Professional Documents
Culture Documents
University of Twente
Abstract
∗ Postal address: Thales Nederland B.V., Department Innovations, Research & Technology, P.O. Box
88, 1270 AB Huizen, Netherlands, e-mail: maurits.degraaf@nl.thalesgroup.com
∗∗ Postal address: University of Twente, Department of Applied Mathematics, P.O. Box 217, 7500
AE Enschede, Netherlands
1
2 DE GRAAF, BOUCHERIE, HURINK, VAN OMMEREN
1. Introduction
Ad hoc wireless networks have received significant attention in recent years due to
their potential applications in battlefield, emergency disaster relief, and other scenarios
(see, for example [17], [22], and [23]). In an ad hoc wireless network, a communications
session is achieved either through single-hop transmission, if the recipient is within
the transmission range of the source, or by relaying through intermediate nodes. The
topology of a multihop wireless network is given by the set of communication links
between node pairs. The topology depends on uncontrollable factors such as node
mobility, weather, interference, noise as well as on controllable parameters such as
transmit power. We assume an idealized propagation model, where omnidirectional
antennas are used by all nodes to transmit and receive signals. We consider the case
that for the purpose of energy conservation, each node can adjust its transmit power.
For assigning the transmit powers, two conflicting effects have to be taken into account:
if the transmit powers assigned to the nodes are too low, the resulting topology may be
too sparse and the network may get partitioned. On the other extreme, if the transmit
powers assigned to the nodes are too high, the nodes run out of energy quickly.
For a set of points V representing the nodes in a network, a power assignment can
be represented as a function p : V → R+
0 . Following the notation of [17], for each
we assume that for each pair of points the values c(u, v) are known and symmetric,
i.e., c(u, v) = c(v, u) for all pairs {u, v} ∈ V . Thus, a power assignment p defines an
undirected graph Gp = (V, Ep ), where e = {u, v} ∈ Ep if and only if p(u) ≥ c(u, v)
and p(v) ≥ c(u, v). Note that in the case p(v) ≥ c(u, v) > p(u) only transmission from
v to u is possible. This might be interpreted as a unidirectional link from v to u, but
for most practical applications bidirectional (i.e., undirected) links are of interest: in
wireless communications typically link-layer acknowledgements are involved, so only
symmetric links are regarded.
This paper deals with the CMPA-problem: given a graph G = (V, E, c), where c
denotes the edge weights c : E → R+ , one asks for a power assignment p : V → R+
0
P
such that Gp is connected and the total power v∈V p(v) is minimal.
When V ⊂ Rd , a power attenuation model is assumed, assuming that the signal
power decreases with the distance r as r−p , where the distance-power gradient α ∈ R+
depends on the wireless environment and realistic values of p range from 1 to more than
6 [20]. This implies that c(u, v) = rp if the distance between u and v is r. Therefore, in
this case, the power assignment problem corresponds to assigning a range rv to node v,
while asking for minimization of the sum v∈V rvp . This is called the range assignment
P
problem. Note that the power assignment problem is more general than the range
assignment problem, as the weights need not be based on a distance function. While
the main results of this paper relate to the range assignment problem, intermediate
results are derived for the more general power assignment problem.
The range assignment problem is NP-hard in all dimensions d ≥ 2 for all values
of the distance-power gradient p. The first NP-hardness result for the 3 dimensional
range assignment problem was given in [15]. NP hardness in 2 dimensions was shown in
[7]. In [4] and [11] the complexity of various other variants of the problem is analyzed.
Based on these complexity results, polynomial time approximation algorithms were
studied. The first approximation algorithm to the CMPA-problem is the Minimum
Spanning Tree (MST)-algorithm (see [6], [11]).
4 DE GRAAF, BOUCHERIE, HURINK, VAN OMMEREN
where W (P ) denotes the weight of the optimal power assignment P . In [3] it is shown
that the factor 2 is tight.
For the MST algorithm, (1) shows that the worst-case performance ratio is 2. Other
approximation algorithms are studied in [3], where a polynomial time approximation
scheme with a worst-case performance ratio approaching 5/3 as well as a more practical
approximation algorithm with a worst-case approximation factor of 11/6 are given.
While the worst-case performance ratio of 2 might discourage use of the MST
algorithm in practice, numerical results indicate that the MST algorithm is often rather
close to the optimal solution [24]. Besides these numerical observations, the average
case behavior of the MST algorithm has never been analyzed. However, a probabilistic
analysis of the range assignment problems has been performed in [24] focusing on
upper- and lower-bounds for connectedness in the special case that all nodes have the
same transmit power.
Statement of contribution. This paper presents an analysis of the average case
behavior of the function W (Pn )/W (Tn ) for n → ∞, which provides an upper bound
to the performance ratio W (Pn )/W (P ). We investigate the following situations: for
V ⊂ Rd , we provide an upper bound for d = 1, and we derive a general theoretical
result relating the upper bound to the minimum spanning tree constant for 1 < p ≤ d.
We also investigate the situation for the complete graph with independent uniform
Average case analysis for the range assignment problem 5
edge weights, where the expected approximation ratio turns out to have a closed form
upper bound.
The paper is organized as follows. In Section 2 we provide some preliminary results.
Section 3 analyzes the 1-dimensional case for edge weights in the set {0, 1} and for
uniformly distributed edge weights on [0, 1]. Section 4 presents results for the d-
dimensional case where d ≥ 2. Finally, Section 5 presents conclusions and directions
for further research.
2. Preliminaries
Lemma 2.1. Let the edges e1 , . . . , en−1 of a minimum spanning tree T be sorted such
that c(e1 ) ≤ c(e2 ) ≤ . . . ≤ c(en−1 ). Then
c(ebn/2c ) + 2 Sbn/2c (T )
if n is odd,
c(en−1 ) + Sn−1 (T ) ≤ W (PT ) ≤ (2)
2 Sn/2 (T )
if n is even,
6 DE GRAAF, BOUCHERIE, HURINK, VAN OMMEREN
Proof. The right-hand inequalities of (2) follow from the fact that f (e) ∈ {0, 1, 2}
P Pn−1
and e∈E f (e) = n, and therefore W (PT ) = i=1 f (ei )c(ei ) takes its maximum,
when f takes maximum values for the edges with the highest weights. The left-hand
inequality can be inferred by induction on n: for n = 2 the statement is clearly true.
For n ≥ 2, suppose the inequality is true for all trees T 0 on n−1 vertices. Now, let T be
a tree on n vertices. As there are at least two edges in T that are incident to a vertex of
degree 1 (in T ), there exists an edge ek in T , k < n − 1, which is incident to a vertex w,
which has degree 1 (in T ). As ek covers w, we have f (ek ) ≥ 1. Let G0 := G\{w}, and
consider T 0 = T \{w}. By the choice of ek , T 0 is a minimum spanning tree of G0 and
Pn−2
by the induction hypothesis W (PT 0 ) ≥ c(en−1 ) + Sn−2 (T 0 ) = c(en−1 ) + i=1,i6=k c(ei ).
So that W (PT ) ≥ W (PT 0 ) + c(ek ). This completes the proof.
The following example shows that the bounds for the inequalities (2) are tight.
Next, we state a relation between the minimum spanning trees of a graph and
its extension by a single vertex, and additional edges between the new vertex and
the existing vertices. The following well-known extension property (see e.g., [14]) for
spanning trees plays a central role. Let T1 and T2 be two spanning trees on V . Then
for each e ∈ T1 there is an f ∈ T2 so that T1 \{e} ∪ {f } is again a spanning tree.
Average case analysis for the range assignment problem 7
Note that Lemma 2.2 relates to the construction in [16] and [14], where it is shown
how a forest in G(V \{v 0 }) can be extended to a minimum spanning tree using the ‘add
and drop’ algorithm. Their proof, however, does not consider the upper bound on the
weights w(e), nor seems easily extensible in this way, while the lemma below can be
extended to Lemma 5.1.
Let G = (V, E) be a path of n vertices, with n > 0, and where the cost c(e) of an
edge e ∈ E is 1 with probability s and 0 with probability 1 − s. Note that in Tn is
equal to G. In this case, W (Tn ) and W (Pn ) are r.v.’s denoting the total weight of the
minimum spanning tree, and the total weight of the power assignment corresponding
to Tn , respectively.
The weight W (Pn ) of the MST approximation of the power assignment problem
depends on the distribution of the 10 s over the path. We define a run as a succession
of 1’s preceded and succeeded by 0’s. The number of elements in a run is referred to
8 DE GRAAF, BOUCHERIE, HURINK, VAN OMMEREN
as its length. Let Ri denote the r.v. indicating the number of runs of length i. In
addition, let R and N be the r.v.’s indicating the total number of runs and the number
of edges with weight 1. (Note that R ≤ N .)
1 + (1 + n1 )(1 − (1 − s)n ) − s
W (Pn )
E > 0 = .
W (Tn ) 1 − (1 − s)n
N
Based on this, for the expected number of runs, given N = n1 , we get: E[R|N =
(n−n1 +1)n1
n1 ] = n . To calculate E[R/N ], assume n1 > 0. We obtain E[R/N |N = n1 ] =
(n−n1 +1) ˜
n , and, using the fact that N Binomial(n, s),
n
X
E[R/N · 1N1 >0 ] = E[R/N |N = n1 ]P(N = n1 )
n1 =1
1 1
= + 1 − s − (1 + )(1 − s)n .
n n
Observe that W (Pn )/W (Tn ) = 1 + R/N . This completes the proof.
This result can be intuitively explained as follows. When p > 0 is very small,
the runs are most likely of length 1, in this case W (Pn ) = 2W (Tn ). On the other
Average case analysis for the range assignment problem 9
extreme, when s is close to 1, most likely there is a single run of 1’s, in which case
W (Pn ) = W (Tn ) + 1. Assume n is large and 0 < s < 1. Then (1 + 1/n)(1 − (1 − s)n )
is close to 1, so E[W (Pn )/W (Tn )|N1 > 0] ≈ 2 − s. While the corresponding limit
result also follows from Theorem 3.2 in the next section, we believe the exact result is
interesting as it allows to get insight in the approximation quality of the limit result.
Proof. We get
n−1
X
W (Pn ) = D1 + max{Di , Di+1 } + Dn (6)
i=1
bn/2c b(n−1)/2c
X X
= D1 + max{D2i−1 , D2i } + max{D2i , D2i+1 } + Dn .
i=1 i=1
Since, by splitting the odd and even terms, in both sums the random variables are
i.i.d., it follows by the strong law of large numbers, that
W (Pn ) a.s.
−→ E [max{D1 , D2 }] .
n
Being the sum of i.i.d. r.v.’s, W (Tn ) also satisfies the strong law of large numbers, and
we obtain:
W (Tn ) a.s.
−→ E [D1 ] ,
n
W (Pn )
implying almost sure convergence of W (Tn ) .
Since, W (Pn ) and W (Tn ) are sequences of r.v.’s, with bounded ratio, the above
theorem implies that these ratios also converge in mean and that E[W (Pn )/W (Tn )]
converges. So we have:
10 DE GRAAF, BOUCHERIE, HURINK, VAN OMMEREN
Corollary 3.1.
W (Pn ) E [max{D1 , D2 }]
lim E =
n→∞ W (Tn ) E [D1 ]
Next, we consider the specific situation of n vertices in R1 with transmit power
threshold Di ∼ U p , with U ∼ U [0, 1], where U [0, 1] denotes the uniform distribution,
and p models the distance-power gradient.
Remark. For the model of the previous section, we obtain by the same techniques
that
W (Pn ) a.s.
−→ 2 − p.
W (Tn )
Since the two terms W (Pn ) and W (Tn ) are bounded, it follows that E[W (Pn )/W (Tn )] →
2 − p.
In this section we consider a complete graph with uniformly distributed edge weights
and apply Lemma 2.1 to this graph. More precisely, let G = (V, E, X̃) be a graph with
uniformly distributed edge weights, where V = {1, 2, . . . , n} and X̃ = {Xij : 1 ≤ i <
j ≤ n} a sample of size n2 = n2 with Xij ∼ U [0, 1], describing the edge weights.
Let Yn = Yn (G) denote the set of dn/2e most expensive, and Un = Un (G) the set
of bn/2c least expensive edges of Tn , and W (Yn ), W (Un ) the weight of Yn , Un . Note
that W (Yn ) = Sdn/2e .
In order to analyze W (Yn ) and W (Un ), we follow the exposition of Frieze’s result
(Theorem 4.1) of [5]. Let X(1) ≤ X(2) ≤ . . . ≤ X((n)) denote the order statistics of
2
the sample X̃ = (Xij ). With probability 1 we have X(1) < X(2) < . . . < X((n)) . Now
2
X̃ = (Xij ) defines a graph process Gt in a natural way, in which edges are added over
time, where the edge set of Gt , 0 ≤ t ≤ n2 , is given by the t least expensive edges of
G:
{{i, j} : Xij = X(k) for some k ≤ t}.
Average case analysis for the range assignment problem 11
where w(Gt ) denotes the number of components of Gt . Then ψ(1) = 1, ψ(2) = 2 and
ψ(n − 1) is the first time t when the graph Gt is connected. Clearly ψ(k) ≥ k. By the
greedy algorithm of Kruskal, a minimum spanning tree of G is formed by the edges of
Gt appearing at times ψ(1), ψ(2), . . . , ψ(n − 1), i.e.,
n−1
X
W (Tn ) = Xψ(k) .
k=1
Theorem 4.1. ([10].) Let G = (V, E, X̃) be a complete graph, with uniformly dis-
tributed edge weights. Then the weight of the minimum spanning tree Tn satisfies,
P
W (Tn ) → ζ(3), (8)
We show:
Lemma 4.1. Let G = (V, E, X̃) be a complete graph, with uniformly distributed edge
Pbn/2c
weights. Then for W (Un ) = k=1 Xψ(k) :
P
W (Un ) → 1/4. (9)
Proof. The idea behind the proof of statement (9) is that, for large n and 1 ≤
k ≤ n/2, ψ(k) is ‘close’ to k. In other words: the least expensive edges of large
graphs with uniformly distributed edge weights do not contain a circuit. First we show
limn→∞ E[W (Un )] = 1/4. Clearly, as E[X(i) ] = i/( n2 + 1), we have
bn/2c
X n
E[W (Un )] = E[ψ(k)]/( + 1).
2
k=1
Since ψ(k) ≥ k, one easily finds E[W (Un )] ≥ 1/4. We will show equality.
First we note:
P(k ≤ ψ(k) ≤ k + n8/9 ) = 1 − o(n−1/4 ). (10)
12 DE GRAAF, BOUCHERIE, HURINK, VAN OMMEREN
This follows from (6.18) in [5] which states that, with probability 1 − o(n−1/4 ),
Now, from the fact that u is a one-to-one mapping from R+ to (0, 1], and (see [5], page
109) that for 0 ≤ x ≤ 1: u(x) = 1 − x/2. it follows that: ψ0 (k) = k, for 0 ≤ k ≤ n/2.
Now (10) implies:
This follows from (6.14) in [5] which states, P(ψ(n − 1) ≤ 2n log n) = 1 − O(n−3 ). So
that
k ≤ E[ψ(k)] ≤ (k + n8/9 )P(k ≤ ψ(k) ≤ k + n8/9 ) + 2n log nP(k + n8/9 ≤ ψ(k) ≤ 2n log n)
n n
+ P(2n log n ≤ ψ(k) ≤ ),
2 2
which implies k ≤ E[ψ(k)] ≤ k + n8/9 + o(n3/4 log n) + O(n−1 ).
By (13) we obtain,
bn/2c
1 X 1
lim E[W (Un )] = lim n
E[ψ(k)] = (14)
n→∞ n→∞
2 + 1 4
k=1
This follows from [10] equation (17) which implies that for some constant c, and 1 ≤
k ≤ l ≤ n/2:
E[ψ(k)ψ(l)] ≤ E[ψ(k)]E[ψ(l)] + cn11/6 (log n)2
Average case analysis for the range assignment problem 13
Theorem 4.2. Let G = (V, E, X̃) be a complete graph, with uniformly distributed edge
weights. Then,
W (Pn ) 2(ζ(3) − 1/4)
lim sup E ≤ ≈ 1.58... (15)
n→∞ W (Tn ) ζ(3)
Proof. As W (Tn ) ≤ W (Pn ) ≤ 2W (Yn ), and W (Tn ) = W (Un ) + W (Yn ), it follows
from Theorem 4.1 and Lemma 4.1 that ζ(3) ≤ lim supn→∞ E[W (Pn )] ≤ 2(ζ(3) − 1/4).
The main result of this section is the following theorem describing complete conver-
gence for P (Vn ) .
c.c.
P (Vn ) −→ µdP , (16)
and,
c.c.
Sbn/2c (Vn ) −→ µdY . (17)
For the results in this section we need an extension of Lemma 2.6 given in [31]. From
[2] it is known that that the maximum degree d(v) of any vertex v in the minimum
spanning tree is bounded by a constant c(d) depending only on the dimension d. E.g.
for d = 2 it is known that c(d) = 6.
The following lemmas show that if two point sets V and W are ’close’ then |P (V ) −
P (W )| and |Sk (V ) − Sk (W )| are bounded, showing Lipschitz continuity for the P (·)
and Sk (·)-function, k = 1, . . . , |V | − 1.
Average case analysis for the range assignment problem 15
Figure 1: Situation sketch for the proof of Lemma 5.1, showing T1 , . . . , T6 , V , V 0 and W . The
normal edges are part of T (V ∪ W ), the dashed edges are part of T (W ) but not of T (V ∪ W ),
V 0 is obtained from V by removing u, T5 , and T6 .
Lemma 5.1. Let V and W be sets of points in Rd . Moreover, suppose that the edges in
T (W ) and T (V ∪W ) have weight at most C. Then (a) P (W ) ≤ P (V ∪W )+2c(d)C|V \
W |, and, (b) Sk (W ) ≤ Sk (V ∪ W ) + (c(d) − 1)C|V \ W |, for all k = 1, . . . , |V | − 1.
P (W ) ≤ P (V 0 ∪ W ) + 2(c(d) − 1)C|V 0 \W |
≤ P (V ∪ W ) + 2(c(d) − 1)C(1 + |V 0 \W |)
≤ P (V ∪ W ) + 2(c(d) − 1)C|V \W |,
where the second inequality follows from the fact that the number of components is
bounded by the maximum degree of a vertex in a spanning tree, i.e., ` ≤ d ≤ c(d).
This finishes the proof for P (·). The proof for Sk (·) follows similarly.
Note that in Lemma 5.1 we do not require a bound on the maximum edge weight of
T (V ), but only on that of T (W ) and T (V ∪ W ). Moreover, in the proof we do not use
a bound of C on the weight of the edges from Ti to Tj , for 1 ≤ i ≤ ` and ` + 1 ≤ j ≤ d.
The following example shows that all edges from Ti to Tj could have length exceeding
C. Assume that there is only one edge between V and W with weight at most C. If u
would be chosen incident to this edge, then all edges from Ti to Tj , for 1 ≤ i ≤ ` and
` + 1 ≤ j ≤ k have length exceeding C.
Average case analysis for the range assignment problem 17
1. P (V ∪ W ) ≤ P (V ) + (c(d) + 1)C|W \V |,
Proof. First note that for V = W the lemma is obviously true. Thus, we assume
V 6= W . Now, the proof consists of two steps. Since all edges in T (V ∪ W ) have weight
at most C, there is at least one edge e = {x, y} with x ∈ V , y ∈ W \V and c(e) ≤ C.
Let H = V ∪ {y} and consider a minimum spanning tree T (H) on H. Let d = d(x)
denote the degree of x in T (H). By Lemma 2.2, and the MST Algorithm, it follows
that P (H) ≤ P (V ) + (d + 1)C ≤ P (V ) + (c(d) + 1)C. Now the first statement follows
by iteration.
If, in addition, |V | = |W |, then by Lemma 5.1 we have that :
P (V ) ≤ P (V ∪ W ) + 2(c(d) − 1)C|V \W |
= P (V ) + (3c(d) − 1)C|W \V |,
The proofs for Sk (·) are entirely similar, though smaller constants are possible:
Lemma 5.3. Let V and W be sets of points in the unit square. Suppose that T (V ),
T (W ) and T (V ∪ W ) are unique minimum spanning trees on G(V ), G(W ), and G(V ∪
W ) with maximum edge weight at most C. Then, for k = 1, . . . , |V | − 1,
1. Sk (V ∪ W ) ≤ Sk (V ) + C|W \V |, and
Theorem 5.2. For all 1 ≤ p < d, there exists constants µp,d p,d
P and µY such that
P (Vn ) c.c.
d−p −→ µp,d
P , (19)
n d
and,
Sbn/2c (Vn ) c.c.
d−p −→ µp,d
Y . (20)
n d
Proof. This follows from the fact that the functional P (·) and its associated bound-
d−p
ary functional PB (·) are smooth, i.e., |P (V ∪ W ) − P (V )| = O(|W | d ), for all point
sets V, W ⊆ [0, 1]d . Moreover, P (·) is point-wise close to PB (·) for 1 ≤ p < d.
Both properties are inherited from the same properties for the MST functional. Now
we can apply Theorem 4.1 and Corollary 6.4 from Yukich [30] to conclude complete
convergence for both functionals.
The proof of the main theorem for p = d, where p denotes the distance power
gradient, and d the dimension, goes in a number of steps, and first we show convergence
in mean.
Theorem 5.3. For all p = d ≥ 2, there exists constants µdP and µdY such that
and
lim E[Sbn/2c (V )]] = µdY . (22)
n→∞
Proof. We only prove (21). The proof of (22) follows in a similar way. We first
note that E[P (V )] ≤ C, for some constant C > 0. This immediately follows from the
fact that for the minimum spanning tree T (V ), E[T (V )] ≤ C. If in addition, PB (V ) is
close in mean to P (V ) and P (·) is smooth in mean, then the theorem follows from [30]
Theorem 4.5.
First, we show PB (V ) is close in mean to P (V ), following the analogous proof for
minimum spanning trees in [30] pp. 44 and 45. Let PB denote the power assignment
associated to TB (V ). We enumerate the components of TB by T1 , . . . , TQ where Q is
random and where each Ti represents a tree which is rooted to the boundary of the
Average case analysis for the range assignment problem 19
it follows that for any β > 0, there is a C(β) such that S can be chosen in such a way
that with a probability of at least 1 − n−β S contains at most C(β)n(d−1)/d edges, with
total weight at most C(β)n−1/d (log n)d . By the fact that each added edge increases
the weight of PB (V ) with at most two times the edge weight, it follows that with a
probability of at least 1 − n−β ,
1
PB (V ) ≤ P (V ) ≤ PB (V ) + 2C(β)n− d (log n)d . (23)
The following statement implies (24). For any β > 0, there is a constant C 0 , depending
only on β, co C 0 = C 0 (β) such that with a probability of at least 1 − n−β
To see (25), note that for any β > 0, there is a constant C(β) such that with a probabil-
ity of at least 1−n−β the edges in the MST on V have length at most C(β)(log n/n)1/d .
In this case, the maximum weight of an edge is C(β)d (log n/n). To compensate for
the fact, that we may also remove (at most n/2) points from {u1 , . . . , un }, which
increases log n/n, we set C 0 (β) = 2p C(β)d . It follows from the first statement of
Lemma 5.2 that P ({u1 , . . . , un+k }) ≤ P ({u1 , . . . , un }) + (c(d) + 1)kC 0 (β)(log n/n). To
see P ({u1 , . . . , un }) ≤ P ({u1 , . . . , un+k }) + (2c(d) − 1)kC 0 (β)(log n/n), apply Lemma
5.1 with V = {un+1 , . . . , un+k } and W = {u1 , . . . , un }. By similar reasoning we deal
with the case |P ({u1 , . . . , un }) − P ({u1 , . . . , un−k })|.
Let x = (x1 , . . . , xn ) be an n-tuple in ([0, 1]d )n . Recall that the Hamming distance
H on ([0, 1]d )n measures the distance between x and y by the number of coordinates in
which x and y disagree: H(x, y) = card{i : xi 6= yi }. Note that with x = (x1 , . . . , xn )
and y = (y1 , . . . , yn ), we can associate the unordered sets x0 = {x1 , . . . , xn } and y 0 =
{y1 , . . . , yn }. Now with l(x0 , y 0 ) = |x0 \y 0 | = |{x ∈ x0 |x ∈
/ y 0 }| = |x0 | − |x0 ∩ y 0 |, we
immediately have: H(x, y) ≥ l(x0 , y 0 ).
d
For all t > 0 the t-enlargement of a set A ⊆ ([0, 1] )n is the set of tuples with small
Hamming distance to A, defined by
d
At := {x ∈ ([0, 1] )n : ∃y ∈ A such that H(x, y) ≤ t}.
d
D := {x = (x1 , . . . , xn ) ∈ ([0, 1] )n : max dist(gj , {xi }ni=1 ) ≤ C(log n/n)1/d }.
1≤j≤n
Then
−d
Cd
µn (Dc ) ≤ n1−πd 2 .
Proof. Consider Dc and note that Dc ⊂ ∪nj=1 Djc , where Dic is defined as: Dic =
Pn
{x ∈ ([0, 1]d )n : dist(gi , {xj }nj=1 ) > C(log n/n)1/d }. Clearly, µn (Dc ) ≤ i=1 µn (Dic ).
We also have, for any i = 1, . . . , n, with
n
µn (Dic ) ≤ 1 − 2−d πd C d (log n/n) .
c
To see this, note that with Di,j = {x ∈ ([0, 1]d )n : dist(gi , xj ) > C(log n/n)1/d }, we
have Dic = ∩nj=1 Di,j
c c
, and µ(Di,j ) = 1 − πd C d (log n/n), if the hyperball centered at gi
Average case analysis for the range assignment problem 21
with radius (C log n/n)1/d is fully contained in [0, 1]d . As at least a fraction of 2−d of
this hyperball is contained in [0, 1]d , it follows that, µ(Di,j
c
) ≤ 1−2−d πd C d (log n/n). As
−d
πd C d log n
1 − x ≤ e−x for x ≥ 0, we have, µn (Dic ) ≤ (1 − 2−d πd C d log n/n)n ≤ e−2 =
−d d Pn −d d
n−2 πd C . Hence µn (Dc ) ≤ i=1 µn (Dic ) ≤ n1−πd 2 C .
Let us first provide an intuitive explanation for the proof of Theorem 5.2. For fixed
n, with V = {U1 , . . . , Un } we let An denote all sets of n vertices on [0, 1]d , for which
P (V ) exceeds the median weight MP (n), and define the t-enlargement At of A, where
t = t(n), and At depends on a constant C, in such a way that for any β > 0 there is a
C(β) such that µ(At ) ≥ 1−n−β . The definition of At and some technical constructions
ensures that if y ∈ At then P (y) is ‘close’ to MP (n). It follows that with a probability
of at least 1 − n−β any set of vertices has P (V ) ‘close’ to MP (n).
In order to bring us in a position to apply Lemma 5.2 we need to make sure that if
y ∈ At then there is some x ∈ A so that x and y are ‘close’ and so that the maximum
weight of the minimum spanning tree edges on x resp. y is ‘small’. That is the role
of the set D of grid points defined in Lemma 5.4. They provide a point of reference:
if x and y are both close to D then x must be close to y. The role of the set B (the
minimum spanning trees with ‘short’ edge lengths) is to make sure that we are only
dealing with minimum spanning trees that do not violate the assumptions for Lemma
5.2. We show:
Theorem 5.5. For any d ≥ 2, let G(V ) be as described before (so with p = d), then
We will only prove statements (26) and (27). The proof of (28) and (29) follows the
same lines. For ease of notation we write M (n) instead of the MP (n), as defined in
Theorem 5.5.First we show,
22 DE GRAAF, BOUCHERIE, HURINK, VAN OMMEREN
2
−β n
P(|P (V ) − M (n)| > ) ≤ O(n ) + 3exp − , (30)
(log n)2 D02
P (V ) ≥ M (n).
By definition of M (n), µn (A) ≥ 1/2. Choose C(β), so that 2−d πd C(β)d > β, and so
that with a probability of at least 1−n−β , the edges in the MST on {xi }ni=1 have length
d
at most C(β)(log n/n)1/d . Let B ⊂ ([0, 1] )n consist of all n-tuples x = (x1 , . . . , xn )
such that the edges in the MST on {xi }ni=1 have length at most C(β)(log n/n)1/d . By
further increasing C(β) we can ensure that with D as in Lemma 5.4, it follows that
µn (B) ≥ 1 − n−β , and µn (D) ≥ 1 − n−β . Thus, we easily have µn (A ∩ B ∩ D) ≥ 1/3.
For n large enough, it follows by Talagrand’s theorem Theorem 5.4 (see [28], Lemma
5.1), that if we define t = t(n) = D0−1 (n/ log n) with D0 = (3c(d) − 1)C(β)d , the
volume of the enlarged set µn (A ∩ B ∩ D)t ≤ O(n−β ) :
2
n c n
µ ((A ∩ B ∩ D)t ) ≤ 3exp − . (31)
(log n)2 D02
where fd (n) is shorthand notation for the expression in (31). We now show that if x ∈ E
then |P (x) − M (n)| is bounded. Suppose x := (x1 , . . . , xn ) ∈ E, then x ∈ (A ∩ B ∩ D)t
and so there is a point y := y(x) = (y1 , . . . , yn ) ∈ A ∩ B ∩ D such that H(x, y) ≤ t.
Since x and y are both in B, the edges in the graph of the minimal spanning tree
on x and y have length bounded by C(β)(log n/n)1/d . Since x and y are both in
D, y is close to x in the sense that max1≤i≤n dist(xi , {yj }nj=1 ) ≤ C(β)((log n/n)1/d
Average case analysis for the range assignment problem 23
and max1≤i≤n dist(yi , {xj }nj=1 ) ≤ C(β)(log n/n)1/d . By Lemma 5.2, the fact that
H(x, y) ≥ l(x0 , y 0 ), and weights are the d-th powers of the distances, our definition of
t(n) implies:
log n
|P (y) − P (x)| ≤ (3c(d) − 1)t(n)C(β)d = .
n
Therefore, for all x ∈ E and y = y(x) ∈ A ∩ B ∩ D as above, we have
d
Thus it follows for general V = (u1 , . . . , un ) ∈ ([0, 1] )n that
and
P(P (V ) > M (n) + ) ≤ O(n−β ) + 3exp(−fd (n))
and so
P(|P (V ) − M (n)| > ) ≤ O(n−β ) + 6exp(−fd (n)). (32)
and as β > 1, the righthand side of (35) tends to 0 when n → ∞. This shows (26).
Finally, we are in the position to give the proof of the main theorem of this section.
Proof of Theorem 5.2. By Theorem 5.3 limn→∞ E[P (V )] = µdP and by (26)
limn→∞ |E[|P (V ) − M (n)|] = 0, the triangle inequality implies (19). Now (20) follows
in a similar way from (28) and (29).
P (V )
Proof. By Lemma 2.1 we find µdP ≤ 2µdY . The fact that T (V ) is bounded from above
and below implies the statement.
This paper presents an average case analysis of the minimum spanning tree heuristic
for the range assignment problem on a graph with power weighted edges. The worst-
case approximation ratio of this heuristic is 2. Our analysis yields the following results:
(a) In the one-dimensional case (d = 1), where the weights of the edges are 1 with
probability p and 0 otherwise, the expected approximation ratio for n → ∞ tends to
2 − p. (b) In the one-dimensional case, with the distance between neighboring vertices
drawn from a uniform [0, 1]-distribution, the expected approximation ratio is bounded
from above by 2 − 2/(p + 2) where p denotes the distance power gradient. (c) For the
complete graphs with uniformly distributed edge weights, the expected approximation
ratio is asymptotically bounded from above by 2 − 1/2ζ(3) ≈ 1.58.... (d) For the case
with 1 ≤ p ≤ d, the weight of the power assignment divided by n(p−d)/d converges
completely.
In order to show this, we use extensions of results of Yukich [31], that require general
results on minimum spanning trees in graphs that are of interest by itself.
Acknowledgements
This work was supported under the Casimir grant of National Science Institute
(N.W.O.). We also like to thank an anonymous referee for the constructive and helpful
remarks.
References
[2] Aldous, D., Steele, J.M. (1992) Asymptotics for Euclidean minimal spanning
trees on random points, Probability Theorey and Related fields, 92, 247–258.
[3] Althaus, E., Calinescu, G., Mandoiu, I.I. , Prasad, S., Tchervenski,
N., Zelikovsky, A. (2006). Power efficient range assignment for symmetric
connectivity in static ad hoc wireless networks, Wireless Networks, 12, 287–299.
[5] Bollobas, B. (2001). Random Graphs, 2nd edition, Cambridge University Press,
ISBN 0521 79722.
[6] Chen, W. and Huan, N. (1989). The strongly connecting problem on multihop
packet radio networks, IEEE Transactions on Communications, 37, 293–295.
[8] David, F.N. and Johnson, N.L. (1954), Statistical treatment of censored data,
I. Fundamental Formulae,Biometrika, 41, 228–240.
26 DE GRAAF, BOUCHERIE, HURINK, VAN OMMEREN
[9] Feeney, L.M. and Nilson, M. (2001). Investigating the energy consumption
of a wireless network interface in an ad-hoc networking environment, Proc. 20th
IEEE INFOCOM, 1548–1557.
[10] Frieze, A.M. (1985). On the value of a random minimum spanning tree problem.
Discrete Applied Mathematics, 10, 47–56.
[12] Grimett, G.R. and Stirzaker, D.R.(1992)., Probability and Random Pro-
cesses, 2nd Edition, Clarendon Press, Oxford, 271–285, ISBN 0-19-853665-8.
[13] Hogg, R.V. Craig, A.T, Introduction to mathematical statistics, 4th edition.
[14] Kesten, H. Lee, S. (1996). The central limit theorem for weighted minimal
spanning trees on random points, The annals of Applied probability, 6., No. 2,
495–527.
[15] Kirousis L., Kranakis E. , Krzanc, D., Pelc, A. (2000). Power consumption
in packet radio networks, Theoretical Computer Science 243, 289–205
[16] Lee, S. (1997), The central limit theorem for Euclidean minimal spanning trees
I. Ann. Applied Probability, 7, No. 4, 996–1020.
[17] Lloyd, E., Liu, R., Marathe, M., Ramanathan, R., Ravi, S. (2005).
Algorithmic Aspects of Topology Control problems for ad-hoc networks, Mobile
Networks and applications, 10, Issue 1-2 , 19–34.
[18] Mood, A.M. (1940). The Distribution Theory of Runs, The Annals of
Mathematical Statistics 11, No. 4, 367–392.
[19] Montemanni, R. and Gambardella, L.M. (2005). Exact algorithms for the
minimum Power symmetric connectivity problem in wireless networks, Computers
and Operations Research, 32, Issue 11, 2891–2904.
[21] Penrose, M. D. (1997). The Longest Edge of the Random Minimal Spanning
Tree, The Annals of Applied Probability , 7, 340–361
[23] Rodoplu, V. and Meng, T.H. (1999) Minimum energy mobile wireless
networks, IEEE J. Select. Areas Communications, 17, no. 8, 1333–1344.
[24] Santi,P. Blough, D., Vainstein,F. (2001). A probabilistic analysis for the
range assignment Problem in ad-hoc networks, in: MobiHoc ’01: Proceedings of
the 2nd ACM International symposium on Mobile ad hoc networking & computing,
ACM Press, New York, 212–220.
[27] Steele, J.M. (1988). Growth rates of Euclidean minimal spanning trees with
power weighted edges, Ann. Probabil., 16, 1767–1787.
[28] Talagrand (1996) A new look at independence, The annals of Probability, 24,
1–34.
[29] Wattenhofer, R., Li, L., Bahl, V. and Wang, Y.M. (2001). Distributed
topology control for power efficient operation in multihop wireless ad-hoc net-
works, in: proc. twentieth Annual joint Conference of the IEEE Computer and
Communications Societies (INFOCOM), 1388–1397.
[31] Yukich, J.E. (2000) Asymptotics for weighted minimal spanning trees on random
points, Stochastic Processes and their Applications, 85, 123–138.