Professional Documents
Culture Documents
ABSTRACT 1. INTRODUCTION
In this paper we study a model for ad-hoc networks close Ad-hoc networks are formed by mobile devices communicat-
enough to reality as to represent existing networks, being at ing via radio. If two ad-hoc nodes are too far apart to com-
the same time concise enough to promote strong theoreti- municate directly, intermediate nodes can relay their mes-
cal results. The Quasi Unit Disk Graph model contains all sages.
edges shorter than a parameter d between 0 and 1 and no
edges longer than 1. We show that—in comparison to the A widely employed model for the study of ad-hoc networks
cost known on Unit Disk Graphs—the complexity results is the so-called Unit Disk Graph model: Nodes are located
in this model contain the additional factor 1/d2 . We prove in the Euclidean plane and are assumed to have identical
that in Quasi Unit Disk Graphs flooding is an asymptoti- (unit) transmission radii. Consequently an edge between
cally message-optimal routing technique, provide a geomet- two nodes u and v—representing that u and v are in mutual
ric routing algorithm being more efficient above all in dense transmission range—exists iff |uv|, their Euclidean distance,
networks, and show that classic geometric routing is possi- is not greater than one. On the one hand, clearly, this is
ble with the same √ performance guarantees as for Unit Disk a glaring simplification of reality, since, even if all network
Graphs if d ≥ 1/ 2. nodes are homogeneous, this model does not account for the
presence of obstacles, such as walls, buildings, mountains—
or also weather conditions—, which might obstruct signal
Categories and Subject Descriptors propagation. On the other hand, Unit Disk Graphs are sim-
F.2.2 [Analysis of Algorithms and Problem Complex- ple enough to promote strong theoretical results (such as the
ity]: Nonnumerical Algorithms and Problems—geometrical cost for routing [20, 21] or topology control [1, 11, 30]).
problems and computations, routing and layout;
G.2.2 [Discrete Mathematics]: Graph Theory—network In this paper we study a graph model which is considerably
problems; closer to reality [4]. We maintain the assumption that all
C.2.2 [Computer-Communication Networks]: Network mobile nodes are placed in the plane (that is, they have co-
Protocols—routing protocols ordinates in Ê2 ). In a Quasi Unit Disk Graph, two nodes are
connected by an edge if their distance is less than or equal
General Terms to d, d being a parameter between 0 and 1. Furthermore, if
Algorithms, Performance, Theory the distance between two nodes is greater than 1, there is
no edge between them. In the range between d and 1 the
existence of an edge is not specified.
Keywords
Ad-Hoc Networks, Face Routing, Flooding, Geometric Rout- In this paper we first establish a constructive lower bound
ing, Mobile Computing, Modeling, Unit Disk Graphs, Wire- for Quasi Unit Disk Graphs showing that basically any al-
less Communication. gorithm without routing tables requires sending of Ω ( dc )2
∗The work presented in this paper was supported (in part) messages to route from a source s to a destination t, where c
is the length of the shortest path between s and t. We show
by the National Competence Center in Research on Mobile
Information and Communication Systems (NCCR-MICS), a that, with the aid of a topology control graph structure, a
center supported by the Swiss National Science Foundation restricted flooding algorithm is guaranteed not to perform
under grant number 5005-67322. worse and that this technique is consequently asymptotically
message-optimal.
As stated above, in original geometric routing a node is al- Figure 1: Message Complexity Lower Bound for
lowed to store messages only temporarily before relaying Volatile Memory Routing Algorithms on Quasi-
them. In order to enable an algorithm to employ flooding, UDGs
this assumption can be relaxed:
Definition 3.4. (Geometric Volatile Memory Rout- Finally, since we consider message complexities in this pa-
ing Algorithm) A geometric volatile memory routing al- per, we define the cost of a path according to the link dis-
gorithm is a volatile memory routing algorithm additionally tance metric, that is, the cost of a path is the number of
observing the first three rules of the definition of geometric edges on the path. Similarly, we consider spanner graphs
routing algorithms. with respect to the link distance metric: A graph G =
(V, E ) is a spanner of a graph G = (V, E) with stretch fac-
tor k iff for any pair of nodes (u, v) the cost of the shortest
In the following we provide a concise overview of basic con- path on G is at most k times the cost of the shortest path
cepts of distributed computing vital for the understanding on G.
of this paper. More detailed descriptions can be found in
textbooks, such as in [23].
4. LOWER BOUND
At certain points of the paper we have to distinguish between In this section, we present a lower bound on the message
the synchronous and the asynchronous model of distributed complexity of any volatile memory routing algorithm.
computation. In the synchronous model, communication
delays are assumed to be bounded. As a consequence it can
Theorem 4.1. Let c be the cost of a shortest path from s
be assumed that all processes running on different network
to t. There exist graphs on which any (randomized) volatile
nodes perform their message sending and receiving opera-
memory routing algorithm has (expected) message complex-
tions in simultaneous and globally clocked rounds. In the
ity Ω(( dc )2 ).
asynchronous model, message delays are unbounded. No
assumptions can be made on the duration of single process
operations. Proof. We provide a constructive proof by describing a
class of graphs for which the theorem holds.
Two fundamental measures in distributed computing are
message and time complexity. The message complexity of The basic element used for the construction of these graphs
a distributed algorithm is the total number of messages sent is formed by k nodes (k to be determined later) equidistantly
during its execution. The definition of time complexity de- placed on a line, such that the distance between two adja-
pends on the synchrony model: In the synchronous model, cent nodes is d + ε for a small ε > 0 (cf. vertical chains in
time complexity is the total number of rounds elapsed be- Figure 1). There exists an edge between every pair of nodes
tween algorithm start and algorithm termination. In the (u, v), such that ( d1 −1) d < |uv| ≤ 1, that is, the nodes are
asynchronous model such a simple time model cannot natu- connected by all the edges with maximum Euclidean length
rally be obtained, since the transmission delay of a message not greater than 1. In addition there is a head node having
is unbounded. The common solution to this is the assump- an edge to each one of the first d1 − 1 nodes on the line
tion that the message delay is at most one time unit. (the head node has to be located such that all additional
edges have length at most 1). As shown in Figure 1, k such
vertical chains are placed side by side with distance d + ε
such that the nodes form a matrix. The head nodes of these
chains now are interconnected in a way that they among
themselves have the same chain structure (uppermost row
in Figure 1) with their head node (of second order) denoted
by s. The node t—located near the bottom right corner of
the node matrix—is connected to one of the end nodes of
exactly one of the vertical chains by a simple chain of nodes.
Note that the constructed graph is a Quasi Unit Disk Graph.
1. s sending m to its associated cluster head s, The time complexity follows from the fact that the BFS tree
2. routing m from s to t, the cluster head associated to constructed during the flooding phase contains a shortest
t , and path from s to t. Since GBG is a log( d1 )-spanner of G, the
shortest path on GBG , on which the algorithm is executed,
3. t sending m to t . is c · log( d1 ). The time complexity of a single flooding-echo
round being proportional to τ and again the total time com-
plexity asymptotically being dominated by the maximum τ
Since steps 1 and 3 incur only constant cost with respect to
used, the time complexity follows.
both message and time complexity, we exclusively consider
step 2 in the remaining part of the paper. Whenever men-
tioning a source s or a destination t we therefore assume In the asynchronous model the synchronizer construction
that s and t are cluster heads. introduced in [3] can be employed.
Theorem 6.2. When employed on GBG in the asynchro- routing algorithm is asymptotically optimal with respect to
nous model, the Echo algorithm reaches the destination with message complexity. In particular, the Echo algorithm does
message complexity O ( dc )2 · log3 ( dc ) and time complexity not terminate only when finding t, but already when find-
O c · log( d1 ) · log3 ( dc ) , where c is the cost of the shortest ing a node v which is significantly closer to t than the local
path between s and t. minimum, as described in Step 2 of the GEcho algorithm:
Lemma 7.3. The total number of messages sent in Echo Lemma 8.1. Let e = (u, v) be an edge and w be a node
mode is at most O ( dc )2 .
which is in the disk with diameter (u, v). Either u and w or
Proof. We obtain the total number of messages sent in v and w are connected by an edge.
Echo mode by summing up over all nodes ever contained in a
circle bounding Echor . Since the number of nodes contained
in a given circular area is asymptotically proportional to √1 √1
111111111111
000000000000
2 0000000000000
1111111111111
2
the size of the area, it is sufficient to compute the total
area covered by all Echor bounding circles. Let ri = 2i , i =
000000000000
111111111111
000000000000
1111111111110000000000000
1111111111111
0000000000000
1111111111111
000000000000
111111111111
w 0000000000000
1111111111111
1, 2, 3, . . . denote the radii of the Echo bounding circles. The 000000000000
111111111111
C
000000000000
1111111111110000000000000
1111111111111
0000000000001111111111111
0000000000000
maximum ri can be found by the observation that (1) all
1111111111110000000000000
1111111111111
Echo restricting circles have their centers at a node closer 0000000000001111111111111
1111111111110000000000000
to t than s and (2) the circle centered at any node closer to 000000000000
111111111111
000000000000
1111111111110000000000000
1111111111111
t than s having radius 2 c completely contains the shortest 0000000000001111111111111
1111111111110000000000000
0000000000000
1111111111111
000000000000
111111111111
000000000000
1111111111110000000000000
1111111111111
0000000000001111111111111
0000000000000
path. Since the value of r in Echor is obtained by doubling, u v
the maximum ri used over all is less than 4 c; the maximum 1111111111110000000000000
1111111111111
i reached is consequently log(4 c) . With ni being the total 0000000000001111111111111
1111111111110000000000000
000000000000
111111111111
000000000000
1111111111110000000000000
1111111111111
0000000000001111111111111
0000000000000
number of bounding circles used with radius ri , we obtain
1111111111110000000000000
1111111111111
log(4 c)
000000000000
111111111111
0000000000001111111111111
1111111111110000000000000
0000000000000
1111111111111
ni · πri2
A=
000000000000
111111111111
0000000000001111111111111
1111111111110000000000000
0000000000000
1111111111111
000000000000
111111111111
0000000000001111111111111
0000000000000
i=0
for the total covered area A. Using Lemma 7.2 we obtain 1111111111110000000000000
1111111111111
log(4 c)
|st|
A ≤ π· − 1 · ri2
i=0
q ri
Figure 3: w is either connected to u or to v
log(4 c) log(4 c)
|st| πc
< π· · ri ≤ · 2i
q (|st|≤c) q
i=0 i=0 Proof. The following proof is illustrated by Figure 3.
π c 2log(4 c)+1 − 1 Because |uv| ≤ 1, the regions of√the points whose distances
= · ∈ O c2 .
q 3 √ C
to u and v are greater than 1/ 2 do not intersect inside
A
(hatched areas
√ in Figure 1). Thus either |uw| ≤ 1/ 2 or
The Area A containing at most O d2
nodes (cf. Section 5), |vw| ≤ 1/ 2. In the picture, this holds for u and w and
the lemma follows. therefore there is an edge between the two nodes in G.
[18] E. Kranakis, H. Singh, and J. Urrutia. Compass [30] R. Wattenhofer, L. Li, P. Bahl, and Y.-M. Wang.
Routing on Geometric Networks. In Proc. 11 th Distributed Topology Control for Power Efficient
Canadian Conference on Computational Geometry, Operation in Multihop Wireless Ad Hoc Networks. In
pages 51–54, Vancouver, August 1999. Proc. of the 20 th Annual Joint Conference of the
IEEE Computer and Communications Societies
(INFOCOM), pages 1388–1397, 2001.