Results 1  10
of
377
Span: An energyefficient coordination algorithm for topology maintenance in ad hoc wireless networks
 ACM Wireless Networks Journal
, 2001
"... ..."
(Show Context)
A message ferrying approach for data delivery in sparse mobile ad hoc networks
 In Proc. of ACM Mobihoc
, 2004
"... Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and selfconfiguring network capacity required in many critical applications, e.g., battlefields, disaster relief and wide area sensing. In this paper we study the problem of efficient data delivery in sparse MANETs where network partitions ..."
Abstract

Cited by 496 (14 self)
 Add to MetaCart
(Show Context)
Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and selfconfiguring network capacity required in many critical applications, e.g., battlefields, disaster relief and wide area sensing. In this paper we study the problem of efficient data delivery in sparse MANETs where network partitions can last for a significant period. Previous approaches rely on the use of either long range communication which leads to rapid draining of nodes ’ limited batteries, or existing node mobility which results in low data delivery rates and large delays. In this paper, we describe a Message Ferrying (MF) approach to address the problem. MF is a mobilityassisted approach which utilizes a set of special mobile nodes called message ferries (or ferries for short) to provide communication service for nodes in the deployment area. The main idea behind the MF approach is to introduce nonrandomness in the movement of nodes and exploit such nonrandomness to help deliver data. We study two variations of MF, depending on whether ferries or nodes initiate proactive movement. The MF design exploits mobility to improve data delivery performance and reduce energy consumption in nodes. We evaluate the performance of MF via extensive ns simulations which confirm the MF approach is efficient in both data delivery and energy consumption under a variety of network conditions.
On the Minimum Node Degree and Connectivity of a Wireless Multihop Network
 ACM MobiHoc
, 2002
"... This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k–connectivity. Both topology attributes depend on the spatial distribution of the nodes and their transmission range. Using typical modeling assumptions — a random uniform distri ..."
Abstract

Cited by 321 (4 self)
 Add to MetaCart
This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k–connectivity. Both topology attributes depend on the spatial distribution of the nodes and their transmission range. Using typical modeling assumptions — a random uniform distribution of the nodes and a simple link model — we derive an analytical expression that enables the determination of the required range r0 that creates, for a given node density ρ, an almost surely k–connected network. Equivalently, if the maximum r0 of the nodes is given, we can find out how many nodes are needed to cover a certain area with a k–connected network. We also investigate these questions by various simulations and thereby verify our analytical expressions. Finally, the impact of mobility is discussed. The results of this paper are of practical value for researchers in this area, e.g., if they set the parameters in a network–level simulation of a mobile ad hoc network or if they design a wireless sensor network. Categories and Subject Descriptors C.2 [Computercommunication networks]: Network architecture and design—wireless communication, network communications, network topology; G.2.2 [Discrete mathematics]: Graph theory; F.2.2 [Probability and statistics]: Stochastic processes
Topology Control in Wireless Ad Hoc and Sensor Networks
 ACM Computing Surveys
, 2005
"... Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal of thi ..."
Abstract

Cited by 296 (4 self)
 Add to MetaCart
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption (which is essential to extend the network operational time) and radio interference (with a positive effect on the network traffic carrying capacity). The goal of this technique is to control the topology of the graph representing the communication links between network nodes with the purpose of maintaining some global graph property (e.g., connectivity), while reducing energy consumption and/or interference that are strictly related to the nodes ’ transmitting range. In this article, we state several problems related to topology control in wireless ad hoc and sensor networks, and we survey stateoftheart solutions which have been proposed to tackle them. We also outline several directions for further research which we hope will motivate researchers to undertake additional studies in this field.
A Power Control MAC Protocol for Ad Hoc Networks
, 2002
"... This paper presents a power control MAC protocol that allows nodes to vary transmit power level on a perpacket basis. Several researchers have proposed simple modifications of IEEE 802.11 to incorporate power control. The main idea of these power control schemes is to use different power levels for ..."
Abstract

Cited by 205 (1 self)
 Add to MetaCart
(Show Context)
This paper presents a power control MAC protocol that allows nodes to vary transmit power level on a perpacket basis. Several researchers have proposed simple modifications of IEEE 802.11 to incorporate power control. The main idea of these power control schemes is to use different power levels for RTSCTS and DATAACK. Specifically, maximum transmit power is used for RTSCTS, and the minimum required transmit power is used for DATAACK transmissions in order to save energy. However, we show that these schemes can degrade network throughput and can result in higher energy consumption than when using IEEE 802.11 without power control. We propose a power control protocol which does not degrade throughput and yields energy saving.
Power Control in AdHoc Networks: Theory, Architecture, Algorithm and Implementation of the COMPOW Protocol
 in European Wireless Conference
, 2002
"... We present a new protocol for power control in ad hoc networks. We describe the issues in conceptualizing the power control problem, and provide an architecturally simple as well as theoretically well founded solution. The solution is shown to simultaneously satisfy the three objectives of maximizin ..."
Abstract

Cited by 191 (11 self)
 Add to MetaCart
(Show Context)
We present a new protocol for power control in ad hoc networks. We describe the issues in conceptualizing the power control problem, and provide an architecturally simple as well as theoretically well founded solution. The solution is shown to simultaneously satisfy the three objectives of maximizing the traffic carrying capacity of the entire network, extending battery life through providing low power routes, and reducing the contention at the MAC layer. Further, the protocol has the plug and play feature that it can be employed in conjunction with any routing protocol that proactively maintains a routing table. The protocol, called COMPOW, has been implemented in the Linux kernel and we describe the software architecture and implementation details.
Geometric Spanner for Routing in Mobile Networks
, 2001
"... Abstract—We propose a new routing graph, the restricted Delaunay graph (RDG), for mobile ad hoc networks. Combined with a node clustering algorithm, the RDG can be used as an underlying graph for geographic routing protocols. This graph has the following attractive properties: 1) it is planar; 2) be ..."
Abstract

Cited by 189 (19 self)
 Add to MetaCart
Abstract—We propose a new routing graph, the restricted Delaunay graph (RDG), for mobile ad hoc networks. Combined with a node clustering algorithm, the RDG can be used as an underlying graph for geographic routing protocols. This graph has the following attractive properties: 1) it is planar; 2) between any two graph nodes there exists a path whose length, whether measured in terms of topological or Euclidean distance, is only a constant times the minimum length possible; and 3) the graph can be maintained efficiently in a distributed manner when the nodes move around. Furthermore, each node only needs constant time to make routing decisions. We show by simulation that the RDG outperforms previously proposed routing graphs in the context of the Greedy perimeter stateless routing (GPSR) protocol. Finally, we investigate theoretical bounds on the quality of paths discovered using GPSR. Index Terms—Geographical routing, spanners, wireless ad hoc networks. I.
Analysis of a conebased distributed topology control algorithm for wireless multihop networks
 In ACM Symposium on Principle of Distributed Computing (PODC
, 2001
"... bahl~microsoft, corn ymwang~microsoft, corn rogerwa~microsoft, corn The topology of a wireless multihop network can be controlled by varying the transmission power at each node. In this paper, we give a detailed analysis of a conebased distributed topology control algorithm. This algorithm, intr ..."
Abstract

Cited by 183 (18 self)
 Add to MetaCart
(Show Context)
bahl~microsoft, corn ymwang~microsoft, corn rogerwa~microsoft, corn The topology of a wireless multihop network can be controlled by varying the transmission power at each node. In this paper, we give a detailed analysis of a conebased distributed topology control algorithm. This algorithm, introduced in [16], does not assume that nodes have GPS information available; rather it depends only on directional information. Roughly speaking, the basic idea of the algorithm is that a node u transmits with the minimum power P~,,a required to ensure that in every cone of degree a around u, there is some node that u can reach with power Pma We show that taking a = 57r/6 is a necessary and sufficient condition to guarantee that network connectivity is preserved. More precisely, if there is a path from a to t when every node communicates at maximum power then, if a < _ 5~r/6, there is still a path in the smallest symmetric graph Ga containing all edges (u, v) such that u can communicate with v using power p~,a. On the other hand, if ~> 51r/6, connectivity is not necessarily preserved. We also propose a set of optimizations that further reduce power consumption and prove that they retain network connectivity. Dynamic reconfiguration in the presence of failures and mobility is also discussed. Simulation results are presented to demonstrate the effectiveness of the algorithm and the optimizations. 1.
Minimumenergy broadcast in allwireless networks: Npcompleteness and distribution
 In Proc. of ACM MobiCom
, 2002
"... In allwireless networks a crucial problem is to minimize energy consumption, as in most cases the nodes are batteryoperated. We focus on the problem of poweroptimal broadcast, for which it is well known that the broadcast nature of the radio transmission can be exploited to optimize energy consump ..."
Abstract

Cited by 177 (2 self)
 Add to MetaCart
(Show Context)
In allwireless networks a crucial problem is to minimize energy consumption, as in most cases the nodes are batteryoperated. We focus on the problem of poweroptimal broadcast, for which it is well known that the broadcast nature of the radio transmission can be exploited to optimize energy consumption. Several authors have conjectured that the problem of poweroptimal broadcast is NPcomplete. We provide here a formal proof, both for the general case and for the geometric one; in the former case, the network topology is represented by a generic graph with arbitrary weights, whereas in the latter a Euclidean distance is considered. We then describe a new heuristic, Embedded Wireless Multicast Advantage. We show that it compares well with other proposals and we explain how it can be distributed. Categories and Subject Descriptors
Power Control and Clustering in Ad Hoc Networks
 In INFOCOM
, 2003
"... In this paper, we consider the problem of power control when nodes are nonhomogeneously dispersed in space. In such situations, one seeks to employ per packet power control depending on the source and destination of the packet. This gives rise to a joint problem which involves not only power contro ..."
Abstract

Cited by 175 (3 self)
 Add to MetaCart
(Show Context)
In this paper, we consider the problem of power control when nodes are nonhomogeneously dispersed in space. In such situations, one seeks to employ per packet power control depending on the source and destination of the packet. This gives rise to a joint problem which involves not only power control but also clustering. We provide three solutions for joint clustering and power control.