1 / 27

Power-aware Topology Control in Wireless Ad Hoc Networks

Power-aware Topology Control in Wireless Ad Hoc Networks. David S. L. Wei Dept of Computer and Information Sciences Fordham University Bronx, New York. Joint work with. Szu-Chi Wang and Sy-Yen Kuo Dept of Electrical Engineering National Taiwan University Taipei, Taiwan. Introduction.

helene
Download Presentation

Power-aware Topology Control in Wireless Ad Hoc Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Power-aware Topology Control in Wireless Ad Hoc Networks David S. L. Wei Dept of Computer and Information Sciences Fordham University Bronx, New York Joint work with Szu-Chi Wang and Sy-Yen Kuo Dept of Electrical Engineering National Taiwan University Taipei, Taiwan

  2. Introduction  Wireless ad hoc networks are - Characterized by scarce resources - Prone to topology changes - Lack of physical infrastructure  The flexibility and mobility of wireless ad hoc networks make them suitable for applications such as automated battlefields and disaster rescues

  3. F F E D A C A C D E B B Introduction (cont.) • A wireless ad hoc network can be modeled by an undirected/directed graph G = (V, E)  Power conservation has been widely used as a primary control parameter in the design of protocols for wireless ad hoc networks

  4. F F E D A C A C D E B B E D A C A C D E F B F B Introduction (cont.)

  5. Motivations  Each node in a wireless ad hoc network can potentially change the network topology by adjusting its transmissionrange  The primary goal of topology control is to design power-efficient algorithms that - Maintain network connectivity - Optimize performance metrics (network lifetime, throughput,…)

  6. Preliminaries  In the most common power-attenuation model - The transmission power between node u and v is denoted as - All receivers have the same power threshold for signal detection  We assume that - Each mobile host has a low-power GPS receiver - Initially all the nodes are operated at full transmitter power ─ the resulted graph G is a unit-disk graph (denoted as UDG (V)) transmitter power t ||uv|| + rp(u,v) receiver power

  7. Preliminaries (cont.)  Hereinafter we use G to present a wireless ad hoc network - The edge weight is defined as w(u, v) = t||uv|| + rp(u,v) - We also call G the transmission graph  A path from node u to node v is denoted as  The total transmission power of this path is (u, v) = v0v1…vh-1vh where u = v0 and v = vh

  8. Transmission Power Assignment  A transmission power assignment on the vertices is a function f from V into real numbers  Given a graph H = (V’, E’) , the transmission power assignment f is induced by H if for each node v V’,  The total transmission power of f is defined as A transmission power assignment f is complete if the associated graph Gf is strongly connected

  9. Minimum-Energy Path  Given a communication graph H G, the minimum-energy path between node u and node v, denoted by Hmin(u, v), is a path whose total transmission power is the minimum among all paths that connect (u, v) in H  Let pH(u, v) stand for p(Hmin(u, v)), the power stretch factor of H with respect to G is defined as

  10. Related Works Our major work is to develop a localized topology control algorithm where each node makes a decision about its transmission power based on only its local information  The two widely used energy conservation approaches in literature are to - Reduce the total transmission power - Reduce the power stretch factor  However, these two approaches may offset each other

  11. Related Works (cont.)  The problem of finding a complete f whose total transmission power is the minimum among all of the complete assignments is called the min-total assignment problem  The min-total assignment problem is NP-hard when the nodes are deployed in a d-dimensional space, d 2  The general structure of the minimum-power topology for rp  0 is still unknown

  12. Basic Ideas  The proposed algorithm is based on the following ideas - First construct a connected subgraph H = (V, E’) - Assure that the power stretch factor of H is bounded - The total transmission power is then minimized as much as possible  We use the local information of each node to excise some links of G while still keeps the power stretch factor being bounded by a predetermined value cb

  13. p3 p3 p2 p2 p1 p1 p4 p4 p5 p5 p6 p6 p7 p7 Our Localized Topology Control Algorithm  The proposed algorithm consists of two phases - Phase I: Local shortest tree construction - Phase II: Path search replacement A simple illustrative example is shown below p3 p2 p1 p4 p5 p6 p7

  14. Phase I of the Proposed Algorithm  Definition 1 (Local Topology View) The local topology view of node u, LTV (u, k) = (V’, E’)), is a subgraph of G such that (1) viV’ if the hop distance between vi and u is no more than k (2) (vi, vj) E’ if both vi and vj belong to V’  Suppose that a subgraph of G is associated with a transmission power assignment f - For each node u, if link (u, v) satisfies w (u, v) = f (u) then (u, v) is called a critical link of u

  15. Phase I of the Proposed Algorithm (cont.)  Each node u individually applies Dijkstra’s algorithm to get the shortest-paths from the source u to the other nodes in LTV (u, 1)  The local shortest path tree of node u (denoted by LSPT (u)) can thus be obtained  DC (u) = {vV’ | h (LSPT (u), v) = 1}, where h (LSPT (u), v) is the height of a child node v in LSPT (u)  Node u then deletes the edges {(u, w) | wDC (u)}  The topology generated is denoted as GI

  16. Phase II of the Proposed Algorithm  For each node u, its transmission power could be further reduced by trying to eliminate the critical links that are replaceable with alternative paths  For each critical link (u, v), node u tries to search another path that reaches node v based on LTV (u, k) - We call such path the replacing path of (u, v) - The entire replacing paths of node u is denoted as RP (u)  The searching procedure is applying Dijkstra’s algorithm again on LTV (u, k)

  17. Phase II of the Proposed Algorithm (cont.) If no such path exists or no replacing path has transmission power  cb  w (u, v) - The search process is ended - RP (u) is set as an empty list - ps (u) is set to 0  The priority of node u is a pair pri(u) = <ps(u), ID(u)> - pri(v1) = (ps(v1), ID1), pr (v2) = (ps(v2), ID2) - pri(v1) > pri(v2) if ps(v1) > ps(v2)  (ps(v1) = ps(v2) ID1 < ID2) The above procedure for deciding RP (u) starts if node u has the highest priority in its k-hop neighborhood

  18. Phase II of the Proposed Algorithm (cont.)  After Phase I, each node deletes its uni-directional links and the resulting topology is denoted as GII  The constructed topology after Phase II is denoted as GIII  A simple heuristic for further decreasing the total transmission power is also proposed

  19. Important Properties  The minimum-energy path between any two nodes in G is preserved in GI The minimum-energy path between the two end nodes of each deleted link in GI is preserved in GII GII preserves the network connectivity of G is bounded by cb GIII preserves the network connectivity of G and has a bounded power stretch factor cb

  20. Dealing with Mobility  We also consider the case of modest movement of the nodes  It would be extremely difficult for a topology control algorithm to even effectively guarantee network connectivity if network topology changes too fast  As mentioned in previous works, node movement can be viewed as two events, namely nodeaddition and nodedeletion  In our case, however, at the beginning of each beacon interval each node u should check if there is a change in transmission radius after deciding the new logical links

  21. Performance Comparisons  We compared the performance via extensive simulations  We observe the following metrics of each constructed topology H - Total transmission power (denoted by tpc) - Power stretch mean (denoted by psm) - The maximum power stretch factor (denoted by maxpsf) - The variance of transmission power (denoted by var tp) - Average node degree (denoted by avg nd) - The maximum node degree (denoted by max nd)

  22. Simulation Results The Performance Measurements with s = 1 The Performance Measurements with s = 3 The Performance Measurements with s = 5 The Performance Measurements with s = 7

  23. Network topologies constructed by various algorithms I SMEN UDG GG AMST

  24. Network topologies constructed by various algorithms II ESPT1 LMST ESPT2, cb = 1.5 ESPT2, cb = 2.0

  25. Conclusions  In this paper we develop a localized algorithm that requires only local information for constructing a logical topology on a given unit disk graph  The topology constructed by our algorithm has several desired features such as bounded power stretch factor, low total power consumption, and small variance of transmission power  The simulation results show that our algorithm outperforms others in terms of various important metrics

  26. Future Research • Power-aware topology control • Topology control of ad-hoc networks in three-dimensional space • Secure topology control algorithm • Applications in overlay control for P2P communications

  27. Thanks for Your Attention

More Related