Skip to main content
Log in

Topology control in constant rate mobile ad hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Topology control is the problem of assigning power levels to the nodes of an ad hoc network so as to create a specified network topology while minimizing the energy consumed by the network nodes. While considerable theoretical attention has been given to the issue of topology control in wireless ad hoc networks, all of that prior work has concerned stationary networks. When the nodes are mobile, there is no algorithm that can guarantee a graph property (such as network connectivity) throughout the node movement. In this paper we study topology control in mobile wireless ad hoc networks (MANETs). We define a mobility model, namely the constant rate mobile network (CRMN) model, in which we assume that the speed and direction of each moving node are known. The goal of topology control under this model is to minimize the maximum power used by any network node in maintaining a specified monotone graph property. Network connectivity is one of the most fundamental monotone properties. Under the CRMN model, we develop general frameworks for solving both the decision version (i.e. for a given value p > 0, will a specified monotone property hold for the network induced by assigning the power value p to every node?) and the optimization version (i.e. find the minimum value p such that the specified monotone property holds for the network induced by assigning the power value p to every node) of the topology control problems. Efficient algorithms for specific monotone properties can be derived from these frameworks. For example, when the monotone property is network connectivity, our algorithms for the decision and optimization versions have running times of O(n 2 log2 n) and O(n 4 log2 n), respectively. Our results represent a step towards the development of efficient and provably good distributed algorithms for topology control problems for MANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. In the context of this paper, a framework is a collection of concrete algorithms with each algorithm solving the topology control problem for a particular graph property.

  2. We let the node name represent both itself and the Euclidean position of the node.

  3. In particular, this assumption can be made without loss of generality for monotone properties, as will become clear from the next section.

  4. Henceforth, when the meaning is clear, we omit the word “Euclidean”.

  5. For an optimization problem, its decision version is: Given any proposed solution to the optimization problem, determine if that solution satisfies the objective (without optimization) of the problem. Specifically, the decision version of \(\langle{\sc CRMN}, {\mathcal{P}}, {\sc MaxP}\rangle\) is to determine whether for a given a power p, the CRMN \({\mathcal{N}}\) achieves monotone property \({\mathcal{P}}\) under p.

  6. \(\vec v_i\) represents the vector \(\overrightarrow{V_iV_i^{\prime}}\) starting at V i and ending at \(V_i^{\prime}\).

  7. Imaginary solutions do not have any physical significance in this context.

  8. This is assuming that there is only one slicing point at \(t_{k+1}\). When there are multiple slicing points at \(t_{k+1}\), the update operations described in this proof are applied to each of those slicing points.

  9. In [10], there are only two graph properties (related to this paper) handled by their dynamic graph algorithms. These properties are Connected and 2-Node/Edge-Connected. However, it is not hard to see that Minimum Degree Constraint can be processed incrementally in constant time as follows. Let every node be associated with a counter that records the number of incident edges on that node. The update operation is that when an edge comes into or goes out of existence, the degree of each node is accounted for by increasing or decreasing the counter associated with each endpoint of that edge.

  10. Note that when there are identical threshold functions, multiple pairs of edges might define the same slicing points. In that case, the procedure described in the remainder of the proof is carried out for each such pair of edges.

References

  1. Althaus, E., Calinescu, G., Mandoiu, I., Prasad, S., Tchervenski, N., & Zelikovksy, A. (2006). Power efficient range assignment for symmetric connectivity in static ad hoc wireless networks. Wireless Networks, 12(3), 287–299.

    Article  Google Scholar 

  2. Blough, D. M., Leoncini, M., Resta, G., & Santi, P. (2002). On the symmetric range assignment problem in wireless ad hoc networks. In Proceedings of the 2nd IFIP International Conference on Theoretical Computer Science, Vol. 223, pp. 71–82.

  3. Calinescu, G., Mandoiu, I., & Zelikovsky A. (2002). Symmetric connectivity with minimum power consumption in radio networks. In Proceedings of the 2nd IFIP International Conference on Theoretical Computer Science, Vol. 223, pp. 119–130.

  4. Calinescu, G., & Wan, P.-J. (2003). Range assignment for high connectivity in wireless ad hoc networks. In Proceedings of the International Conference on Ad Hoc and Wireless Networks, pp. 235–246.

  5. Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for ad hoc network research. Wireless Communication and Mobile Computing (WCMC), 2(5), 483–502.

    Article  Google Scholar 

  6. Chen, W., & Huang, N. (1989). The strongly connecting problem on multihop packet radio networks. IEEE Transactions on Communication 37(3), 293–295.

    Article  Google Scholar 

  7. Clementi, A. E. F., Penna, P., & Silvestri, R. (1999). Hardness results for the power range assignment problem in packet radio networks. In Proceedings of the Third International Workshop on Randomization and Approximation in Computer Science (APPROX 1999), Vol. 1671, pp. 195–208.

  8. Clementi, A. E. F., Penna, P., & Silvestri, R. (2000). The power range assignment problem in packet radio networks in the plane. Proceedings of the 17th Annual Symposium on Theoretical Aspects of Computer Science (STACS 2000), pp. 651–660.

  9. Hajiaghayi, M. T., Immorlica, N., & Mirrokni, V. (2003). Power optimization in fault-tolerant topology control algorithms for wireless multi-hop networks. MobiCom’03, September, pp. 300–312

  10. Holm, J., de Lichtenberg, K., & Thorup, M. (2001). Poly-logarithmic deterministic fully-dynamic algorithms for connectivity, minimum spanning tree, 2-edge, and biconnectivity. Journal of the ACM 48(4), 723–760.

    Article  MATH  MathSciNet  Google Scholar 

  11. Jia, X., Kim, D., Makki, S., & Wan, P., & Yi, C. (2005). Power assignment for k-connectivity in wireless ad hoc networks. Journal of Combinatorial Optimization 9(2), 213–222.

    Article  MATH  MathSciNet  Google Scholar 

  12. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.), Mobile computing (Vol. 353, pp. 153–181). Hingham, MA: Kluwer Academic Publishers.

  13. Kirousis, L. M., Kranakis, E., Krizanc, D., & Pelc, A. (1997). Power consumption in packet radio networks. In Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science, Vol. 1200, pp. 363–374.

  14. Krumke, S. O., Liu, R., Lloyd, E. L., Marathe, M. V., Ramanathan, R., & Ravi, S. S. (2003). Topology control problems under symmetric and asymmetric power thresholds. In Proceedings of the International Conference on ad hoc and Wireless Networks, Vol. 2865, pp. 187–198.

  15. Lloyd, E. L., Liu, R., Marathe, M. V., Ramanathan, R., & Ravi, S. S. (2005). Algorithmic aspects of topology control problems for ad hoc networks. Mobile Networks and Applications (MONET), 10(1–2), 19–34, February–April 2005. (An earlier version appeared in MobiHoc 2002).

    Article  Google Scholar 

  16. Lloyd, E. L., Liu, R., & Ravi, S. S. (2006). Approximating the minimum number of maximum power users in ad hoc networks. Mobile Networks and Applications (MONET) 11(2), 129–142, April 2006. (An earlier version appeared in ADHOC-NOW 2004).

    Article  Google Scholar 

  17. Lloyd, E. L., & Ravi, S. S. (2007). Topology control problems for wireless networks. In T. Gonzalez (Ed.), Approximation algorithms and metaheuristics (pp. 67.1–67.20). Boca Raton, FL: Chapman & Hall/CRC.

  18. Ramanathan, R., & Rosales-Hain, R. (2000). Topology control of multihop wireless networks using transmit power adjustment. In Proceedings of the IEEE INFOCOM 2000, March, pp. 404–413.

  19. Rappaport, T. S. (1996). Wireless communications: Principles and practice. Englewood Cliffs, NJ: Prentice-Hall, Inc.

    Google Scholar 

  20. Robins, G., & Zelikovsky, A. (2000). Improved steiner tree approximation in graphs. In Proceedings of the 11th Ann. ACM-SIAM Symp. on Discrete Algorithms (SODA 2000), pp. 770–779.

  21. Thorup, M. (2000). Near-optimal fully-dynamic graph connectivity. In Proceedings of the Thirty-second Annual ACM Symposium on Theory of Computing, pp. 343–350.

  22. Zhao, L., Lloyd, E. L., & Ravi, S. S. (2006). Topology control for constant rate mobile networks. In Proceedings of the IEEEGLOBECOM’06-WirelessComm (6 pages), November.

Download references

Acknowledgments

We thank the reviewers for reading the manuscript and providing helpful suggestions.

Disclaimer

The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Errol L. Lloyd.

Additional information

Preliminary results regarding connectivity only were presented at the GLOBECOM’06-WirelessComm [22] conference in San Francisco, California, November 2006.

This article was prepared through collaborative participation in the Communications and Networks Consortium sponsored by the U. S. Army Research Laboratory under the Collaborative Technology Alliance Program, Cooperative Agreement DAAD19-01-2-0011. The U. S. Government is authorized to reproduce and distribute reprints for Government purposes not withstanding any copyright notation thereon. (This statement applies only to the first and second authors).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhao, L., Lloyd, E.L. & Ravi, S.S. Topology control in constant rate mobile ad hoc networks. Wireless Netw 16, 467–480 (2010). https://doi.org/10.1007/s11276-008-0147-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-008-0147-9

Keywords

Navigation