Abstract
Fault-tolerant communication and energy efficiency are important requirements for future-generation wireless ad hoc networks, which are increasingly being considered also for critical application domains like embedded systems in automotive and aerospace. Topology control, which enables multi-hop communication between any two network nodes via a suitably constructed overlay network, is the primary target for increasing connectivity and saving energy here. In this paper, we present a fault-tolerant distributed topology control algorithm that constructs and continuously maintains a k-regular and k-node-connected overlay for energy-efficient multi-hop communication. As a by-product, it also builds a hierarchy of clusters that reflects the node density in the network, with guaranteed and localized fault-tolerant communication between any pair of cluster members. The construction algorithm automatically adapts to a dynamically changing environment, is guaranteed to converge, and exhibits good performance as well.








Similar content being viewed by others
Notes
The same is true if link-level peer-to-peer hardware encryption/decryption is used.
Since the edges are undirected, we actually use (p,q,w) as an abbreviation for ({q,p},w).
Consult [14] for the treatment of a single tier topology without gateway nodes.
More specifically, the results provided in this section differ from [14] in that we dropped the concept of the root group in favor of gateway nodes.
In case of k = 2, it is not hard to see that the minimum-weight admissible overlay graph is the tour provided by a solution to the traveling salesman problem (TSP), whereas our joint-minimal overlay graph is equivalent to the result of the greedy (multi-fragment) TSP heuristic [6]. Its competitive factor C is known to satisfy \(\hbox{log}\; n/(3 \hbox{log}\hbox{log}\; n) \leq C \leq (\lceil\hbox{log}_2 n\rceil + 1)/2\) in Euclidean graphs; Sect. 8 will provide some additional data from our simulation studies.
For propose module implementation efficiency, it makes sense to (statically) elect one of the terminal nodes to be the only one to generate new proposals on behalf of the group.
We consider the common asynchronous time complexity measure here, where the longest end-to-end message delay in an execution is normalized to the unit time 1. The worst case time complexity is the worst case running time of an algorithm in any such failure-free execution.
In a lock-step execution, every node executes exactly one computing step—consisting of message reception (if any), some local computation and the optional sending of messages—per round.
We note that there are simple variants of the DFS search algorithm that reduce the time complexity to O(n).
References
Bahramgiri, M., Hajiaghayi, M., & Mirrokni, V. (2002). Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks. In Proceedings of the IEEE International Conference on Computer Communications and Networks (ICCCN02), pp. 392–397.
Chandra, T. D., & Toueg, S. (1996). Unreliable failure detectors for reliable distributed systems. Journal of the ACM, 43(2), 225–267.
Ghosh, S., Lillis, K., Pandit, S., & Pemmaraju, S. (2004). Robust topology control protocols. In Proceedings of the 8th International Conference on Principles of Distributed Systems (OPODIS 2004), pp. 94–109.
Guerraoui, R. (1995). Revisiting the relationship between non blocking atomic commitment and consensus problems. In Distributed Algorithms (WDAG-9), pp. 87–100.
Hajiaghayi, M. T., Immorlica, N., & Mirrokni, V. S. (2003). Power optimization in fault-tolerant topology control algorithms for wireless multi-hop networks. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 300–312.
Johnson, D. S., & McGeoch, L. A. (1997). The traveling salesman problem: A case study in local optimization. In E. Aarts & J. K. Lenstra (Eds.), Local search in combinatorial optimization (pp. 215–310). Wiley.
Knuth, D. E. (1997). The art of computer programming. Addison Wesley.
Li, N., & Hou, J. C. (2004). FLSS: A fault-tolerant topology control algorithm for wireless networks. In MobiCom ’04: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (pp. 275–286). New York, NY, USA.
Li, N., & Hou, J. C. (2004). Topology control in heterogeneous wireless networks: Problems and solutions. In Proceedings of the IEEE INFOCOM’04, pp. 232–243.
Moser, H. (2005). Distributed construction of a fault-tolerant wireless communication topology for networked embedded systems. Master’s thesis, Embedded Computing Systems Group, Vienna University of Technology. http://www.ecs.tuwien.ac.at/W2F/papers/thesis_moser.pdf.
Moser, H., & Thallner, B. (2006). Construction of a fault-tolerant wireless communication topology using distributed agreement. In DIWANS ’06: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (pp. 35–44). Los Angeles, CA, USA.
Nolte, T., Hansson, H., Bello, L. L. (2005). Wireless automotive networks. In J. Kaiser (Ed.), Proceedings of the 4th International Workshop on Real-Time Networks (RTN’05) in Conjunction with the 17th Euromicro International Conference on Real-Time Systems (ECRTS’05) (pp. 35–38). Palma de Mallorca, Balearic Islands, Spain.
Santi, P. (2005). Topology control in wireless ad hoc and sensor networks. ACM Computing Surveys, 37(2), 164–194.
Thallner, B. (2004). Fault tolerant communication topologies for wireless ad hoc networks. In 1st Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS’04). Florence, Italy. http://www.ecs.tuwien.ac.at/W2F/documents/diwans04.pdf.
Thallner, B. (2005). Topology control for fault-tolerant communication in wireless ad hoc networks. Ph.D. thesis, Embedded Computing Systems Group, Vienna University of Technology. http://www.ecs.tuwien.ac.at/W2F/documents/diss_thallner.pdf.
Thallner, B., & Moser, H. (2005). Topology control for fault-tolerant communication in highly dynamic wireless networks. In Proceedings of the Third International Workshop on Intelligent Solutions in Embedded Systems (WISES 2005), pp. 89–100. http://www.vmars.tuwien.ac.at/documents/extern/1671/paper_wises05.pdf.
Walter, C. (2007). Simulation and performance evaluation of a topology control algorithm in NS2. Master’s thesis, Embedded Computing Systems Group, Vienna University of Technology. http://www.vmars.tuwien.ac.at/documents/extern/2331/thesis_walter.pdf.
Wattenhofer, R., & Zollinger, A. (2004). XTC: A practical topology control algorithm for ad-hoc networks. In Proceedings of the 4th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN).
Whitney, H. (1932). Congruent graphs and the connectivity of graphs. Journal of Mathematics, 54, 150–168.
Acknowledgment
This research has been supported by the FWF-projects P17757-N04 (Theta) and P18264-N04 (SPAWN).
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendices
1.1 Appendix A. Topology construction method proofs
Theorem 8
For every graph G with n′ ≥ 1 and n′′ ≥ 2k − 2, there is exactly one joint-minimal admissible overlay graph G′.
Proof 7
We first show that at least one joint-minimal admissible overlay graph exists, by inductively constructing joint-minimal groups (with increasing weights) one after the other and showing that these groups are stable, i.e., not destroyed during later construction steps. For i ≥ 1, let g i be the group added in the i-th step of this construction and G i−1 be the set of groups constructed in steps 1,…, i − 1.
For i = 1, g 1 is the (unique) group with minimal ω(g 1) chosen among all nodes in \(\Uppi.\) Clearly, g 1 is joint-minimal and trivially stable. For g i , i > 1, we choose the group with minimal weight ω(g i ) formed from groups and nodes in \(G_{i-1} \cup \Uppi.\) Clearly, all members of g i agree on this as the minimal choice. Moreover, it holds that ω(g i ) > ω(g i−1): For, if g i does not incorporate g i−1, then it can incorporate only groups and nodes from \(G_{i-2} \cup \Uppi,\) where g i−1 is the minimum-weight choice. If g i incorporates g i−1, then ω(g i ) > ω(g i−1) according to the definition of ω(·).
It remains to be shown, however, that the choice to include some member \(x\,\in\, G_{i-1} \cup \Uppi\) in g i does not violate the joint-minimum criterion for some earlier built group g j ∈ G i−1, j < i, which might already have x as a member. Since ω(g j ) < ω(g i ), however, this cannot happen.
Finally, since it is ensured by our weight assumptions that all regular nodes are used up before gateway nodes are considered, Theorem 1 holds also for this inductive construction. Hence, the final group can be built since at least 2k − 2 gateway nodes are available.
It thus only remains to be shown that the joint-minimal overlay graph is unique. So let us assume that there exist two admissible overlay graphs G′1 and G′2, which are both joint-minimal. Going up the topology tree of G′1 and G′2, at some depth the group structure must be different. More specifically, there must be a group member x in some group g i in G′1 which is member in some other (= not corresponding) group g j in G′2. Recall that a node or a group can only be member of at most one group. However, either g i of G′1 or g j of G′2 has lower weight, which implies that the admissible overlay graphs G′1 and G′2 cannot both be joint-minimal according to Definition 3. □
To show that our admissible overlay graph is k-connected, we first need an additional definition and a few preliminary lemmas.
Definition 7
A node p is nd-connected (“node-disjointly connected”) to a set \(S \,\subseteq\, \Pi,\) if p is connected to every s ∈ S via node-disjoint paths. Formally, p is nd-connected to S, if there exists a set P of paths, containing a path from p to s for every s ∈ S, and p is the only node shared between any two paths in P.
Lemma 1
Let\(g \,\in\, ({\mathbb{G}} \cup \Pi)\) be a group or node. In G g , every p ∈ nodes(g) is nd-connected to T g , the set of terminal nodes of g. Only nodes from nodes(g) are required for these paths.
Proof 8
Induction on depth d of g’s topology tree. For d = 0, g is a node. Thus, T g = nodes(g) = {g} and the claim follows trivially.
For some d > 0, suppose that the claim holds for every sub-group of g. Clearly, p ∈ nodes(g a ) for some specific (direct) sub-group g a of g and is hence nd-connected to \(T_{g_a},\) resulting in a (multi-)set of k node-disjoint paths (p,…, t a ), for every \(t_a {\,\in\,}T_{g_a}.\) (If g a is a node, all k paths are (p); if g a is a group and \(p {\,\in\,}T_{g_a},\) one of the k paths is (p).)
If g a is a group, then, by construction, \(T_{g_a}\) contains one node \(t^{\prime}_a\) that is also element of T g , and k − 1 other nodes t a , each of which is connected to one terminal node t b of another sub-group g b of g. (If g a is a node, it is both element of T g and connected to all other sub-groups of g). Thus, we can extend k − 1 paths by following k − 1 different t a →t b edges (one for every “neighbor” g b of g a ). By applying the induction hypothesis, each of these t b ’s is connected to all other terminal nodes of its group g b , including the one which is also element of T g , and, thus, each path can be continued to a terminal node of g. It is easy to see that all of these k − 1 paths are node-disjoint, since each one was extended only with nodes from “its” unique g b .
The one remaining path does not need to be extended, since \(t^{\prime}_a \in T_g.\) □
Theorem 9
B(G′) of each admissible overlay graph\(G^{\prime}=G_{g_{final}}\)with n′′ ≥ 2k − 2 isk-connected.
Proof 9
Let p and q be two arbitrary nodes and g ∈ groups(g final ) be the lowest-level group such that p and q ∈ nodes(g). We show that p,q are connected via k node-disjoint paths, which implies the statement of our theorem via Menger’s Theorem [19].
Let g be a group, p ∈ nodes(g a ) and q ∈ nodes(g b ) with g a ,g b ∈ members(g) and g a ≠g b . We claim that there are k node-disjoint paths between the two sets of terminals \(T_{g_a}\) and \(T_{g_b}.\) By the construction of a group, k − 1 pairs of nodes of \(T_{g_a}\times T_{g_b}\) are connected by disjoint paths routed over at most one sub-group. According to Lemma 1, there is always a (group-internal) path between any pair of terminals of this sub-group. Thus, we have one path \((p, {\ldots, }t_a, t_b, {\ldots, }q)\) and k − 2 paths (p,…,t a , t c1,…,t c2, t b ,…, q) (with different \(t_a {\,\in\,}T_{g_a}\) and \(t_b \,\in\, T_{g_b}\) each). By Lemma 1, we know that all k − 1 (p,…,t a ) and (t b ,…,q) paths are node-disjoint (except for p and q, of course). Likewise, we have k − 2 different sub-groups g c ∈ members(g), where a g c -internal path (t c1,…,t c2) exists for all \(t_{c1}, t_{c2} \,\in\, T_{g_c}.\)
Hence, we only have to show that the external connections of \(T_{g_a}\) and \(T_{g_b}\) are connected outside of g as well. Consider the parent group g′ of g.
-
1.
If the terminal nodes \(p^{\prime}\,\in\, T_{g_a}\) and \(q^{\prime}\,\in\, T_{g_b}\) of group g are non-terminals in g′, they are connected in g′ via some path (p′, t c1,…,t c2, t d1,…,t d2, q′), with g c (terminals: t cx ) and g d (terminals: t dx ) being other sub-groups of g′. Lemma 1 shows that the paths (t c1,…,t c2) and (t d1,…,t d2) must exist and that they only require nodes from g c and g d , respectively.
-
2.
If w.l.o.g. \(p^{\prime} \in T_{g^{\prime}}\) but \(q^{\prime}\notin T_{g^{\prime}},\) then q′ is used for some internal connection in g′, i.e., it is directly connected to some terminal t c1 of g c ∈ members(g′). By Lemma 1, there must be some g c -internal path (t c1,…,t c2) to some terminal t c2 of g c , which is also a terminal node of g′. Let q* = t c2 and continue with (3).
-
3.
If both p′ and q′ or q* are terminals in g′, go up to the parent group of g′ until either (1) or (2) applies or the final group is reached. If the final group g′ = g final is reached, then p′ and q′ or q* are terminals in g final and therefore gateway nodes by Definition 1. Since all gateway nodes are fully connected in B(G′), the external connection follows trivially.
Applying Menger’s Theorem, the claimed connectivity follows. □
1.2 Appendix B. Propose modules proofs
Lemma 2
The worst case message complexity of our local perfect propose module for generating a single proposal is O(nk−1).
Proof 10
Let (G′) e p be the incompletely built overlay graph at time e as viewed by node p. The maximum number of groups in (G′)e is \( < \lfloor\frac{n-1}{k-1}\rfloor = O(n)\) by Theorem 3. Since, in the worst case, p does not know about those groups (it need not be a member of any of those), O(n) messages are needed for initially collecting the required group information.
The maximum number of candidates in any initial potential member set is obviously \(n+\lfloor\frac{n-1}{k-1}\rfloor.\) Assuming that search and result messages are sent to every node and leader in the worst case, we obtain a message complexity of at most \(2\cdot \sum_{i=0}^{k-1} (n+\lfloor\frac{n-1}{k-1}\rfloor)^i=O(n^{k-1}).\) □
Lemma 3
The worst case time complexity of the local perfect propose module for generating a single proposal is O(n).
Proof 11
According to the proof of Lemma 2, node p has to establish information about all groups in (G′) e p . Since group information is distributed over the whole system, this collection process may take up to O(n) time. pms p may incorporate O(n) nodes and groups initially. In the search phase, each search and result message is forwarded k − 1 times in the worst case, concurrently for all nodes and groups in pms p , resulting in a time complexity of 2·(k − 1) = O(1). Hence the claimed time complexity of O(n) follows. □
Lemma 4
The worst case message complexity of our local non-perfect propose module for generating a single proposal is O(n2).
Proof 12
Let again (G′) e p be the incompletely built overlay graph at time e as viewed by node p. Due to the DFS search, at most a single search and result message is sent over any link connecting the at most \(n+\lfloor\frac{n-1}{k-1}\rfloor=O(n)\) nodes/leaders in (G′) e p . The worst case message complexity for generating a single proposal is hence at most O(n 2). □
Lemma 5
The worst case time complexity of the local non-perfect propose module for generating a single proposal is O(n2).
Proof 13
Since, by Lemma 4, O(n 2) messages are sent in the worst case, the worst case time complexity cannot be largerFootnote 9 than O(n 2). □
Combining the perfect resp. the non-perfect propose modules with the basic construction algorithm leads to the worst case time complexities given by Theorem 10.
Theorem 10
The worst case time complexity for generating a joint-minimal admissible overlay network G′ with the basic topology construction algorithm using local perfect resp. local non-perfect propose modules is O(n2) resp. O(n3).
Proof 14
The time complexity of generating a single perfect proposal is O(n) by Lemma 3. Since all nodes generate proposals concurrently, after O(n) time, the first minimal proposal, which is always accepted by the construction algorithm and never destroyed, is released (among other proposals). Since there are O(n) groups to construct according to Theorem 3, the claimed time complexity of O(n 2) follows.
The result for the local non-perfect propose module is derived analogously, starting from the O(n 2) time complexity for a single proposal according to Lemma 5. □
Rights and permissions
About this article
Cite this article
Thallner, B., Moser, H. & Schmid, U. Topology control for fault-tolerant communication in wireless ad hoc networks. Wireless Netw 16, 387–404 (2010). https://doi.org/10.1007/s11276-008-0139-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-008-0139-9