• 沒有找到結果。

Adaptive Topology Control for Mobile Ad Hoc Networks

N/A
N/A
Protected

Academic year: 2021

Share "Adaptive Topology Control for Mobile Ad Hoc Networks"

Copied!
8
0
0

加載中.... (立即查看全文)

全文

(1)

Adaptive Topology Control for Mobile

Ad Hoc Networks

Andy An-Kai Jeng and Rong-Hong Jan, Senior Member, IEEE Computer Society

Abstract—In MANETs, mobile devices are usually powered by batteries with limited energy supplies. Topology control is a promising approach, which conserves energy by either reducing transmission power for each node or preserving energy-efficient routes for the entire network. However, there is empirically a trade-off between the energy efficiency of the nodes and routes in a topology. Besides, it may consume considerable energy to maintain the topology due to node mobility. In this paper, we propose an adaptive topology control protocol for mobile nodes. The protocol allows each node to decide whether to support energy-efficient routing or conserve its own energy. Moreover, it can drastically shrink the broadcasting power of beacon messages for mobile nodes. We prove that any reconstruction and change of broadcasting radius converge in four and five beacon intervals, respectively. The experimental results show that our protocol can significantly reduce the total energy consumption for each successfully transmitted packet, and prolong the life times of nodes, especially in high mobility environments.

Index Terms—Mobile ad hoc network, topology control, energy-efficient protocol, distributed system.

Ç

1

I

NTRODUCTION

T

HEcontinuing developments in mobile ad hoc networks (MANETs) have led to many available applications in commercial, military, and educational areas. Nodes can communicate through wireless carries without any wired connection, thereby enhancing conventional deployment. However, mobile devices are usually powered by limited energy supplies, where a continuing recharging could be hardly attainable. Hence, a substantial body of research has been devoted to conserving energy in MANETs.

The topology control is an important approach to conser-ving energy [1], which aims at determining a set of wireless links among nodes so as to achieve certain energy-efficient properties. Generally speaking, it can reduce the energy consumption in two ways.

1. Reduce energy consumption of nodes. In wireless net-works, the power required to transmit from one node to another is considerable, and could be exponentially grown by their distance [2]. Thus, to conserve a node’s energy, the transmission radius should be confined to cover closer neighbors only in the underlying topol-ogy. On the other hand, nodes are responsible for relaying messages in MANETs. If the loads are overly concentrated on a certain node, the node’s energy could be quickly drained out. Keeping a lower node degree (the number of links connected to a node) can prevent a node from relaying for too many sources [3]. 2. Reduce energy consumption of routes. In MANETs, communication is typically conducted by relaying

messages through some paths. During the relaying process, each node on a path should transmit at sufficient power to cover the next hop. Therefore, the path with smaller total transmission power, called an energy-efficient route, should be preserved for any possible communication pair while control-ling the topology.

Overall, the energy efficiencies of nodes and routes are equally important. The living time of an individual node can be prolonged, if the node degree (transmission radius) is reduced to consume less energy. Moreover, the total energy consumption for the global wide communication can be saved by preserving more energy-efficient routes. Nevertheless, there is empirically a trade-off. To reduce the transmission radius or node degree, some links constituting an energy-efficient route could be sacrificed.

To address the trade-off, we have proposed a flexible structure, called the r-neighborhood graph, in our recent studies [4], [5], [6]. As shown in Fig. 1, given two nodes u and v, and a parameter 0  r  1, we define the region (the shaded area) intersected by two open disks centered, respectively, at u and v with the radius of their distance dðu; vÞ and an open disk centered at the middle point m with the radius l ¼ ðdðu; vÞ=2Þð1 þ 2r2Þ1=2

as the r-neighborhood region of u and v, denoted as NRrðu; vÞ. The r-neighborhood

graph of a set of nodes V , denoted as NGrðV Þ, consists of an

edge uv if and only if NRrðu; vÞ contains no other node in V .

The energy consumption between nodes and routes in this graph can be balanced by adjusting the parameter r. By increasing r, the radius and degree of each node become smaller. On the contrary, more energy-efficient routes can be found by reducing r. In particular, when r ¼ 1 the node degree is not greater than 6, and the optimal energy-efficient routes are preserved when r ¼ 0. More importantly, each node can asynchronously determine its links in this graph using the positions of its one-hop neighbors. In other words, the construction is fully distributed and localized.

. The authors are with the Department of Computer Science, National Chiao Tung University, Hsinchu 300, Taiwan, R.O.C.

E-mail: {andyjeng, rhjan}@cis.nctu.edu.tw.

Manuscript received 15 July 2010; revised 13 Dec. 2010; accepted 7 Feb. 2011; published online 18 Feb. 2011.

Recommended for acceptance by P. Santi.

For information on obtaining reprints of this article, please send e-mail to: tpds@computer.org, and reference IEEECS Log Number TPDS-2010-07-0426. Digital Object Identifier no. 10.1109/TPDS.2011.68.

(2)

However, the r-neighborhood graph was primarily de-signed for stationary nodes. When applied to mobile environments, more attention should be paid to nodes’ mobility. Besides, for theoretical interest, the power con-sumption model was simplified in our previous works. The simplification may overlook some facts in reality. For these reasons, our goal is to extend the concept of the r-neighbor-hood graph to a more realistic network. To achieve this purpose, we make the following contributions in this paper. 1. Generalized power consumption model. In [4] and [5], we assumed the power consumed at the receiver is negligible. Besides, the path loss is specific to free space environments, where no obstacle or reflection exists. In this paper, we generalize the r-neighbor-hood graph to a more realistic power consumption model proposed by Rodoplu and Meng [7]. Both the receiving cost and the general path loss exponent are considered in this model.

2. Extended parameter set. Although the energy con-sumption can be adjusted through the parameter r, the desired value of r would be varied for different nodes. For example, a node with less energy would prefer a larger r to reduce its own transmission radius or node degree, while a smaller r would be preferred, if the node has surplus energy to perform relaying for other communication pairs. In other words, an identical r cannot provide the most appropriate settings for all nodes. Therefore, we extend the r-neighborhood graph so that each node uhas the flexibility to configure its own ru.

3. Energy-efficient maintenance protocol. To maintain the topology for mobile nodes, each node has to periodically broadcast a beacon to denote its new position. It may consume considerable energy, if the broadcasting power is large. We design an energy-efficient maintenance protocol, named the Adaptive Neighborhood Graph-based Topology Control (ANGTC). The ANGTC can drastically shrink the broadcasting power for each periodic beacon. Moreover, we prove that any reconstruction can be done in 4, where  is the beacon interval.

4. Adaptive configuration rule. In [6], we turned the value of r to find the minimal energy consumption using simulation. But there was no discussion about how to adjust r in a decentralized matter. Moreover, the settings of different ru’s could be more complicated.

Therefore, this paper proposes an adaptive config-uration rule inside the ANGTC to configure the parameter ru for each node u. The rule aims at

achieving balanced energy consumption between nodes and routes, and improving the stability of the topology.

For a detailed introduction to the r-neighborhood graph and its challenges in mobile environments, readers can refer to Appendices A.1, A.2, and A.3, which can be found on the Computer Society Digital Library at http:// doi.ieeecomputersociety.org/10.1109/TPDS.2011.68.

The rest of this paper is organized as follows: Section 2 specifies the network model and measurements. Section 3 defines the graphic structures and analyzes their proper-ties. The protocol and configuration rule are investigated in Sections 4 and 5, respectively. Section 6 presents a series of simulation results. Concluding remarks are given in the last section. The proof of any property shown in this paper can be found in Appendix F, which can be found on the Computer Society Digital Library at http:// doi.ieeecomputersociety.org/10.1109/TPDS.2011.68.

2

N

ETWORK

M

ODEL AND

M

EASUREMENTS

Given a deployment region @, a set V of n nodes is distributed on @. Each node u 2 V can obtain its location LocðuÞ on @ using a lower power GPS. Besides, the power consumption follows the path loss model [2]. More specifi-cally, let pmaxðuÞ denote the maximum transmission power

of a node u. Node u can transmit to another node v only if tdðu; vÞ pmaxðuÞ, where dðu; vÞ is the euclidean distance

between u and v,  is an exponent depending on the environment [2], and t is the predetection threshold (in mW) at the receiver side, t > 0. The network can be represented as a digraph GmaxðV Þ, where a directed edge

uv2 GmaxðV Þ if and only if tdðu; vÞ pmaxðuÞ. In addition,

node v needs additional c power to receive from u. Therefore, the least power required for a transmission from uto v in this model is c þ tdðu; vÞ [7].

Generally speaking, the topology control is to determine a subgraph of GmaxðV Þ. Consider a controlled topology

GðV Þ. The transmission radius and degree of a node u in GðV Þ are defined, respectively, as

TuðGðV ÞÞ ¼ maxuv2GðV Þdðu; vÞ; ð1Þ

DuðGðV ÞÞ ¼ jfv 2 V juv 2 GðV Þgj: ð2Þ

Let ðu; vÞ ¼ v0v1   vh1vh denote a path connecting two

nodes u and v, where v0¼ u and vh¼ v. The total

transmission power required to relay on ðu; vÞ is Pððu; vÞÞ ¼X

h i¼1

½c þ tdðvi1; viÞ: ð3Þ

In worse-case situations, the energy efficiency of nodes is measured by the maximum node degree, DmaxðGðV ÞÞ, and the

energy efficiency of routes being preserved is measured by the power stretch factor [3]

ðGÞ ¼ maxuv2V Pð GðV Þðu; vÞÞ PG maxðV Þðu; vÞ ;

where GðV Þðu; vÞ is the path with the least total transmis-sion power between u and v in GðV Þ.

(3)

3

G

RAPHIC

S

TRUCTURES

In this section, we first generalize the r-neighborhood graph to a more realistic power consumption model and variant ru’s. Then, an equivalent structure is defined to facilitate the

design of an energy-efficient maintenance protocol in the next section.

3.1 Generalization

First of all, we define the following region under the power consumption model P ðuvÞ ¼ c þ tdðu; vÞ, for any two nodes u and v.

Definition 1.Given two nodes u and v on @, and 0  r  1, the general r-neighborhood region of u and v is defined as

NRrðu; vÞ ¼ x2 @ : dðu; xÞ < dðu; vÞ; dðv; xÞ < dðu; vÞ; PðuxvÞ < P ðuvÞð1 þ rÞ 8 < : 9 = ;:

Fig. 2 shows the general r-neighborhood region (the shaded regions) of two nodes u and v. Compared with Fig. 1, we can see that NRrðu; vÞ and NRrðu; vÞ are only

diverse in their third conditions, which correspond to an inner circle and an inner ellipse, respectively. The condition indicates that the total power required by relaying through any node w in NR

rðu; vÞ (i.e., ðu; vÞ ¼ uwv) is not worse

than ð1 þ rÞ times of a direct transmission from u to v.

Based on this region, the graph with variant ru’s is

defined as follows.

Definition 2. Given a set V of n nodes on @, a set fr:frv1; rv2; . . . ; rvng, 0  rvi  1, the general fr

-neighbor-hood graph of V , denoted as NG

frðV Þ, has an edge uv if and

only if uv 2 GmaxðV Þ and there is no other node w such that

LocðwÞ 2 NR

ruvðu; vÞ, where ruv¼ maxfru; rvg.

A three-node example of NGfrðV Þ is depicted in Fig. 3.

The regions with respect to ru, rv, and rv0 are filled with

gray, twill, and white, respectively. We can see that the gray area determines edge uv0because r

v0< ru, while edge uv is

determined by the twilled area because ru< rv. That is, the

presence of an edge is now determined by the larger one of the two sides, instead of an identical r.

Let NG

frjru¼r0represent the case where the parameter of a

node u is fixed on a ratio r0. We have the following monotonic

property with respect to each ru(see Appendix F.1, which

can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/TPDS.2011.68 for the proof).

Property 1. Given a set V of n nodes on @, for any fr :frv1;

rv2; . . . ; rvng, and 0  r1 r2 1, 1. DuðNGfrjru¼r2Þ  DuðNGfrjru¼r1Þ, 8u 2 V ; 2. TuðNGfrjru¼r2Þ  TuðNGfrjru¼r1Þ, 8u 2 V ; 3. Pð NG frjru ¼r1ðs; tÞÞ  P ð  NG frjru¼r2ðs; tÞÞ, 8s; t 2 V .

We can see that no matter what the values of other parameters in fr are taken, a node u can conserve its own

energy by choosing a larger ru, i.e., reducing its

DuðNGfrðV ÞÞ and TuðNG



frðV ÞÞ. On the contrary, if node u

has sufficient energy, it can just choose a smaller ru to

support more energy-efficient routing, i.e., reducing Pð

NG

frðV Þðs; tÞÞ, for any possible communication pair of s

and t. Let NG

rðV Þ denote the case where ru¼ r for any

u2 V . The worst-case performance for an identical r is presented below (proven in Appendix F.2, which can be found on the Computer Society Digital Library at http:// doi.ieeecomputersociety.org/10.1109/TPDS.2011.68). Property 2.Given a set V of n nodes on @, for any 0  r  1,

1. DmaxðNGrðV ÞÞ  d= sin1ðr=2Þe, if c ¼ 0;

2. ðNG

rðV ÞÞ  1 þ rðn  2Þ.

Property 2(2) shows that the graph preserves the upper bound of the power stretch factor as proven in [8], even if it is now defined under a general power consumption model. On the other hand, the node degree’s bound in [8] is also preserved in Property 2(1), but it is restricted to the case where the receiving cost is negligible, i.e., c ¼ 0. However, the new structure can result in a much lower degree and shorter transmission radius for c > 0 in an average sense, especially when the path loss exponent  is large (see the numerical results in Appendix D.1, which can be found on the Computer Society Digital Library at http://doi. ieeecomputersociety.org/10.1109/TPDS.2011.68).

For the case of variant ru’s, the two upper bounds in

Property 2 are clearly determined by the largest and smallest ru’s in fr, denoted as rmin and rmax, respectively.

Therefore, it is easy to infer that DmaxðNGfrðV ÞÞ  d= sin 1ðr rmin=2Þe; if c ¼ 0; and ðNGfrðV ÞÞ  1 þ r  maxðn  2Þ:

Fig. 2. The general r-neighborhood region of u and v.

Fig. 3. General fr-neighborhood graph of nodes v0, u, and v, where

(4)

Finally, the property below shows that our structure is symmetric and connected (the proof is in Appendix F.3, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/ TPDS.2011.68). A topology is symmetric if the presence of an edge implies that its inverse exists, which is important, since the designs of many network primitives, such as collision avoidance, would become very complicated if links are asymmetric. Moreover, connectivity is unques-tionably the prerequisite in any network.

Property 3. Given a set V of n nodes on @, for any fr:frv1; rv2; . . . ; rvng,

1. NGfrðV Þ is symmetric; 2. NGfrðV Þ is connected.

The relationship between NGrðV Þ and NGfrðV Þ is as

follows (see Appendix F.4, which can be found on the Computer Society Digital Library at http://doi.ieeecompu tersociety.org/10.1109/TPDS.2011.68, for the proof). Property 4.Given a set V of n nodes on @, for any 0  r  1, if

c¼ 0,  ¼ 2, and ru¼ r for any u 2 V ,

NGf

rðV Þ  NGrðV Þ:

We can see that the two structures are equivalent when ¼ 2 and c ¼ 0. In other words, NG

frðV Þ is a general

structure of NGrðV Þ in terms of  and c.

3.2 Equalization

Now, we present an equivalent structure of the general fr

-neighborhood graph, called the general fr-enclosed graph.

The basic idea is borrowed from the enclosed graph, proposed by Rodoplu and Meng [7].

First, we define a duality1of the general r-neighborhood region.

Definition 3.Given two nodes u and w on @, 0  r  1,   2, the general r-relaying region of u and w is defined by

RRrðu; wÞ ¼ x2 @ : dðu; wÞ < dðu; xÞ; dðw; xÞ < dðu; xÞ; PðuwxÞ < P ðuxÞð1 þ rÞ 8 < : 9 = ;:

A region, enclosed by the complements of the general r-relaying regions, is given as follows.

Definition 4.Given a set V of nodes on @, the general r-enclosed region of a node u is defined by

ERrðuÞ ¼ \

uw2GmaxðV Þ

f@ \ RmaxðuÞ  RRrðu; wÞg:

Based on the region, the graph is defined below. Definition 5. Given a set V of n nodes on @, a set fr:frv1;

rv2; . . . ; rvng, 0  rvi 1, the general fr-enclosed graph of V ,

denoted as EG

frðV Þ, has an edge uv if and only if uv 2

GmaxðV Þ and LocðvÞ 2 ERruvðuÞ, where ruv¼ maxfru; rvg.

Fig. 4 shows the fr-enclosed region of a node u (white

area), which is enclosed by the four r-relaying regions (dark areas) of u with surrounding nodes v, v0, v00, and w (the

darker areas are overlapped by two or more regions). We can see that a node has a link from u if and only if it is located in the fr-enclosed region of u. To see how ru

changes the shapes of our defined regions, readers can refer to Appendix B.2, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety. org/10.1109/TPDS.2011.68, for further illustration.

Now we show that the two structures are equivalent (See Appendix F.5, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/ 10.1109/TPDS.2011.68, for the proof).

Property 5. Given a set V of n nodes on @, for any fr:frv1; rv2; . . . ; rvng, 0  rvi  1,

NGf

rðV Þ  EG

 frðV Þ:

4

E

NERGY

-E

FFICIENT

M

AINTENANCE

Based on the equivalence in Property 5, in this section, we design an energy-efficient maintenance protocol for the general fr-enclosed graph.

4.1 The ANGTC Protocol

The main idea of this protocol is to utilize the information partially received from nearby nodes to confine the broad-casting radiuses of subsequent beacons.

In every time interval of , each node broadcasts a beacon at a certain radius to nearby nodes. Consider a node u. Let Sudenote the set of nodes detected by u during the

previous  time. Similar to Definition 4, we define ERrðujSuÞ as the general r-enclosed region of u based on

nodes in Su, i.e., ERrðujSuÞ ¼ \ w2Su @ \ RmaxðuÞ  RRrðw; vÞ   : ð4Þ The set of nodes in Subeing enclosed by node u in EGfrðV Þ

is specified as

Nu¼ fv 2 SujLocðvÞ 2 ERruvðujSuÞg: ð5Þ Fig. 4. General fr-enclosed graph of a node u, where c¼ 0,  ¼ 2, and

ru, rv, rv0, rv00are all set as 1.

1. See Appendix B.1, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/ TPDS.2011.68, for two comparisons that explain the dual relationship between the two regions.

(5)

In addition, we denote u as the least radius covering

ERruðujSuÞ, i.e.,

u¼ maxfdðu; xÞjx 2 ERruðujSuÞg: ð6Þ

With the definition in (6), for any node v in Su, if u is within

the radius v of v which covers ERrðvjSvÞ, then v will be

included in a nodes set Bu. This is,

Bu¼ max v 2 Sf ujdðu; vÞ < vg: ð7Þ

The radius covering all nodes in Buis specified by

u¼ max dðu; vÞjv 2 Bf ug: ð8Þ

Then, in the next maintenance process, node u will broadcast its current position LocðuÞ, u, and ru using the

beacon to nearby nodes at the radius Mu, where

Mu¼ max f u; ug: ð9Þ

On the other hand, if node u cannot receive the beacon from a node v over a beacon interval , the information about v will be discarded. In other words, for every maintenance process, the broadcasting radius Mu of u is

adjusted to cover both the area in ER

rðSuÞ and all nodes in

Bu, depending on the information received during the

previous  interval. For every  time, the value of ru will

be reconfigured and broadcasted to nearby nodes along with the periodic beacon message. The protocol, named ANGTC, is now presented below.

ANGTC PROTOCOL

An example of the ANGTC protocol is elaborately illustrated in Appendix C, which can be found on the Computer Society Digital Library at http://doi. ieeecomputersociety.org/10.1109/TPDS.2011.68.

4.2 Correctness and Convergency

Now, we discuss the correctness and convergency of the ANGTC protocol. We show that after nodes’ placement changes, the neighbor set Nuand maintenance radius Muof

each node u can be correctly recalculated and converged to a stable status in constant time.

We assume that the propagation delay and computation time are relatively small in comparison with  and the starting points of every time interval among nodes are aligned (i.e., a synchronous network). Without loss of generality, we consider the case of  ¼ 1 henceforth. In

addition, we assume that the configuration of each ru is

temporarily fixed before the radius Muis converged. Let Xt

stand for the status of a variable X at time t, and NuðGÞ

denote the neighbor set of a node u in a graph G. The results are shown in the following property (proven in Appendix F.6, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/ 10.1109/TPDS.2011.68).

Property 6. Given a set V of nodes on @, a placement change occurs during ½t  1; t, i.e., 9u 2 V , Loct1ðuÞ 6¼ LoctðuÞ,

and there is no further change after t, i.e., 8u 2 V , k > 0, LoctðuÞ ¼ LoctþkðuÞ. If the network is synchronous, and the

parameter ruof each u 2 V is fixed after time t,

1. NuðEGfrðV ÞÞ N tþ2 u ; 2. NuðEGfrðV ÞÞ ¼ N tþk u , for any k  3; 3. Mutþ4¼ Mtþk u , for any k > 4.

Property 6(1) indicates that the ANGTC protocol can find out all links in EGfrðV Þ in 3 after a change occurs. Besides,

Properties 6(2) and (3) show that the correct neighbor set Nu

and maintenance radius Mu converge in 4 and 5,

respectively. The convergency of Muis important, because

the continuing change in broadcast radius will incur additional energy expense and latency for power switching. For an asynchronous network, after the change during ½t  1; t, each node u can receive updated positions from nearby nodes before t þ 2. Hence, the converged time is postponed by at most , i.e., 5 and 6 for Nu and Mu,

respectively.

About the communication cost, as shown in Property 3(1), since our graph is inherently symmetric, nodes are not required to exchange their neighbor lists. Thus, each message has only constant bits.

4.3 Further Power Shrinking

Although the ANGTC can reduce the beacon power, the radius Mucould be too large to cover some nodes which are

not essential for the operations. Therefore, we attempt to further shrink the radius.

Consider two nodes u and v. Let ER

rvðvjBuÞ denote the

enclosed region of v based on nodes in Bu, i.e.,

ERrðvjBuÞ ¼ \ w2Bu f@ \ RmaxðuÞ  RRrðv; wÞg: We define B0u¼ fv 2 BujERruvðvjBuÞ 6¼ ER  ruvðvjBuþ fugÞg; and 0u¼ max dðu; vÞjv 2 B0 u   :

Because B0uis a subset of Bu, 0umust be smaller than (or at

most equal to) u.

Below, we show that Property 6 is still preserved when u

is replaced by 0uin the ANGTC. Since the definition of uis

not changed, it is sufficient to prove the property below (see Appendix F.7, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/ 10.1109/TPDS.2011.68, for the proof).

(6)

Property 7. Given a set V of nodes on @, for any u 2 V and w2 S

u, u 2 B0w.

We have also conducted a numeric study for our protocol. The results show that the ANGTC can significantly reduce the average transmission radius by 5 to 60 percent. The power shrinking mechanism can further shrink the radius up to 10 percent. The detailed results can be found in Appendix D.2, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/ 10.1109/TPDS.2011.68.

5

A

DAPTIVE

C

ONFIGURATION

R

ULE

In this section, we propose an adaptive configuration rule for the ANGTC protocol. We first analyze how an individual ruaffects the overall energy efficiency from the

following three points.

1. Energy efficiency of nodes versus Energy efficiency of routes. No matter what the values of other parameters in frare, Property 1 has shown that a smaller rucan

always lead to an overall improvement in the energy efficiency of routes, and a node u can conserve its own energy by simply turning up its ru.

2. High mobility versus Low mobility. If a node moves frequently, its links are unstable, which in turn costs more energy for route reconstruction, and deteriorates the quality of the established routes. In this case, the node should keep a lower degree to reduce its dependency on nearby nodes by turning up its ru. On the contrary, if a node has lower

mobility, it should turn down its ru to construct

more reliable routes.

3. Topology maintenance power. In the ANGTC protocol, the broadcasting radius Muis not fixed. As shown in

Property 8 (proven in Appendix F.8, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/ TPDS.2011.68), it could be varied by the configura-tion of ru.

Property 8. In the ANGTC protocol, for each node u, the broadcasting radius Muis decreased by ru.

Concluding the above observations, we have two principles for adjusting ru:

1. If a node u has sufficient energy or rarely moves, it should connect with more neighbors to improve the energy efficiency as well as the stability of routes. In this case, a smaller ruis preferred.

2. If a node has insufficient energy or moves frequently, a smaller ru that leads to a lower node degree,

transmission radius, and beacon power is desired. Accordingly, the adaptive configuration rule is charac-terized as follows: ru¼ 1 Energyu EnergyF ull   we;uþ Mobilityu MobilityMax   ws;u; ð10Þ

where Energyuand Mobilityustand for the residual energy

and current mobility of node u, and EnergyF ull and

MobilityMax represent the full energy level and the

maximum mobility level, respectively. In addition, we adjust the impact from residual energy and mobility level by two weights we;u¼ 1  ðEnergyu=EnergyF ullÞ and ws;u¼

1 we;u. At the initial stage, since nodes have little deviation

in their residual energy (assuming the initial energy is equal), the mobility dominates the value of ru. As time goes

by, the impact from node’s energy will become more and more significant.

6

E

XPERIMENTS

In this section, we compare the ANGTC with existing topology control protocols for mobile nodes using the ns2 simulator [8]. For each test case, we simulated 50 networks, each with 100 nodes uniformly placed on a 1,000 meters square region. Each node has a maximum transmission radius of 500 meters and is initiated by 0.5 Joules. The 802.11b MAC is used for link-layer contention. We modify the DSDV routing protocol [9] such that packets are conveyed on the least-energy path. The connections of CBR traffic are established for 20 distinct source-destination pairs, and the packet size is 256 bytes. The energy cost consists of all network operations during the simulation. The mobility pattern is based on the random-way point model. We test three speed intervals of [0, 5], [0, 15], and [0, 30] m/s, to imitate low-speed, middle-speed, and high-speed circumstances, respectively. In addition, the pause time of each node is randomly taken from [0, 5] s. Each run lasts 200 s.

For comparison, we also implemented the following protocols in the ns2: the SMECM [10] is considered appropriate for conserving route energy. It preserves the least-energy path (i.e.,  ¼ 1) for any node pair. On the other hand, the XTC [11] is considered appropriate for conserving nodes’ energy. It confines node degrees to within 6, with connectivity guaranteed. The K-NEIGH [12] is considered resilient to node mobility. It only requires nodes to identify their K-closest neighbors instead of their precise positions. A pruning stage is proposed in [12] to revoke redundant links. We denote this version as K-NEIGH*. Here, we take K ¼ 9, which is the least value for the topology to be connected with a probability of 0.95 [12]. For more details, readers can refer to Appendix E, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/TPDS.2011.68, where we provide a review of related protocols.

Figs. 5a and 5b report the power ratio and average transmission radius for stationary nodes. The power ratio, defined as

P

u;v2VpðGðu; vÞÞ

P

u;v2VpðGmaxðu; vÞÞ

;

measures the average energy efficiency of the routes. We can see that the SMECN always preserves the optimal routes, but it compensates for a larger transmission radius. On the other hand, the power ratio of the XTC is about six percent larger than the optimal, but it has a much smaller transmission radius. The radius of K-NEIGH can be reduced significantly in the pruning stage, but it is still

(7)

slightly above than that of the XTC. However, these protocols have no flexibility as the energy level goes down with time. In contrast, the ANGTC allows nodes to adjust their ways of conserving energy. At the beginning, since each node u has full energy, according to (10), the parameter ruis close to 0, which forces node u to support

energy-efficient routing. As time goes by, ru is gradually

raised to 1 so that node u can reduce the radius to conserve its own energy.

Fig. 6a shows the number of changed links. It measures the stability of a topology under nodes’ mobility. The XTC has the least link changes, since each node only has to maintain no more than six links. The K-NEIGH* also performs well, because keeping the order of nodes is much easier than keeping the precise positions. Although the ANGTC uses positions and has more links than XTC, the stability is nearly at the same level for both of them. The reason is that our configuration rule can adaptively reduce to the degree of a node if the node moves frequently.

Fig. 6b reports the average energy consumption per successfully transmitted packet. It measures the overall energy consumption for a communication, including routing, route reconstruction, and retransmissions. In low-speed networks, since links change rarely, the energy efficiency of routes is relatively important. In this case, the SMECN is suitable. On the contrary, the XTC performs well in high-speed networks, because a large portion of energy may be consumed for advertising the link’s changes. Since the ANGTC can change link status accord-ing to node mobility, it accommodates well in both cases.

Our protocol, however, can perform even better. One possible reason is that the K-NEIGH* (and K-NEIGH) is only connected in a probability sense, while the general fr

-neighborhood graph always guarantees connectivity. Hence, our protocol requires less energy for retransmis-sions before a packet arrives successfully.

The number of living nodes with middle speed is drawn in Fig. 7 (the results are almost the same for the other two speeds). Even though the transmission radius and node degree of the ANGTC are not lowest, it still outperforms the others. This is because the enhancement of routes can also reduce the energy expenditure of nodes. In other words, the nodes’ energy synergically is conserved in these two ways.

Fig. 8 shows the ratio of the maintenance radius (power) to the maximum transmission radius (power) The results show that our protocol requires no more than 50 percent of power to maintain the topology. With this improvement, the power can be further reduced by over 20 percent. Notice that the radius (power) steadily decreases along with the depletion of node energy and slightly increases when some nodes are exhausted.

7

C

ONCLUSIONS

In this paper, we have generalized the r-neighborhood graph into a more realistic power consumption model with independent parameter ruto each node u. For mobile nodes,

we have also proposed an energy-efficient maintenance protocol to reduce the beacon power. It has been proven

Fig. 5. (a) Energy efficiency of routes. (b) Energy efficiency of nodes.

(8)

that any reconstruction and power change can coverage in four and five beacon intervals. Finally, an adaptive configuration rule is given to configure the parameter for each node based on the node’s mobility and energy levels. Experimental results show that our protocol has signifi-cantly reduced the overall energy consumption and net-work lifetime. For future research, a node may lose important information to construct the graph if a collision occurs. It is, thus, worthwhile to design a collision avoidance mechanism for the ANGTC protocol.

A

CKNOWLEDGMENTS

This research was supported in part by the National Science Council (NSC) of the ROC, under grants NSC97-2221-009-049-MY3 and NSC99-2218-E-009-007.

R

EFERENCES

[1] P. Santi, “Topology Control in Wireless Ad Hoc and Sensor Networks,” ACM Computing Survey, vol. 37, no. 2, pp. 164-194, 2005.

[2] L. Feeney, “An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks,” ACM J. Mobile Networks and Applications, vol. 6, no. 3, pp. 239-249, 2001.

[3] X.Y. Li, P.J. Wan, and Y. Wang, “Power Efficient and Sparse Spanner for Wireless Ad Hoc Networks,” Proc. 10th Int’l Conf. Computer Comm. and Networks, pp. 564-567, 2001.

[4] A.A.K. Jeng and R.H. Jan, “An Adjustable Structure for Topology Control in Wireless Ad Hoc Networks,” Proc. Int’l Conf. Wireless Network Comm. and Mobile Computing, 2005.

[5] A.A.K. Jeng and R.H. Jan, “The R-Neighborhood Graph: an Adjustable Structure for Topology Control in Wireless Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 4, pp. 536-549, Apr. 2007.

[6] A.A.K. Jeng and R.H. Jan, “An Adaptive Topology Control Scheme for Energy-Efficient Routing in Mobile Ad Hoc Net-works,” Proc. IEEE Wireless Comm. and Networking Conf., 2007. [7] V. Rodoplu and T.H. Meng, “Minimum Energy Mobile Wireless

Networks,” IEEE J. Selected Area in Comm., vol. 17, no. 8, pp. 1333-1344, Aug. 1999.

[8] Ns2 Simulator: http://www.isi.edu/nsnam/ns/, 2011.

[9] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Compu-ters,” Proc. ACM SIGCOMM, vol. 24, no. 4, pp. 234-244, 1994. [10] L. Li and J.Y. Halpern, “Minimum-Energy Mobile Wireless

Networks Revisited,” Proc. IEEE Int’l Conf. Comm., vol. 1, pp. 274-286, 2001.

[11] R. Wattenhofer and A. Zollinger, “XTC: A Practical Topology Control for Ad-Hoc Networks,” Proc. 18th Parallel and Distributed Processing Symp., pp. 26-30, 2004.

[12] D.M. Blough, M. Leoncini, G. Resta, and P. Santi, “The K-Neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 9, pp. 1267-1282, Sept. 2006.

Andy An-Kai Jeng received the BS degree in statistics from Tamkang University, Taiwan, in 2001, the MS degree in management informa-tion systems from the Nainforma-tional Chi Nan Uni-versity, Taiwan, in 2003, and the PhD degree in the computer science from National Chiao Tung University, Taiwan, in 2007, where he is currently a postdoctoral researcher. His re-search interests include wireless networks, distributed algorithm design and analysis, sche-duling theory, and operations research.

Rong-Hong Jan received the BS and MS degrees in industrial engineering and the PhD degree in computer science from the National Tsing Hua University, Taiwan, in 1979, 1983, and 1987, respectively. From 1991-1992, he was a visiting associate professor in the Department of Computer Science, University of Maryland, College Park. He joined the Department of Computer and Information Science, National Chiao Tung University, in 1987, where he is currently a professor. His research interests include wireless networks, mobile computing, distributed systems, network reliability, and opera-tions research. He is a senior member of the IEEE Computer Society.

. For more information on this or any other computing topic, please visit our Digital Library at www.computer.org/publications/dlib. Fig. 7. Number of living nodes.

數據

Fig. 1. The r-neighborhood region of u and v.
Fig. 2 shows the general r-neighborhood region (the shaded regions) of two nodes u and v
Fig. 4 shows the f r -enclosed region of a node u (white
Fig. 6a shows the number of changed links. It measures the stability of a topology under nodes’ mobility
+2

參考文獻

相關文件

In Case 1, we first deflate the zero eigenvalues to infinity and then apply the JD method to the deflated system to locate a small group of positive eigenvalues (15-20

In this paper, we propose a practical numerical method based on the LSM and the truncated SVD to reconstruct the support of the inhomogeneity in the acoustic equation with

1.5 In addition, EMB organised a total of 58 forums and briefings (45 on COS and 13 on special education) to explain the proposals in detail and to collect feedback from

Shih, “On Demand QoS Multicast Routing Protocol for Mobile Ad Hoc Networks”, Special Session on Graph Theory and Applications, The 9th International Conference on Computer Science

• However, inv(A) may return a weird result even if A is ill-conditioned, indicates how much the output value of the function can change for a small change in the

• When a call is exercised, the holder pays the strike price in exchange for the stock.. • When a put is exercised, the holder receives from the writer the strike price in exchange

• When a call is exercised, the holder pays the strike price in exchange for the stock.. • When a put is exercised, the holder receives from the writer the strike price in exchange

Cultivating a caring culture and nurturing humanistic qualities Building an ever-Learning School.. Targets Leading Key