Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/984622.984686acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
Article

Naps: scalable, robust topology management in wireless ad hoc networks

Published: 26 April 2004 Publication History

Abstract

Topology management schemes conserve energy in wireless ad hoc networks by identifying redundant nodes that may turn off their radios or other components while maintaining connectivity. We present Naps, a randomized topology management scheme that does not rely on geographic location information, provides exibility in the target density of waking nodes, and sends only a periodic heartbeat message between waking neighbors; thus it is implementable even on modest hardware. We formally analyze the connectivity of the waking graphs produced by Naps, showing that these graphs have nearly complete connectivity even at relatively low densities. We examine simulation results for a wide range of initial deployment densities and for heterogeneous and mobile deployments.

References

[1]
B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks," in Mobile Computing and Networking, 2001, pp. 85--96.
[2]
V. Raghunathan, C. Schurgers, S. Park, and M. Srivastava, "Energy aware wireless microsensor networks," IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 40--50, March 2002.
[3]
C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. Srivastava, "Optimizing sensor networks in the energy-latency-density design space," IEEE Transactions on Mobile Computing, vol. 1, no. 1, pp. 70--80, January-March 2002.
[4]
P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 388--404, March 2000.
[5]
Michael R. Garey and David S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freeman & Co., 1979.
[6]
Geoffrey Grimmett, Percolation, Springer, 2nd edition, 1999.
[7]
Mathew Penrose, Random Geometric Graphs, Oxford University Press, 2003.
[8]
P. Gupta and P. Kumar, "Critical power for asymptotic connectivity in wireless networks," in Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming, W.M. McEneaney, G. Yin, and Q. Zhang, Eds., pp. 547--566. Birkhauser, Boston, 1998.
[9]
Brad Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Mobile Computing and Networking, 2000, pp. 243--254.
[10]
Ananth Rao, Christos Papadimitriou, Scott Shenker, and Ion Stoica, "Geographic routing without location information," in Proceedings of the 9th annual international conference on Mobile computing and networking. 2003, pp. 96--108, ACM Press.
[11]
Y. Xu, S. Bien, Y. Mori, J. Heidemann, and D. Estrin, "Topology control protocols to conserve energy in wireless ad hoc networks," submitted for review to IEEE Transactions on Mobile Computing, January 2003.
[12]
Y. Xu, J. Heidemann, and D. Estrin, "Adaptive energy-conserving routing for multihop ad hoc networks," Tech. Rep. 527, USC/Information Sciences Institute, 2000.
[13]
Lichun Bao and J. J. Garcia-Luna-Aceves, "Topology management in ad hoc networks," in Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. 2003, pp. 129--140, ACM Press.
[14]
R. Zheng, J. C. Hou, and L. Sha, "Asynchronous wakeup for ad hoc networks," in Proceedings of the Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2003.
[15]
L. Booth, J. Bruck, M. Franceschetti, and R. Meester, "Covering algorithms, continuum percolation, and the geometry of wireless networks," Annals of Applied Probability, vol. 13, no. 2, May 2003.
[16]
D. Tian and N.D. Georganas, "A coverage-preserving node scheduling scheme for large wireless sensor networks," in Proc. ACM Workshop on Wireless Sensor Networks and Applications, Atlanta, May 2003.
[17]
Fabian Kuhn and Roger Wattenhofer, "Constant-time distributed dominating set approximation," in Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing, 2003.
[18]
O. Dousse, F. Baccelli, and P. Thiran, "Impact of interferences on connectivity of ad hoc networks," in Proc. IEEE Infocom, San Francisco, April 2003.
[19]
S. A. Zuev and A. T. Sidorenko, "Continuous models of percolation theory i, ii," Theoretical and Mathematical Physics, vol. 62, pp. 51--58,171--177, 1985.
[20]
S. Quintanilla, S. Torquato, and R. M. Zi, "Efficient measurement of the percolation threshold for fully penetrable discs," Journal of Physics A, vol. 33, no. 42, pp. L399--L407, October 2000.
[21]
T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless Communications and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, pp. 483--502, 2002.

Cited By

View all
  • (2023)ECKN: An Integrated Approach for Position Estimation, Packet Routing, and Sleep Scheduling in Wireless Sensor NetworksSensors10.3390/s2313613323:13(6133)Online publication date: 4-Jul-2023
  • (2020)Energy Management Techniques for WSNs (1): Duty-Cycling ApproachWireless Sensor Networks10.1007/978-3-030-29700-8_4(109-258)Online publication date: 26-Jan-2020
  • (2018)Chain Assisted Tree Based Self-healing Protocol for Topology Managed WSNsSmart and Innovative Trends in Next Generation Computing Technologies10.1007/978-981-10-8660-1_23(305-320)Online publication date: 9-Jun-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IPSN '04: Proceedings of the 3rd international symposium on Information processing in sensor networks
April 2004
464 pages
ISBN:1581138466
DOI:10.1145/984622
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 April 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. percolation theory
  2. sensor networks
  3. simulation
  4. topology management
  5. wireless ad hoc networks

Qualifiers

  • Article

Conference

IPSN04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 143 of 593 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)ECKN: An Integrated Approach for Position Estimation, Packet Routing, and Sleep Scheduling in Wireless Sensor NetworksSensors10.3390/s2313613323:13(6133)Online publication date: 4-Jul-2023
  • (2020)Energy Management Techniques for WSNs (1): Duty-Cycling ApproachWireless Sensor Networks10.1007/978-3-030-29700-8_4(109-258)Online publication date: 26-Jan-2020
  • (2018)Chain Assisted Tree Based Self-healing Protocol for Topology Managed WSNsSmart and Innovative Trends in Next Generation Computing Technologies10.1007/978-981-10-8660-1_23(305-320)Online publication date: 9-Jun-2018
  • (2017)Topology management scheme to reduce data loss and enhance network lifetime: T-MAIDA2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)10.1109/ICCCNT.2017.8204053(1-7)Online publication date: Jul-2017
  • (2016)Energy-Efficient Data Collection Techniques in Wireless Sensor NetworksEmerging Communication Technologies Based on Wireless Sensor Networks10.1201/b20085-16(275-296)Online publication date: 7-Apr-2016
  • (2015)Temperature MAC plug-in for large scale WSN2015 IEEE International Conference on Communications (ICC)10.1109/ICC.2015.7249342(6389-6394)Online publication date: Jun-2015
  • (2014)Survey Topology management techniques for tolerating node failures in wireless sensor networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2013.08.02158(254-283)Online publication date: 1-Jan-2014
  • (2013)Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networksMobile Information Systems10.5555/2593015.25930179:4(295-314)Online publication date: 1-Oct-2013
  • (2013)Fast track articlePervasive and Mobile Computing10.1016/j.pmcj.2012.02.0049:2(311-323)Online publication date: 1-Apr-2013
  • (2013)Robust decentralized adaptive nonquadratic congestion control algorithm for a class of delayed networksNonlinear Dynamics10.1007/s11071-013-0941-573:4(2291-2311)Online publication date: 14-May-2013
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media