Sunteți pe pagina 1din 8

k-Strongly Connected m-Dominating and Absorbing Set in Wireless Ad Hoc

Networks with Unidirectional Links

Ravi Tiwari Tania Mishra Yingshu Li My T. Thai


{rtiwari, tmishra}@cise.ufl.edu C.S. Department, C.I.S.E Department
C.I.S.E Department Georgia State University University of Florida
University of Florida Atlanta, GA, 30303 Gainesville, FL 32611
Gainesville, FL 32611 yli@cs.gsu.edu mythai@cise.ufl.edu

Abstract As a result, a virtual backbone has been proposed as


the routing infrastructure of a network for efficient rout-
Since there is no fixed infrastructure or centralized ing, broadcasting and collision avoidance protocols [14].
management in wireless ad hoc networks (WANs), vir- With virtual backbones, routing messages are only ex-
tual backbone has been proposed as the routing infras- changed between the backbone nodes, instead of being
tructure to alleviate the broadcasting storm problem [6]. broad casted to all the nodes. With the help of virtual
Because the virtual backbone nodes need to carry other backbone, routing is easier and can adapt quickly to net-
node’s traffic and subject to failure, it is desirable to work topology changes. It has also shown that virtual
construct a fault tolerant virtual backbone. Most recent backbones could dramatically reduce routing overhead
research has studied this problem in homogeneous net- [15]. Furthermore, using virtual backbone as forward-
works. In this paper, we propose solutions for efficient ing nodes can efficiently reduce the energy consump-
construction of a fault-tolerant virtual backbone where tion, which is also one of the critical issue in WANs.
the wireless nodes have different transmission ranges. Since the virtual backbone nodes need to carry other
Such a network can be modeled as a disk graph where node’s traffic, fault tolerance must be considered. Un-
any link between two nodes is either unidirectional or fortunately, virtual backbone is often very vulnerable
bidirectional. Since the graph is directed, we formu- due to frequent node failure and link failure, which is
late the fault tolerant virtual backbone problem as a k- inherent in wireless ad hoc networks. Therefore, con-
Strongly Connected m-Dominating and Absorbing Set structing a fault tolerant virtual backbone that continues
problem (k-m-SCDAS). We first propose two heuristics, to function during node or link failure is an important
one to construct a 1-m-SCDAS and the other one to ob- research problem, which has not studied sufficiently. In
tain a k-1-SCDAS in a directed graph. We next combine [5, 1], the authors considered this problem in Unit Disk
these two approaches to develop a general construction Graph (UDG) [16], in which all nodes have the same
of k-m-SCDAS. Through extensive simulations, we com- transmission ranges.
pare the performance of these proposed algorithms.
However, transmission ranges of all nodes in a net-
work are not necessarily equal. Nodes in a network may
have different power due to difference in functionali-
1 Introduction ties, power control to alleviate collisions, topology con-
trol to achieve a certain level of connectivity. For ex-
In wireless ad hoc networks (WANs), there is no fixed ample, in heterogeneous networks, gateway nodes may
or predefined infrastructure. Nodes in WANs commu- have higher power than other nodes. Or in some topol-
nicate via shared medium, either through a single hop ogy controlled networks, each node may adjust its trans-
communication or multi-hop relays. In order to enable mission range differently to obtain certain optimization
data transfer in such networks, all the wireless nodes goals. All these scenarios result into a WAN with dif-
need to frequently flood control messages, thus caus- ferent transmission ranges. Such a network can be mod-
ing a lot of redundancy, contentions, and collisions [6]. eled as a Disk Graph (DG) G. Note that G is directed,

1
consisting of both bidirectional and unidirectional links. the outgoing neighborhood of v is defined as N + (v) =
Recently, we have studied the fault tolerant virtual back- {u ∈ V | (v, u) ∈ E}.
bone problem in DG, where we only considered the bidi- Likewise, for any vertex v ∈ V , the closed incoming
rectional links [21]. To the best of our knowledge, none neighborhood of v is defined as N − [v] = N − (v)∪{v},
of recent research work has considered the fault toler- and the closed outgoing neighborhood of v is defined
ant virtual backbone problem in heterogeneous networks as N + [v] = N + (v) ∪ {v}.
with unidirectional links. A subset S ⊆ V is called a dominating S set (DS) of
In this paper, we formulate the fault tolerant virtual G iff S ∪ N + (S) = V where N + (S) = u∈S N + (u).
backbone problem in heterogeneous networks as a k- A subset S ⊆ V is called an independent dominat-
Strongly Connected m-Dominating and Absorbing Set ing set (IDS) of G iff S∪N + (S) = V and S∩N + (S) =
problem (k-m-SCDAS). Since the problem of finding ∅.
a virtual backbone in DG is NP-hard [17], we can ex- Given a subset S ⊆ V , an induced subgraph of S,
pect that the k-m-SCDAS is also NP-hard. We therefore denoted as G[S], obtained by deleting all vertices in the
propose two heuristics to solve the 1-m-SCDAS and k- set V − S from G.
1-SCDAS problems. Finally, we extend the these two A graph G is said to be strongly connected if for
heuristics to construct a k-m-SCDAS for any value of k any pair of nodes u, v ∈ V , there exists a directed path
and m. between them. Likewise, a subset S ⊆ V is called a
The contributions of this paper are as follows: strongly connected set if G[S] is strongly connected.
A subset S ⊆ V is called a Strongly Connected
• Three problems are introduced related to fault tol- Dominating Set (SCDS) if S is a DS and G[S] is
erance of virtual backbone in a wireless ad hoc strongly connected. S is called a Strongly Connected
network with nodes having different transmission Dominating and Absorbing Set (SCDAS) if S is an
ranges. (a) The 1-m-SCDAS problem, (b) The k- SCDS and for all nodes u ∈ / S, N + (u) ∩ S 6= ∅.
1-SCDAS problem, and (c) The k-m-SCDAS prob-
lem 2.2 Problem Definition
• Three heuristics are proposed for solving the above
mentioned problems. In this paper, we study the fault tolerant virtual back-
bone in a network with different transmission ranges. In
• Rigorous simulation experiments are done to ana- this case, a wireless ad hoc network can be modeled us-
lyze the performance and correctness of these algo- ing a directed graph G = (V, E). The nodes in V are
rithms. located in the two dimensional Euclidean plane and each
node vi ∈ V has a transmission range ri ∈ [rmin , rmax ].
The rest of this paper is organized as follows. Sec- A directed edge (vi , vj ) ∈ E if and only if d(vi , vj ) ≤ ri
tion 2 describes the preliminaries and the problem defi- where d(vi , vj ) denotes the Euclidean distance between
nitions. Section 3 presents the related work on fault tol- vi and vj . Such graphs are called Disk Graphs (DG). An
erant virtual backbone problem. The 1-m-SCDAS and edge (vi , vj ) is bidirectional if both (vi , vj ) and (vj , vi )
k-1-SCDAS algorithms are proposed in Section 4 and are in E, i.e., d(vi , vj ) ≤ min{ri , rj }. Otherwise, it is
Section 5 respectively. In section 6, we extend the re- called a unidirectional link. Note that in this paper, we
sults to k-m-SCDAS. Section 7 provides the simulation consider both bidirectional and unidirectional links.
results and finally Section 8 concludes the paper. Under such a model, we formulate the fault tolerant
virtual backbone problem as follows:
2 Preliminaries and Problem Definitions Definition 1 k-Strongly Connected m-Dominating
and Absorbing Set problem (k-m-SCDAS): Given a
2.1 Preliminaries directed graph G = (V, E) representing a network and
two positive integers k and m, find a subset C ⊆ V with
Let a directed graph G = (V, E) represent a network a minimum size and satisfying the following conditions:
where V consists of all nodes in a network and E repre- (i) C is an SCDAS, (ii) G[C] is k-connected, (iii) each
sents all the communication links. node not in C is dominated by at least m nodes in C,
For any vertex v ∈ V , the incoming neighborhood and (iv) each node not in C is absorbed by at least m
of v is defined as N − (v) = {u ∈ V | (u, v) ∈ E}, and nodes in C.
3 Related Work by choosing the node with biggest transmission range
and deleting its neighbors until there is no node exist.
Although the virtual backbone problem has been Next, we augment DSi to 1-(i − 1)-SCDAS at current
extensively studied in general undirected graphs and iteration and then we run Ext SCDS on it to form 1-i-
UDGs [7]-[13], the construction of virtual backbone in SCDAS. After running the second stage m − 1 times,
WANs with different transmission ranges is being ex- the resulting C is 1-m-SCDAS.
plored to some extent only recently. In [18] and [19],
the authors extended their marking process to networks Algorithm 1 Extended SCDS (Ext SCDS)
with unidirectional links to find an SCDAS. However, 1: INPUT: A directed disk graph G = (V, E) and an
the paper does not present any approximation ratio. Re- SCDS S. Note that all the nodes in S are either
cently, we have proposed the constant approximation al- black or blue and the rest of the nodes are white
gorithms for SCDAS problem [2, 3, 4, 20]. Yet we have 2: OUTPUT: A Strongly Connected Dominating and
not considered the fault tolerant aspect. Absorbing Set (SCDAS) C
The construction of fault tolerant virtual backbone in 3: for All u ∈ S do
general undirected graphs is also one of the newly stud- 4: All nodes v ∈ N − (u) that are white, color them
ied problems. Dai et al. addressed the problem of con- grey.
structing k-connected k-dominating set (k-CDS) [5] in 5: end for
UDG. In [1] Feng et al. introduced the problem of con- 6: while there exists a white node do
structing 2-1-CDS in UDGs and proposed a constant ap- 7: Find the grey node v having maximum number of
proximation problem. Note that the solutions of these white nodes in N − (v), color v blue and color all
two papers are applicable to undirected graphs. In ad- the white nodes in N − (v) grey
dition, the authors just considered a special case of the 8: end while
general problem, where k = m or k = 2 and m = 1.
Recently, we have considered the fault tolerant virtual
backbone in heterogeneous networks with only bidirec- Algorithm 2 Find a 1-m-Strongly Connected Dominat-
tional links [21]. We proposed a constant approximation ing and Absorbing Set
algorithm for any value of k and m.
1: INPUT: An m-connected directed graph G =
In summary, no work has considered a k-m-SCDAS
(V, E)
in heterogeneous networks with unidirectional links for
2: OUTPUT: A 1-m-SCDAS C of G
any value of k and m.
3: Construct a 1-1-SCDS C of graph G, using
MSN SCDS algorithm proposed in [3]
4 The 1-m-SCDAS Algorithm 4: Extend C to 1-1-SCDAS using Ext SCDS algo-
rithm proposed in [3]
The main idea of 1-m-SCDAS algorithm is as fol- 5: for i = 2 to m do
lows: (1) Construct an SCDS C and extend C to an SC- 6: Find DSi in G − (DS1 ∪ DS2 ∪ . . . ∪ DSi−1)
DAS. (2) Iteratively find new disjoint dominating sets 7: C = C ∪ DSi
(DS) and augment them to C. At each iteration after 8: Extend C to become 1-i-SCDAS using
augmenting the new DS to C, extend C to SCDAS. The Ext SCDS algorithm proposed in [3]
illustration of 1-m-SCDAS is shown in Algorithm 2. 9: end for
The algorithm has two stages. In the first stage, 10: Return C, where C is the 1-m-SCDAS
we used our MSN SCDS algorithm proposed in [3] to
construct the SCDS C, and then the Ext SCDS algo-
rithm proposed in [3], to extend SCDS C to SCDAS.
The MSN SCDS algorithm first constructs the DS and 5 The k-1-SCDAS Algorithm
then strongly connects all the nodes in DS using min-
imum number of Steiner nodes. The Ext SCDS algo- In the previous section we discussed an efficient
rithm then extends the SCDS formed by MSN SCDS heuristic to construct the 1-m-SCDAS, in which each
to SCDAS. For the convenience of readers, we present node not in 1-m-SCDAS is dominated and absorbed by
the Ext SCDS algorithm in Algorithm 1. At the sec- at least m different nodes in 1-m-SCDAS. In this section
ond stage, we iteratively find dominating sets DSi in we improve the fault tolerance of an SCDAS by studying
the remaining graph G − (DS1 ∪ DS2 ∪, . . . , ∪DSi−1 ) the k-1-Strongly Connected Dominating and Absorbing
Set (k-1-SCDAS), which can tolerate (k − 1) nodes fail- 6 Extended Result
ure. We also propose an efficient heuristic as Algorithm
3, to construct k-1-SCDAS. In the above two sections, we discussed two spe-
cial cases of the k-m-SCDAS problem, that are 1-m-
The k-1-SCDAS algorithm is illustrated in Algo- SCDAS, which increases the fault tolerance in terms of
rithm 3. Given the graph G = (V, E), the algorithm dominance, and k-1-SCDAS, which improves the fault
works as follows: First, an SCDAS is constructed using tolerance in terms of connectivity among the virtual
MSN SCDS and Ext SCDS algorithms proposed in [3]. backbone nodes. In this section we take the advantages
As a result, we have a connected dominating and ab- of the properties of 1-m-SCDAS and k-1-SCDAS, and
sorbing set C. Now on the graph G we run Depth First extend the results to k-m-SCDAS.
Search and delete all the edges traversed which connects
the nodes in C. The graph G is now reversed to form
6.1 Solution to k-m-SCDAS
a graph G0 . On the graph G0 , we run the Depth First
Search and delete all the edges traversed, which con-
nects the nodes in C. Reverse the graph G0 back to form The main idea of constructing a k-m-SCDAS is as
graph G. Doing this, the graph induced by the dominat- follows: (i) use 1-m-SCDAS algorithm to construct a
ing and absorbing set C i.e. G[C] is disconnected. Now 1-m-SCDAS C, (ii) use k-1-SCDAS algorithm to aug-
again, this graph G(C) is made connected and absorb- ment more nodes to C, obtained in the previous step to
ing by using the MSN SCDS and Ext SCDS algorithms become k-m-SCDAS.
[3], so that the dominating and absorbing set C becomes There are two issues to be noticed: (1) The input
connected dominating and absorbing set. In this pro- graph must be p connected, where p ≥ max(k, m). (2)
cess more blue nodes are added to C. This process is Note that if k ≥ m, then there is no problem, otherwise
repeated for k − 1 number of times, and it results in the first the 1-k-SCDAS will be constructed and then 1-m-
formation of k connected dominating and absorbing set SCDAS algorithm will run to construct a k-m-SCDAS,
C. in which the connectivity of the virtual backbone is pre-
served even after k − 1 virtual backbone node failures,
and the dominance is preserved even after the failure of
m − 1 virtual backbone nodes.
Algorithm 3 Find a k-1-Strongly Connected Dominat-
ing and Absorbing Set 7 Simulation Results
1: INPUT: k connected connected graph G = (V, E)
2: OUTPUT: A k-1-SCDAS C of G
In this section, we evaluate their performance through
3: Construct an SCDAS C in the given graph G using
simulation results. We conducted the simulation to com-
MSN SCDS and Ext SCDS algorithms proposed in
pare the performance (in terms of the size of CDS)
[3]
of four algorithms: Ext SCDS proposed in [3], 1-m-
4: Initialize k 0 = 2
SCDAS, k-1-SCDAS and k-m-SCDAS. The improve-
5: while k 0 ≥ k do
ment of 1-m-SCDAS is that, every node not in CDS is
6: Run Depth First Search (DFS) on G and delete all
dominated and absorbed by at least m nodes. Hence,
the edges traversed, which connects nodes in C
the dominance of CDS sustains even if (m − 1) CDS
7: Reverse the edges of G to form G0
nodes fail. The improvement of k-1-SCDAS is that any
8: Run Depth First Search (DFS) on G0 and delete
two nodes in CDS are connected by k different disjoint
all the edges traversed which connects the nodes
paths, hence the strong connectivity of CDS nodes sus-
on C.
tains even after k − 1 number of CDS node failures.
9: Reverse the edges of G0 back to form G
The improvement of k-m-SCDAS is that it combines
10: Find out an SCDS in G by adding more blue
the characteristic of 1-m-SCDAS and k-1-SCDAS, and
nodes in C and extend it to SCDAS
so in this case any two nodes in CDS are connected by
11: k0 = k0 + 1
k different paths and all the nodes not in CDS are dom-
12: end while
inated and absorbed by m different dominating nodes.
13: Return C, where C is the k-1-SCDAS
Moreover we are interested in comparing the size of
CDS for SCDAS, 1-m-SCDAS, k-1-SCDAS, and k-m-
SCDAS, when k = 2 and m = 2. We study three net-
work parameters that may affect the algorithm perfor- The simulation results are shown in Figure 1(a) and
mance: Figure 1(b). It is seen in the Figure 1(a), as the num-
ber of nodes increase the number of CDS nodes for all
1. N the number of nodes in the network the four algorithms increases, and after a certain value
2. R the transmission ratio, i.e. R = Rmax /Rmin of number of nodes the CDS nodes for all the four al-
gorithms fluctuates very little. The reason behind this
3. The network density, i.e. the number of nodes per may be, when there is less number of nodes in the net-
unit area. work, the nodes are distant from each other. Hence,
more nodes are required to dominated and absorb all
7.1 Effect of Number of Nodes the nodes in the network. Where as when the number
of nodes increases the nodes come closed to each other
and hence, less number of nodes can dominate and ab-
30
1-1-SCDAS sorb all the nodes in the network. It can be seen in the
25
1-2-SCDAS fig 1(a), when the number of nodes is between 10 − 80
2-1-SCDAS
there is an increase in the size of CDS, but when number
Number of CDS nodes

2-2-SCDAS
20 of nodes increases further, there is very little variation in
the number of CDS nodes.
15
The Figure 1(a) also shows that for every value of
10 number of nodes the size of the CDS for 2-2-SCDAS
is maximum and the size of the CDS of 1-1-SCDAS is
5
minimum. But an interesting thing to be noticed here
0 is that generally for all values of number of nodes the
20 40 60 80 100 120 140 size of CDS for 1-2-SCDAS is smaller than the size of
Number of nodes in the network
CDS for 2-1-SCDAS, but for few values of number of
(a) Compare the size of CDS
nodes the size of CDS nodes for 2-1-SCDAS is smaller
2 than the size of CDS for 1-2-SCDAS as it happens when
1-2-SCDAS/1-1-SCDAS
the number of nodes is 10 and 60. This shows for these
2-1-SCDAS/1-2-SCDAS
2-2-SCDAS/2-1-SCDAS
cases it requires more number of CDS nodes to increase
1.5
the dominance, then increasing the connectivity of the
CDS. This may be because when a dominating node is
Ratio

1 added into the graph then all the nodes which it is domi-
nating has to be absorbed, so more nodes may be added
to the CDS to fulfill this condition which may increase
0.5
the size of the CDS for 1-2-SCDAS, and for some net-
work topologies the number of nodes added to increase
0 the domination may exceed the number of nodes added
20 40 60 80 100 120 140
Number of nodes in the network to increase the connectivity.
(b) Ratios The Figure 1(b) shows the ratio of 1-2-SCDAS to 1-
1-SCDAS, ratio of 1-2-SCDAS to 2-1-SCDAS, and ra-
Figure 1. Effects of Number of Nodes in tio of 2-1-SCDAS to 2-2-SCDAS. The Figure reveals
the Network that the ratio of 1-2-SCDAS to 1-1-SCDAS lies between
1.15 and 1.55, this shows there is a 15% to 55% over-
head for increasing the domination of the CDS. The Fig-
To evaluate the performance of the four algorithms ure 1(b) also reveals that the ratio of 2-1-SCDAS to 1-2-
under different number of nodes, we deployed N SCDAS lies between 0.714 to 1.25, but mostly the ratio
nodes to a fixed area of 1, 000m x 1, 000m. N is above 1.0. This shows that it take more nodes to en-
changed from 10 to 150 with an increment of 5. Each hance the connectivity of the CDS than enhancing the
node vi randomly chose the transmission range Ri ∈ domination. But sometimes for some network topolo-
[Rmin , Rmax ], where Rmax = 600m and Rmin = gies the reverse is possible. Finally the Figure 1(b) also
200m. For each value of N , 100 network instances were reveals that the ratio of 2-2-SCDAS to 2-1-SCDAS lies
investigated and the results were averaged. between 1.071 to 1.4. This shows there is a predictable
and a reasonable overhead incurred in terms of increased the number of CDS nodes in all the four algorithm de-
number of CDS nodes, in order to increase the domina- creases. This is because as the transmission range ratio
tion and the connectivity of the CDS. increase the nodes in the initial dominating nodes have
larger transmission range and so less number of nodes
7.2 Effect of Transmission Range Ratio dominates all the nodes in the graph.
The Figure 2(a) also shows that for every value of
transmission range ratio, the CDS of 2-2-SCDAS has
40
1-1-SCDAS
the maximum size and the CDS of 1-1-SCDAS has the
35 1-2-SCDAS minimum size. But here we notice that the CDS size for
2-1-SCDAS 2-1-SCDAS is always greater than the size of CDS of 1-
Number of CDS nodes

30
2-2-SCDAS
2-SCDAS, this endorses our inference that, connectivity
25
uses more extra CDS nodes than dominance. The Figure
20
2(b) shows the ratio of 1-2-SCDAS to 1-1-SCDAS, ratio
15 of 1-2-SCDAS to 2-1-SCDAS, and ratio of 2-1-SCDAS
10 to 2-2-SCDAS. The Figure 2(b) reveals that the ratio
5
between 1-2-SCDAS and 1-1-SCDAS lies in the range
1.09 to 1.25, this range is comparatively smaller than
0
800 900 1000 1100 1200 1300 the range obtained while studying the effect of number
Area width of the network of nodes. This show that as the transmission range ra-
(a) Compare the Size of CDS tio R increase lesser number of nodes are require to in-
crease the dominance of the CDS, here the extra number
2
1-2-SCDS/1-1-SCDAS of CDS nodes needed varies from 9% to 25% . The Fig-
2-1-SCDAS/1-2-SCDAS ure 2(b) also shows that the ratio of 2-1-SCDAS to 1-2-
2-2-SCDAS/2-1-SCDAS
1.5 SCDAS lies in the range 1.0 to 1.3, this shows that to
enhance the connectivity more nodes are need in com-
parison to enhancing the dominance. Finally the ratio
Ratio

1
of 2-2-SCDAS and 2-1-SCDAS lies in the range 1.06 to
1.20. This show as the CDS becomes denser lesser CDS
0.5 nodes are needed to enhance the dominance, as it take
6 − 20 percent more CDS nodes to increase the domi-
0
nance of the CDS of 2-1-SCDAS to the dominance of
800 900 1000 1100 1200 1300 CDS of 2-2-SCDAS, where as, it takes 9 − 25 percent
Area width of the network
more CDS nodes to increase the dominance of the CDS
(b) Ratio of 1-1-SCDAS to the dominance of CDS of 1-2-SCDAS.

Figure 2. Effects of Transmission Range 7.3 Effect of Network Density


Ratio
Simulations were also carried out to compare the per-
We also conducted simulations to compare the per- formance of all four algorithms when changing the net-
formance of all the four algorithms when changing the work density as well as to see how this change affects the
transmission range ratio R to see how it affects the size size of the CDS. To change the network density, we fixed
of the obtained CDS. To change R, we fixed Rmin = the number of nodes N = 100 and increased the area
200m and changed Rmax from 200m to 800m with an from 800m x 800m to 1, 600m x 1, 600m with an incre-
increment of 10. In this experiment we randomly de- ment of 50. In the experiment we generated 100 nodes in
ployed 100 nodes into a fixed area of size 1, 000m x an area with size changing as described. Each node ran-
1, 000m. For each network instance, we ran the test for domly chooses a transmission range in [Rmin , Rmax ],
100 times, and the results were averaged. where Rmin = 200m and Rmax = 600m. For each
The Figure 2(a) and Figure 2(b) show the simulation network instance we ran the simulation for 100 times
results. Figure 2(a) compares the performance of four and the results were averaged.
algorithms in terms of the CDS size. It is seen in the The Figure 3(a) and Figure 3(b) shows the simulation
Figure 2(a) that as the transmission range ratio increases results. The Figure 3(a) compares the performance of
40 ratio 1-2-SCDAS and 1-1-SCDAS lies between 1.10 to
1-1-SCDAS
35 1-2-SCDAS
1.26 i.e. it may require to add 10 − 26 percent more
2-1-SCDAS nodes to increase the dominance of the CDS of 1-1-
Number of CDS nodes

30
2-2-SCDAS SCDAS. The ratio of 2-1-SCDAS and 1-2-SCDAS lies
25
between 0.99 − 1.46, this is a huge variation, but al-
20 most every time except once the ratio is always above
15 1.0. This endorses our earlier inference that connec-
10
tivity needs more CDS nodes than dominance. Finally
the ratio of 2-2-SCDAS and 2-1-SCDAS lies between
5
1.074 − 1.21, which further endorses our earlier infer-
0
800 900 1000 1100 1200 1300
ence that, it needs less number of extra CDS nodes to
Area width of the network increase the dominance when the CDS is denser. As
(a) Compare the CDS Size the ratio of 1-2-SCDAS and 1-1-SCDAS lies between
1.10 − 1.26, whereas the ratio of 2-2-SCDAS and 2-1-
2
1-2-SCDS/1-1-SCDAS SCDAS lies between 1.074 − 1.21. And the CDS of
2-1-SCDAS/1-2-SCDAS 2-1-SCDAS is denser than the CDS of 1-1-SCDAS.
2-2-SCDAS/2-1-SCDAS
1.5

8 Conclusion
Ratio

In this paper, we introduced three problems related


0.5 to fault tolerant virtual backbone in a wireless ad hoc
network in which the nodes have different transmission
ranges. These problems are the 1-m-SCDAS problem,
0
800 900 1000 1100 1200 1300 the k-1-SCDAS problem and the k-m-SCDAS problem.
Area width of the network We modeled the network as a directed graph, in which
(b) Ratio both unidirectional and bidirectional links are consid-
ered. We proposed algorithms as solutions to these three
Figure 3. Effects of the Network Density problems respectively and evaluated their performances
through rigorous simulation. The experiments show that
the fault tolerance of a virtual backbone can be im-
four algorithms in terms of the CDS size. It is seen in the proved with reasonable and predictable overhead. Also
Figure 3(a) as the size of the network increases i.e. the by adding few more nodes, a virtual backbone becomes
network density decreases then there is an increase in the more fault tolerant in term of domination and connec-
number of CDS nodes for all the four algorithms. This is tivity. In our future work, we plan to devise distributed
because as the network density decreases the nodes gets algorithms based on these solutions for an easy imple-
distant to each other and as a result of which more CDS mentation in practice.
nodes are required to dominate and absorb all the nodes
in the network. References
The Figure 3(a) also shows that for every value of
transmission range ratio, the CDS of 2-2-SCDAS has [1] F. Wang, M. T. Thai, D.-Z. Du, “On the construction of 2-connected virtual
backbone in wireless network”, IEEE Transactions on Wireless Communi-
the maximum size and the CDS of 1-1-SCDAS has the cations, 2007.
minimum size. An interesting thing to be notice here
is that when the area size is 850m x 850m the size [2] D.-Z. Du, M. T. Thai, Y. Li, D. Liu, S. Zhu, “Strongly Connected Dom-
inating Sets in Wireless Sensor Networks with Unidirectional Links”, In
of 1-2-SCDAS is 10.34 and the size of 2-1-SCDAS is Proceedings of APWEB, LNCS, 2006.
10.32. Hence, this shows that for some topologies the
domination may take more CDS nodes in comparison [3] M.T. Thai, R. Tiwari, and D.-Z Du, “On Construction of Virtual Backbone
in Wireless Sensor Networks with Unidirectional Links”, Manuscript.
to the connectivity, though it rarely happens. The Fig-
ure 3(b) shows the ratio of 1-2-SCDAS to 1-1-SCDAS, [4] M. Park, C. Wang, J. Willson, M. T. Thai, W. Wu, and A. Farago, ”A
Dominating and Absorbent Set in Wireless Ad-hoc Networks with Different
ratio of 1-2-SCDAS to 2-1-SCDAS, and ratio of 2-1- Transmission Range,” Proceedings of the 8th ACM International Symposium
SCDAS to 2-2-SCDAS. The Figure 3(b) reveals that the on Mobile Ad Hoc Networking and Computing (MOBIHOC), 2007.
[5] F. Dai and J. Wu, ”On Construction k-Connected k-Dominating Set in Wire-
less Network”, Parallel and Distributed Processing Symposium, 2005. Pro-
ceedings. 19th IEEE International, 2005.

[6] S,-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu, ”The Broadcast Strom
Problem in a Mobile ad hoc Network,” Proceedings of MOBICOM, 1999.

[7] Y. Li, S. Zhu, M. T. Thai, and D.-Z. Du, ”Localized Construction of Con-
nected Dominating Set in Wireless Networks”, NSF International Workshop
on Thoretical Aspects of Wireless Ad Hoc, Sensor and Peer-to-Peer Net-
works, 2004.

[8] Y. Li, M. T. Thai, F. Wang, C.-W. Yi, P.-J. Wang, and D.-Z. Du, ”On Greedy
Construction of Connected Dominating Sets in Wireless Networks”, Special
issue of Wireless Communications and Mobile Computing (WCMC), vol. 5,
no. 88, pp. 927–932, 2005.

[9] P.-J. Wan, K. M. Alzoubi, and O. Frieder, ”Distributed Construction on Con-


nected Dominating Set in Wireless Ad Hoc Networks”, Proceedings of the
Conference of the IEEE Communications Society (INFOCOM), 2002.

[10] S. Guha and S. Khuller, ”Approximation Algorithms for Connected Dom-


inating Sets”, Algorithmica, vol. 20, pp. 374–387, 1998

[11] X. Cheng, X. Huang, D. Li, W. Wu, and D.-Z.Du, ”Polynomial-Time Ap-


proximation Scheme for Minimum Connected Dominating Set in Ad Hoc
Wireless Networks,” Networks, vol. 42, no. 4, pp. 202–208, 2003.

[12] M. T. Thai, D.-Z. Du, ”Connected Dominating Sets in Disk Graphs with
Bidirectional Links,” IEEE Communications Letters, vol. 10, no. 3, pp. 138–
140, March 2006.

[13] B. Das, R. Sivakumar, and V. Bharghavan, ”Routing in Ad Hoc Networks


Using a Spine”, International Conferfence on Computers and Communica-
tion Networks, 1997

[14] A. Ephremides, J. Wieselthier, and D. Baker, ”A Design Concept for Reli-


able Mobile Radio Networks with Frequency Hopping Signaling,” Proceed-
ings of IEEE, 75(1):56–73, 1987.

[15] P. Sinha, R. Sivakumar, and V. Bharghavan, ”Enhancing ad hoc routing


with dynamic virtual infrastructures,” in Proceedings of Infocom, 2001.

[16] B. Clark, C. Colbourn, and D. Johnson, ”Unit Disk Graphs,” Discrete


Mathematics, vol. 86, pp. 165–177, 1990.

[17] M. R. Garey, D. S. Johnson, ”Computers and Intractability. A guide to the


Theory of NP-completeness”, Freeman, New York, 1979.

[18] J. Wu, ”Extended Dominating-Set-Based Routing in Ad Hoc Wireless Net-


works with Unidirectional Links,” IEEE Transactions on Parallel and Dis-
tributed Computing, 22, 1-4, 2002, 327-340.

[19] F. Dai and J. Wu, ”An Extended Localized Algorithms for Connected
Dominating Set Formation in Ad Hoc Wireless Networks”, IEEE Transac-
tions on Parallel and Distributed Systems, vol. 15, no. 10, October 2004

[20] M. T. Thai, F. Wang, D. Liu, S. Zhu, and D. Z. Du, ”Connected Dominat-


ing Sets in Wireless Networks with Different Transmission Ranges”, IEEE
Transactions on Mobile Computing, to appear, 2007.

[21] M. T. Thai, N. Zhang, R. Tiwari, and X. Xu, ”On Approximation Algo-


rithms of k-Connected m-Dominating Sets in Disk Graphs”, Theoretical
Computer Science journal, to appear.

S-ar putea să vă placă și