• 沒有找到結果。

Fig. 5. Twelve different ways of labeling H graph

Counting the number of exposed-terminal sets is equivalent to counting the number of labeled subgraph H (See Table 2). There are

⎟⎟⎠

⎜⎜ ⎞

⎛ 4

n ways to select four from n elements. Each

has 2

2 4⎟⎟⎠×

⎜⎜ ⎞

=12 ways in forming the subgraph H (Figure 5).

Computing Subgraph Probability of Random Geometric Graphs 469

RGGs. We also believe that the techniques developed in the paper can be exploited to conduct quantitative analysis on other fundamental properties of wireless ad hoc networks.

We would like to thank Dr. Jau-Ling Shih for her invaluable help.

Acknowledgements

References

1. Christian Bettstetter, “On the minimum node degree and connectivity of a wireless multi-hop network,” MobiHoc, 2002, pp. 80-91.

2. V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, “MACAW: a media access protocol for wireless LANs,” ACM SIGCOMM, 1994, pp. 212-215.

3. B. Bollobas, Random Graphs, London: Academic Press, 1985.

4. J. A. Bondy and U. S. R. Murty, Graph Theory with Applications, Macmillan Press, 1976.

5. Josh Broth, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,”

Mobicom, 1998, pp. 85-97.

6. C.-L. Chang and R. C. T. Lee, Symbolic Logic and Mechanical Theorem Proving, Academic Press, New York, 1973.

7. B. N. Clark, C. J. Colbourn, and D. S. Johnson, “Unit disk graphs,” Discrete Mathematics, vol. 86, pp. 165-177, 1990.

8. Bevan Das and Vaduvur Bharghavan, “Routing in ad-hoc networks using minimum connected dominating sets,” IEEE International Conference on Communications, 1997, pp. 376-380.

9. J. Díaz, M. D. Penrose, J. Petit, and M. Serna, “Convergence theorems for some layout measures on random lattice and random geometric graphs,” Combinatorics, Probability, and Computing, No. 6, pp. 489-511, 2000.

10. J. Díaz, M. D. Penrose, J. Petit, and M. Serna, “Approximating layout problems on random geometric graphs,” Journal of Algorithms, vol. 39, pp. 78-116, 2001.

11. J. Díaz, J. Petit, and M. Serna, “Random geometric problems on [0, 1]2, “Lecture Notes in Computer Science, vol. 1518, Springer-Verlag, New York/ Berlin, 1998.

12. O. Dousse, P. Thiran, and M. Hasler, “Connectivity in ad-hoc and hybrid networks,”

Infocom, 2002.

13. P. Erdös and A. Rénye, “On Random Graphs I,” Publ. Math. Debrecen, vol. 6, pp. 290-297, 1959.

14. C. Fullmer and J. Garcia-Luna-Aceves, “Solutions to hidden terminal problems in wireless networks,” ACM SIGCOMM, 1997, pp. 39-49.

15. E.N. Gilbert, “Random Graphs,” Ann. Math. Stat., vol. 30, pp. 1141-1144, 1959.

16. M. C. Golumbic, Algorithmic Graph Theory and Perfect Graphs, Academic Press, New York, 1980.

17. A. Gräf, M. Stumpt, and G. Weiβenfels, ”On coloring unit disk graphs,” Algorithmica, vol. 20, pp. 277-293, 1998.

Many interesting subgraph probabilities and their applications in MANETs are still uncovered. For example, we are now interested in accurately estimating the diameter of

1. The occurrences of two distinct edges in RGG are independent.

2. The occurrences of three or more distinct edges in RGG are dependent.

3. Probabilities of some specific subgraphs in RGG can be estimated accurately.

22. T. Hou and V. Li, “Transmission range control in multihop packet radio networks, “IEEE Transaction on Communications, vol. 34, pp. 38-44, 1986.

23. C.-F. Hsin and M. Liu, “Network coverage using low duty-cycled sensors: Random and coordinated sleep algorithm,” International Symposium on Information Processing in Sensor Networks, 2004.

24. S. Khurana, A. Kahol, S. K. S. Gupta, and P. K. Srimani, “Performance evaluation of distributed co-ordination function for IEEE 802.11 wireless LAN protocol in presence of mobile and hidden terminals,” International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 1999, pp. 40-47.

25. S. Khurana, A. Kahol, and A. Jayasumana, “Effect of hidden terminals on the performance of the IEEE 802.11 MAC protocol,” Proceedings of Local Computer Networks Conference, 1998.

26. L. Kleinrock and J. Silvester, “Optimum transmission radii for packet radio networks or why six is a magic number,” Proc. IEEE National Telecom. Conf., 1978, pp. 4.3.1-4.3.5.

27. S.-J. Lee and M. Gerla, “AODV-BR: Backup routing in Ad hoc Networks,” IEEE Wireless Communications and Networking Conference, 2000, vol. 3, pp. 1311-1316.

28. Edgar M. Palmer, Graphical Evolution: An Introduction to the Theory of Random Graphs, New York: John Wiley and Sons, 1985.

29. Mathew D. Penrose, Random Geometric Graphs, Oxford University Press, 2003.

30. M. D. Penrose, “A strong low for the longest edge of the minimal spanning tree,” The Annals of Probability, vol. 27, no. 1, pp. 246-260, 1999.

31. M. D. Penrose, “The longest edge of the random minimal spanning tree,” The Annals of Applied Probability, vol. 7, no. 2, pp. 340-361, 1997.

32. M. D. Penrose, “On k-connectivity for a geometric random graph,” Random structures and Algorithms, vol. 15, no. 2, pp. 145-164, 1999.

33. T. K. Philips, S. S. Panwar, and A. N. Tantawi, “Connectivity properties of a packet radio network model,” IEEE Transactions on Information Theory, pp. 1044-1047, 1989.

34. P. Piret, “On the connectivity of radio networks,” IEEE Transactions on Information Theory, pp. 1490-1492, 1991.

35. G. J. Pottie and W. J. Kaiser, “Wireless integrated network sensors,” Commun. ACM, vol.

43, no. 5, pp. 51–58, May 2000.

36. V. Ravelomanana, “Extremal Properties of three-dimensional sensor networks with applications,” IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 246-257, 2004.

37. F. S. Roberts, “Indifference graphs,” in Proof Techniques in Graph Theory, F. Harary (editor), Academic Press, New York, pp. 139-146, 1969.

38. E.M. Royer and C-K Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,“ IEEE Personal Communication, pp. 46-55, 1999.

39. Paolo Santi and Douglas M. Blough, “The critical transmitting range for connectivity in sparse wireless ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 25-39, 2003.

40. Paolo Santi and Doulas M. Blough,”A probabilistic analysis for the radio range assignment problem in ad hoc networks,” MobiHoc, 2001, pp. 212-220.

20. Peter Hall, Introduction to the Theory of Coverage Process, John Wiley and Sons, New York, 1988.

21. Paul G. Hoel, Sidney C. Port, and Charles J. Stone, Introduction to Probability Theory, Houghton Mifflin Company, Boston, Mass., 1971.

18. P. Gupta and P. R. Kumar, “Critical power for asymptotic connectivity in wireless networks,” Stochastic Analysis, Control, Optimization and Applications, pp. 547-566, 1998.

19. P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 388-404, 2000.

Computing Subgraph Probability of Random Geometric Graphs 471

46. J. Wu and H. Li, “Domination and its application in ad hoc wireless networks with unidirectional links,” International Conference on Parallel Processing, 2000, pp. 189 – 197.

47. F. Xue and P. R. Kumar, “The number of neighbors needed for connectivity of wireless networks,” Wireless Networks, vol. 10, pp. 169-181, 2004.

48. K. J. Yang, On the Number of Subgraphs of a Random Graph in [0, 1]d, Unpublished D.Phil. thesis, Department of Statistics and Actuarial Science, University of Iowa, 1995.

49. L.-H. Yen and C. W. Yu, “Link probability, network coverage, and related properties of wireless ad hoc networks,” The 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004, pp. 525-527.

50. C. W. Yu, L.-H. Yen, and Yang-Min Cheng, “Computing subgraph probability of random geometric graphs with applications in wireless ad hoc networks,” Tech. Rep., CHU-CSIE-TR-2004-005, Chung Hua University, R.O.C.

51. Chang Wu Yu, Li-Hsing Yen, Kun-Ming Yu, and Zhi Pin Lee, “An Ad Hoc Routing Protocol Providing Short Backup Routes,” Eighth IEEE Internation Conference on Communication Systems, 2002, Singapore, pp.1052-1056.

52. Kun-Ming V. Yu, Shi-Feng Yand, and Chang Wu Yu, “An Ad Hoc Routing Protocol with Multiple Backup Routes,” Proceedings of the IASTED International Conference Networks, Parallel and Distributed Processing, and Applications, 2002, pp. 75-80.

53. The Bluetooth Interest group,” http://www.bluetooth.com.”

43. J. Stewart, Calculus, 4th ed., Gary W. Ostedt, 1999.

44. H. Takagi and L. Kleinrock, “Optimal transmission ranges for randomly distributed packet radio terminals,” IEEE Transaction on Communications, vol. 32, pp. 246-257, 1984.

45. F. Tobagi and L. Kleinrock, “Packet switching in radio channels, Part II-The hidden terminal problem in carrier sense multiple access and the busy tone solution,” IEEE Trans.

Commun., vol. COM-23, no. 12, pp. 1417-1433, 1975.

41. D. Shukla, L. Chandran-Wadia, and S. Iyer, “Mitigating the exposed node problem in IEEE 802.11 ad hoc networks,” International Conference on Computer Communications and Networks, 2003, pp. 157-162.

42. K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, “Protocols for self-organization of a wireless sensor network, ” IEEE Personal Commun., vol. 7, no. 5, pp. 16–27, Oct. 2000.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst.(in press)

Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/dac.848

Energy optimization for chain-based data gathering in wireless sensor networks

Li-Hsing Yen1,*,y, Ming-Zhou Cai2, Yang-Min Cheng2 and Ping-Yuan Yang2

1Department of Computer Science and Information Engineering, National University of Kaohsiung, Taiwan 811, ROC

2Department of Computer Science and Information Engineering, Chung Hua University, Hsinchu, Taiwan 300, ROC

SUMMARY

This paper aims to minimize energy expense for chain-based data gathering schemes, which is essential to prolong the operation lifetime of wireless sensor networks. Energy expense in chain-based data gathering schemes consists of two parts. One corresponds to inter-sensor communications and depends on chain structure. The other corresponds to leader-BS (base station) communications and depends on leader scheduling policy. To optimize inter-sensor communications, the notion of virtual chain is utilized, where an edge may correspond to a multi-hop data propagation path to conserve power. In contrast, an edge in previous work can only be a costly direct communication link. To optimize leader-BS communications, a leader scheduling rule is presented, where the node with the maximum residual power will be selected to be the leader of the chain. In contrast, nodes in previous work act as leaders by turns, resulting in non-uniform energy consumption among sensors. Simulation results show that our strategies are nearly optimal in terms of power conservation. Copyright # 2006 John Wiley & Sons, Ltd.

Received 30 December 2005; Revised 7 June 2006; Accepted 30 June 2006

KEY WORDS: wireless sensor networks; energy consumption; data gathering; logical chain

相關文件