Professional Documents
Culture Documents
A. Analysis least
The next lemma establishes the correctness of the algorithm. ps = p(1 p)125+12 = p(1 p)72 .
Lemma IV.1: When the algorithm terminates, the last active We have that for any constant 0 < p < 1, ps is constant and thus
node has data collected from all nodes. the expected number of nodes that do not transmit successfully
Proof: Consider a round in which an active node u be- during a round is at most n (1 ps ). Let c = ps /2. Using
comes inactive. We argue that the data held by u has been de- Markov inequality we get that the number of nodes that do not
livered to another node, which will be active at the beginning of transmit successfully during a round is at least n (1 ps )
the next round. Note that u must have at least one out-neighbor, (1 c)1 with probability at most (1 c), which yields that the
say v. Since there was no collision among us out-neighbors, event the number of nodes which transmit successfully during
us transmission must have been received successfully by v. We a round is at least n n 1p
1c n c holds with probability at
s
claim that v will be active at the beginning of the next round. least c.
Observe that v did not transmit during this round, otherwise us In the actual implementation of our algorithm, we will se-
transmission would have collided with vs own transmission. lect p that maximizes the probability of successful transmission,
Therefore, v cannot become inactive at the end of the round, that is p(1 p)72 . Now we are ready to show the main theorem.
which establishes the lemma. Theorem IV.4: The expected running time of the DC algo-
Now we will analyze the performance of our algorithm. First rithm is O(log n) and the algorithm terminates properly.
we need some auxiliary lemmas. Intuitively, the next lemma Proof: We say that round i is progressive iff a fraction
bounds the number of collisions by establishing an upper bound c of active nodes become inactive or there remains only one
on the maximum in-degree in Gt . active node, where constant c is taken from the statement of
Claim IV.2: The in-degree of any node in Gt is at most 6. Lemma IV.3. Note that the termination time of the DC al-
Proof: Suppose towards a contradiction that a node w in gorithm is less that or equal to the time of the log 1c (1/n)-th
Gt has in-degree larger than 6. We have that there are at least 7 progressive round, since after log1c (1/n) progressive rounds
nodes that are closer to w than to each other and there must be the number of active nodes is at most
a triangle formed by two of them u, v, and w in which the angle
6 uwv is less than /3. Thus, the biggest angle in this triangle,
n (1 c)log1c (1/n) = 1.
say 6 wuv, is greater than /3. However, in this case we obtain Lemma IV.3 implies that round i is progressive with probability
that d(v, u) must be smaller than d(v, w), which contradicts our at least c. Hence, the expected termination time of the DC
assumption. algorithm is at most
Now we will analyze the rate of data convergence. We say
1
that a transmission of a node u at the beginning of a round is E( ) log1c (1/n) = O(log n) .
successful if all of its out-neighbors successfully receive us c
transmission. Note that each active node u becomes inactive The correctness of the algorithm follows by Lemma IV.1.
at the end of the round after successful transmission. In the fol- The next theorem establishes a general lower bound of
lowing lemma we show that a constant fraction of active nodes (log n), which matches our upper bound up to a constant fac-
transmit successfully during a round. tor.
Lemma IV.3: There is a constant 0 < c < 1 such that with Theorem IV.5: The expected running time of any converge-
probability at least c, the fraction of active nodes that perform cast algorithm in an arbitrary network is at least (log n).
successful transmission in round t is at least c. Proof: Note that each node, except the last one, must suc-
Proof: Consider a round t and the corresponding graph cessfully transmit at least once to deliver its own data. Without
Gt . By Claim IV.2, the in-degree of each node in V t is bounded loss of generality, assume that each node successfully transmits
by 6. That implies that the average out-degree among the nodes exactly once since we can accommodate all the data in the last
in V t is also bounded by 6. We obtain that at least half of transmission. When a node transmits, the receiving node is
the nodes in V t have out-degree of at most 12. Let us calcu- busy, i.e., it cannot transmit itself. Therefore, the number of
late the probability of successful transmission of such a node u. nodes that have not transmitted yet is decreased by at most a
This probability is exactly the probability that u transmits while factor of two during a time step, which yields the theorem.
all its out-neighbors and the in-neighbors of its out-neighbors
(other than u) remain silent. According to Claim IV.2, each of V. E NERGY /L ATENCY T RADE - OFF
us out-neighbors may have at most 6 in-neighbors including u. In this section we study the trade-off between the energy and
Therefore, the probability of successful transmission for u is at the latency of convergecast. We will also consider centralized
algorithms, since we wish to study only this specific trade-off root. We claim that the distance between any two nodes in Si is
and not the lack of coordination between nodes. We assume at least Rit . If it is not the case, at least one node has its trans-
that there is a designated root node r that must collect the data mission range larger than the distance to the closest active node,
from all nodes. which contradicts the definition of R1t , R2t , , Rit . We obtain
that Z iRit since OP T must connect all these nodes to the
A. Minimum Energy Convergecast root.
Hence, the energy consumption of the distributed converge-
First we describe a minimum-energy convergecast algorithm. cast algorithm during round t is at most
The Minimum Spanning Tree (MST) algorithm proposed by
Chen and Huang [7] and analyzed by Kirousis et al. [23] im- X
m X
m
2 2
t
plicitly finds an optimal solution for the minimum-energy con- EDC (Z/i)2 = Z 2 1/i2 Z .
6
vergecast in polynomial time. First we construct an undirected i=1 i=1
complete graph G0 on the set of nodes V , where the cost of an
edge (u, v) is the energy required to establish this edge, that is On the other hand,
d(u, v)2 . Then we find an MST of G0 and orient all edges to-
COP T n(Z/n)2 ,
ward r. Finally, we construct a collision-free schedule in which
the data from all nodes is collected by r and each edge is tra-
since the transmission power is minimized when all nodes are
versed exactly once. The optimality of this solution follows
evenly spaced. Dividing the bound for EDCt
by the bound for
from the fact that OP T must have a directed spanning tree
COP T we conclude the proof of the lemma.
rooted at r as a sub-graph of the family of all the communi-
Now we establish an upper bound on the total energy of the
cation graphs created during its execution. Note that the data
distributed convergecast algorithm.
from each node must eventually reach r. The latency of the so-
lution produced by the MST algorithm is at least the length of Theorem V.3: The total energy consumption of the DC al-
2
the longest path between a leaf and r hence (n) latency for gorithm at most 6 n log n COP T .
some geometric topologies (unlike our DC algorithm). The theorem follows directly from Theorem IV.4 and Lemma
V.2.
B. Energy Consumption by the DC Algorithm
Now let us consider the energy consumption of our dis- C. Analysis of Line Topology
tributed convergecast DC algorithm. We assume that r is the Finally, we show that a blowup of (n) in the energy con-
last active node in the execution. The next claim bounds from sumption may be necessary to achieve a convergecast latency
above the energy consumption by the DC algorithm during the of O(log n), even in case of centralized algorithms. Consider a
first round. line topology, where the root is the last node and the distance
Claim V.1: The energy spent by the DC algorithm during between any two consecutive nodes is d.
the first time step is at most COP T . It is not hard to see that the minimum energy convergecast
Proof: Note that at time t = 0 for each node u we have algorithm OP T during round i < n transmits from node i to
that the transmission range of u is the distance to the closest node i + 1 the data collected from nodes 1, . . . , i. Thus, OP T
neighbor v in V . On the other hand, in the MST algorithm has latency n 1 and energy consumption of (n 1) d2 . Now
u transmits to some node w, not necessarily the closest one. we bound from below the energy required by any fast converge-
Hence, the transmission energy of u during the first time step cast algorithm.
of the distributed convergecast algorithm, d(u, v)2 , is at most Theorem V.4: On a line, any convergecast algorithm that has
the transmission energy of u during the execution of OP T , running time O(log n) requires energy (n2 d2 ), where d is the
d(u, w)2 . The claim follows by summing the energy over all distance between two consecutive nodes.
nodes. Proof: The proof of Theorem IV.5 implies that in order
Next we derive an upper bound on the energy spent by the to achieve a latency of O(log n), one has to assure that in each
distributed convergecast algorithm in any of the consequent round a constant fraction of active nodes pass their data to adja-
rounds. cent active nodes and become inactive. However, in this case
Lemma V.2: The energy spent by the DC algorithm during the transmission ranges of active nodes grow exponentially.
2
a round t is at most 6 n COP T . Note that the minimum energy is attained if all active nodes
Proof: Consider a round t and let m n be the num- are evenly spaced. We obtain that the total energy consumption
ber of active nodes. Enumerate the nodes in the order of non- of any fast convergecast algorithm is proportional to
increasing transmission range:
Xn
log Xn
log
R1t R2t Rm
t
. 2(log n)i (2i d)2 = n 2i d2 = (n2 d2 ).
i=0 i=0
Let Z be the sum of the transmission ranges of the nodes un-
der OP T (we consider the family of all OP T s communication
graphs during its execution). We claim that Rit Z/i. Con- Therefore, any fast convergecast algorithm on a line requires
sider the set of nodes Si containing the first i nodes and the (n) times the minimum energy.
VI. C ONCLUSION [17] I. Gaber, Y. Mansour. Broadcast in radio networks. In Proc. of 6th Annual
ACM-SIAM Symposium on Discrete Algorithms (SODA1995), 577585,
In this paper we consider ad hoc geometric radio networks. 1995.
We present a very simple randomized distributed algorithm [18] L. Gasieniec, A. Lingas. On adaptive deterministic gossiping in ad hoc
radio networks. Information Processing Letters, 83:8994, 2002.
with the expected running time O(log n) and establish a match- [19] L. Gasieniec, I. Potapov. Gossiping with unit messages in known radio
ing general lower bound of (log n). Our results show that hav- networks. In Proc. of 2nd IFIP International Conference on Theoretical
ing variable transmission ranges allows to achieve logarithmic Computer Science (TCS2002), 193205.
[20] L. Gasieniec, I. Potapov, Q. Xin. Time efficient gossiping in known ra-
convergecast latency, to the contrary with (n) latency needed dio networks. In Proc. of 11th Colloquium on Structural Information and
when the transmission ranges are fixed. Then we study the Communication Complexity (SIROCCO2004), LNCS 3104, 173184.
[21] L. Gasieniec, T. Radzik, Q. Xin. Faster deterministic gossiping in di-
trade-off between the energy and the latency of convergecast. rected ad-hoc radio networks. In Proc. of 9th Scandinavian Workshop on
Some interesting future research directions are to consider Algorithm Theory (SWAT2004), LNCS 3111, 397407.
networks without collision detection, establish better bounds on [22] J. Hightower and G Borriello. Location Systems for Ubiquitous Comput-
ing. IEEE Computer, 34(8):5766, 2001.
the energy consumption of our algorithm and develop determin- [23] L.M. Kirousis, E. Kranakis, D. Krizanc, A. Pelc. Power consumption
istic convergecast algorithms. Another open question is to find in packet radio networks. Theoretical Computer Science, 243:289-305,
a trade-off between the latency and the power consumption for 2000.
[24] D. Kowalski, A. Pelc. Broadcasting in undirected ad hoc radio networks.
the whole range of possible latency values here we argued In Proc. of 22nd ACM Symposium on Principles of Distributed Computing
only about two extreme cases, namely the latency of (log n) (PODC2003), 7382.
[25] D. Kowalski, A. Pelc. Time complexity of radio broadcasting: adap-
and (n). tiveness vs. obliviousness and randomization vs. determinism. In Proc.
of 10th Colloquium on Structural Information and Communication Com-
plexity (SIROCCO2003), 195210, 2003.
R EFERENCES [26] K. Krizman, T. Bieda and T. Rappaport. Wireless position location: fun-
damentals, implementation strategies, and source of error. In Proc. of Veh.
[1] N. Alon, A. Bar-Noy, N. Linial, D. Peleg. A lower bound for radio broad- Tech. Conference, 919923, 1997.
cast. Journal of Computer and System Sciences, 43:290298, 1991. [27] E. Kushilevitz, Y. Mansour. An (D log(N/D)) lower bound for broad-
[2] V. Annamalai, S. K. S. Gupta, L. Schwiebert. On tree-based converge- cast in radio networks. SIAM J. on Computing, 27:702712, 1998.
casting in wireless sensor networks. WCNC 2003 - IEEE Wireless Com- [28] D. Liu, M. Prabhakaran. On randomized broadcasting and gosiping in
munications and Networking Conference, 4(1):19421947, Mar. 2003. radio networks. In Proc. of 8th Annual International Conference on
[3] R. Bar-Yehuda, O. Goldreich, A. Itai. On the time complexity of broad- Computing and Combinatorics (COCOON2002), LNCS 2387, 340349,
cast in radio networks: an exponential gap between determinism and 2002.
randomization. Journal of Computer and System Sciences, 45:104126, [29] A. Nasipuri and K.Lim. A Directionality based Location Discovery
1992. Scheme for Wireless Sensor Networks. In Proc. of WSNA2002.
[4] M. Cagalj, J. P. Hubaux, C. Enz, Minimum-energy broadcast in all- [30] C. Perkins. Ad hoc networking: an introduction. In C. Perkins, ed. Ad
wireless networks: NP-completeness and distribution issues. In Proc. Hoc Networking, 314318, 2001.
of the 8th Annual International Conference on Mobile Computing and [31] T. S. Rappaport. Wireless Communications: Principles and Practices.
Networking (MobiCom02), 172182, 2002. Prentice Hall, 1996.
[5] G. Calinescu. Computing 2-Hop Neighborhoods in Ad Hoc Wireless Net- [32] S. Upadhyayula, V. Annamalai, S. K. S. Gupta. A low-latency and energy-
works. In Proc. Adhoc-Now 03. efficient algorithm for convergecast in wireless sensor networks. GLOBE-
[6] J. Cartigny, D. Simplot, I. Stojmenovic. Localized minimum-energy COM 2003 - IEEE Global Telecommunications Conference, 22(1):3525
broadcasting in ad-hoc networks. In Proc. of the 22nd Annual Joint 3530, Dec. 2003.
Conference of the IEEE Computer and Communications Societies (IN- [33] P. J. Wan, G. Calinescu, X. Y. Li, O. Frieder. Minimum-energy broadcast
FOCOM03), 2003. routing in static ad hoc wireless networks. Wireless Networks, 2002.
[7] W.T. Chen, N.F. Huang, The Strongly Connecting Problem on Multihop [34] J. E. Wieselthier, G. D. Nguyen, A. Ephremides. Energy-Efficient Broad-
Packet Radio Networks. IEEE Trans. Commun., 37(3):293295, 1989. cast and Multicast Trees in Wireless Networks, Mobile Networks and
[8] I. Chlamtac, O. Weinstein. The wave expansion approach to broadcasting Applications (MONET), 7(6):481492, 2002.
in multihop radio networks. IEEE Trans. on Communications, 39:426
433, 1991.
[9] B.S. Chlebus, L. Gasieniec, A. Lingas, A. Pagourtzis. Oblivious gossip-
ing in ad-hoc radio networks. In Proc. of 5th International Workshop on
Discrete Algorithms and Methods for Mobile Computing and Communi-
cations (DIALM2001), 4451, 2001.
[10] M. Christersson, L. Gasieniec, A. Lingas. Gossiping with bounded size
messages in ad-hoc radio networks. In Proc. of 29th International Collo-
quium on Automata, Languages and Programming (ICALP2002), 377
389.
[11] M. Chrobak, L. Gasieniec, D. Kowalski. The wake-up problem in multi-
hop radio networks. In Proc. of 15th ACM-SIAM Symposium on Discrete
Algorithms (SODA2004), 985993, 2004.
[12] M. Chrobak, L. Gasieniec, W. Rytter. Fast broadcasting and gossiping in
radio networks. In Proc. of 41st Symposium on Foundations of Computer
Science (FOCS2000), 575581, 2000.
[13] A.E.F. Clementi, A. Monti, R. Silvestri. Selective families, superimposed
codes, and broadcasting on unknown radio networks. In Proc. of 12th An-
nual ACM-SIAM Symposium on Discrete Algorithms (SODA2001), 709
718, 2001.
[14] A. Czumaj, W. Rytter. Broadcasting algorithms in radio networks with
unknown topology. In Proc. 44th Ann.Symposium on Foundations of
Computer Science (FOCS2003), 492501, 2003.
[15] A. Dessmark, A. Pelc. Tradeoffs between knowledge and time of commu-
nication in geometric radio networks. In Proc. of 13th Ann. ACM Sym-
posium on Parallel Algorithms and Architectures (SPAA2001), 5966,
2001.
[16] M. Frodigh, P. Johansson, P. Larsson. Wireless ad hoc networking - The
art of networking without a network. Ericsson Review, 4:248263, 2000.