks. IEEE Trans. on Communications, 34(1):38–44, January 1986.

[9] L. Hu. Topology control for multihop packet radio networks. IEEE Trans.on Communications, 41(10):1474 –1481, October 1993.

[10] L. Jia, R. Rajaraman, and C. Scheideler. On local algorithms for topologycontrol and routing in ad hoc networks. In Proc. SPAA, pages 220–229,2003.

[11] R. E. Kahn. The organization of computer resources into a packet radionetwork. IEEE Transactions on Communications, COM-25(1):169–178,January 1977.

[12] K. Krizman, T. E. Biedka, and T.S. Rappaport. Wireless position location:fundamentals, implementation strategies, and source of error. In IEEE47th Vehicular Technology Conference, pages 919–923, 1997.

[13] L. Li and J. Y. Halpern. Minimum energy mobile wireless networks revis-ited. In Proc. IEEE International Conference on Communications (ICC),pages 278–283, June 2001.

[14] L. Li, J. Y. Halpern, P. Bahl, Y. M. Wang, and R. Wattenhofer. Analysis ofdistributed topology control algorithms for wireless multi-hop networks.In Proc. ACM Symposium on Principle of Distributed Computing (PODC),pages 264–273, August 2001.

Page 13: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

13

[15] J. Monks, V. Bharghavan, and W. Hwu. A power controlled multiple ac-cess protocol for wireless packet networks. In Proc. IEEE Infocom, pages219–228, April 2001.

[16] C. E. Perkins. Ad Hoc Networking. Addison-Wesley, Reading, MA, 2001.[17] C. E. Perkins and E. M. Royer. Ad-hoc on-demand distance vector routing.

In Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applica-tions, pages 90–100, February 1999.

[18] G. J. Pottie and W. J. Kaiser. Wireless integrated network sensors. Com-munications of the ACM, 43(5):51–58, May 2000.

[19] R. Prakash. Unidirectional links prove costly in wireless ad-hoc networks.In Proc. International workshop on Discrete algorithms and methods formobile computing and communications (dialM), pages 15–22, 1999.

[20] VINT Project. The UCB/LBNL/VINT network simulator-ns (Version 2).http://www.isi.edu/nsnam/ns.

[21] R. Ramanathan and R. Rosales-Hain. Topology control of multihop wire-less networks using transmit power adjustment. In Proc. IEEE Infocom2000, pages 404–413, March 2000.

[22] T. S. Rappaport. Wireless Communications: Principles and Practice.Prentice Hall, 1996.

[23] V. Rodoplu and T. H. Meng. Minimum energy mobile wireless networks.IEEE J. Selected Areas in Communications, 17(8):1333–1344, August1999.

[24] H. Takagi and L. Kleinrock. Optimal transmission ranges for randomlydistributed packet radio terminals. IEEE Trans. on Communications,32(3):246–257, March 1984.

[25] Bruce Tuch. Development of WaveLAN, an ISM band wireless LAN.AT&T Technical Journal, 72(4):27–33, 1993.

[26] Y. Wang and X.Y. Li. Localized construction of bounded degree and planarspanner for wireless ad hoc networks. In Proc. ACM DIALM-POMC JointWorkshop on Foundations of Mobile Computing, pages 59–68, 2003.

[27] R. Wattenhofer, L. Li, P. Bahl, and Y. M. Wang. Distributed topologycontrol for power efficient operation in multihop wireless ad hoc networks.In Proc. IEEE Infocom, pages 1388–1397, April 2001.

[28] R. Wattenhofer and A. Zollinger. XTC: A practical topology control al-gorithm for ad-hoc networks. Technical Report 407, Computer ScienceDepartment, ETH Zurich, 2003.

[29] S. L. Wu, Y. C. Tseng, and J. P. Sheu. Intelligent medium access controlfor mobile ad hoc networks with busy tones and power control. IEEEJournal on Selected Areas in Communications, 18(9):1647–1657, 2000.

[30] Y. Xu, J. Heidemann, and D. Estrin. Geography-informed energy con-servation for ad-hoc routing. In Proc. seventh Annual ACM/IEEE Inter-national Conference on Mobile Computing and Networking (MobiCom),pages 70–84, 2001.

[31] E. W. Zegura, K. Calvert, and S. Bhattacharjee. How to model an internet-work. In Proc. IEEE Infocom, volume 2, pages 594–602, 1996.

APPENDIX

I. PROOF FOR THEOREM II.2

Fact A.1: The distance � between any two points � � in a( � �� sector of a circle is no greater than the circle radius �.If both � and � are not the center of the circle, then � � �.

Lemma A.2: In Figure 8, circ�� �� intersects circ�� �� onthe arc from � clockwise to ) at point �.Proof: For any two points ��, ��� on the arc from � clockwiseto ), if � ���� � � �����, then ���� �� � ����� ��. This followsfrom a simple geometry argument. Consider triangles �� ���and ������. Since ���� �� � ����� �� � � and the triangleshave one side �� in common, � ���� � � ����� implies ���� �� ������ ��. Since ��� �� � � (by assumption) and ��) �� � � (byFact A.1), there must be a point � on the arc from � clockwise to) such that ��� �� � �.

Lemma A.3: Let line �� intersect circ�� �� at point * (if �is the same as �, then � *�� � ���) in Figure 8. To cover�#���� ��, in the case of ��� �� � � of Lemma II.1, � musthave at lease one neighbor in sector �+�) of circ�� �� and out-side circ�� ��. Among these neighbors, let � be the one suchthat � ��� is the smallest. � cannot lie within the �#���� � *�� ��.

����

��������

Only black points

All dotted circleshave radius d

uv

yx

zq

p

d

d

are actual nodes.

w

u

t

g

fh i

radu,α

rad αv,

t

w

Fig. 8. Illustration for the proof of Lemma A.2 and Lemma A.3.

Proof: For the case of ��� �� � � of Lemma II.1, we onlyneed to show that � cannot lie within the *�) region (the regioninside sector �*�) of circ�� �� and outside of circ�� ��). Weprove by contradiction. Suppose � lies in that region. By theprevious lemma, � lies in the arc from � to ). So both � and �

are in the sector�+�) of circ�� ��. By Fact 1, ��� �� � �. Ourassumption is that ��� �� � �. Thus, ��� �� � ��� �� � � ���� ��. Therefore,

� ��� � �� (3)

Since ��� �� � ��� �� � � (� is the intersection of circ�� ��and circ�� ��),

� ��� � � � � � ��� (4)

Since � is inside cone�� ��,

� ��� � �� � ��� � ����� � ��� (5)

Draw a line �, parallel to ��. We have � ��, � � ��� � ���� ��,. By Equation 3, � ��, � �� � ��� � ���. By Equa-tion 4 and 5, � ��, � ��� � ���. Since � ��� � �� � ������ � ��� � �����, we have � ��, � � ���. This contra-dicts our assumption of �’s position. Thus, � must be outsidecone�� � *�� ��.

Page 14: A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop … · 2018-01-04 · Algorithm for Wireless Multi-Hop Networks Li (Erran) Li ... et al. [7] describe an

14

Li (Erran) Li (M ’99; ACM M ’99) received a B.E.in Automatic Control from Beijing Polytechnic Uni-versity in 1993, a M.E. in Pattern Recognition fromthe Institute of Automation, Chinese Academy of Sci-ences, in 1996, and a Ph.D. in Computer Science fromCornell University in 2001 where Joseph Y. Halpernwas his advisor. During his graduate study at Cor-nell University, he worked at Microsoft Research andBell Labs Lucent as an intern, and at AT&T ResearchCenter at ICSI Bekerley as a visiting student. He ispresently a member of the Networking Research Cen-

ter in Bell Labs. His research interests are in networking with a focus on wire-less networking and mobile computing. His email address is [email protected]

Joseph Y. Halpern (SM ’00; ACM F ’02) received aB.Sc. in mathematics from the University of Torontoin 1975 and a Ph.D. in mathematics from Harvard in1981. In between, he spent two years as the headof the Mathematics Department at Bawku SecondarySchool, in Ghana. He is currently a professor of com-puter science at Cornell University, where he has beensince 1996. Together with his former student, YoramMoses, he pioneered the approach of applying reason-ing about knowledge to analyzing distributed proto-cols and multi-agent systems; he won a Godel Prize

for this work. He received the Publishers’ Prize for Best Paper at at the Inter-national Joint Conference on Artificial Intelligence in 1985 (joint with RonaldFagin) and in 1989. He has coauthored 6 patents, two books (”Reasoning AboutKnowledge” and ”Reasoning About Uncertainty”), and over 100 journal publi-cations and 100 conference publications. He is a former editor-in-chief of theJournal of the ACM. His email address is [email protected]

Victor Bahl (SM ’97; ACM F ’03) is a Senior Re-searcher and the Manager of the Networking Group inMicrosoft Research. His research interests span a vari-ety of problems in wireless networking including low-power RF communications; ubiquitous wireless Inter-net access and services; location determination tech-niques and services; self-organizing, self-managing multi-hop community mesh networks; and real-time audio-visual communications. He has authored over 65 sci-entific papers, 44 issued and pending patent applica-tions, and book chapters in these areas. He is the

founder and Chairman of the ACM Special Interest Group in Mobility (SIG-MOBILE); the founder and past Editor-in-Chief of ACM Mobile Computingand Communications Review, and the founder and Steering Committee Chairof ACM/USENIX Mobile Systems Conference (MobiSys); He has served onthe editorial board of the IEEE Journal on Selected Areas in Communications,and is currently serving on the editorial boards of Elsevier’s Adhoc NetworkingJournal, Kluwer’s Telecommunications Systems Journal, and ACM’s WirelessNetworking Journal. He has served as a guest editor for several IEEE and ACMjournals and on networking panels and workshops organized by the NationalScience Foundation (NSF), the National Research Council (NRC) and Euro-pean Union’s COST. He has served as the General Chairman, Program Chairand Steering Committee member of several IEEE and ACM conferences andon the Technical Program Committee of over 40 international conferences andworkshops. He is the recipient of Digital’s Doctoral Engineering Award (1994)and the ACM SIGMOBILE’s Distinguished Service Award (2001). Dr. Bahlreceived his Ph.D. in Computer Systems Engineering from the University ofMassachusetts Amherst.

Yi-Min Wang received his B.S. degree from the De-partment of Electrical Engineering at National TaiwanUniversity in 1986, and his Ph.D. degree from the De-partment of Electrical and Computer Engineering atUniversity of Illinois at Urbana-Champaign in 1993,where he received the Robert T. Chien Memorial Awardfrom the Graduate College for excellence in research.From 1993 to 1997, he was with AT&T Bell Labsand worked primarily in the area of checkpointing androllback recovery, both in theory and practice. Sincehe joined Microsoft Research in 1998, Dr. Wang has

expanded his research efforts into distributed systems and home networking. Heis currently a Senior Researcher in the Systems and Networking group, leadingan R&D effort in systems management and diagnostics.

Roger Wattenhofer (ACM M ’99) received his doc-torate in computer science in 1998 from ETH Zurich,Switzerland. From 1999 to 2001 he was in the USA,first at Brown University in Providence, RI, then atMicrosoft Research in Redmond, WA. Currently he isan assistant professor at ETH Zurich. Roger Watten-hofer’s research interests include a variety of algorith-mic aspects in networking and distributed computing;in particular, peer-to-peer computing and ad-hoc net-works. His email address is [email protected]


Recommended