Professional Documents
Culture Documents
ABSTRACT
The design of an efficient and effective protocol for topology control in mobile ad
hoc networks is a challenging task. In this paper, we present a brief review of
protocols reported in the literature and propose a protocol for topology control in
mobile ad hoc networks. Our protocol relys on leader election and density based
clustering. A problem that may occur in cluster based topology control is usually
known as alien-soldier-node problem. We discuss a framework for avoiding alein-
soldier-node problem.
⎧⎪ ⎛ t 2 + r 2 − R2 ⎞
A(t , r , R) = r 2 ⎨arccos ⎜ ⎟
⎩⎪ ⎝ 2tr ⎠
t 2 + r 2 − R2 ⎡ 2 2 ⎫
( )
1/ 2
2 2⎤
− − 2
+ 2
−
⎦⎥ ⎬⎭
4t r t r R
2tr ⎣⎢
(2)
⎪⎧ ⎛ t 2 + R2 − r 2 ⎞
+ R ⎨arccos ⎜
2
⎟
⎩⎪ ⎝ 2tR ⎠
Figure 5: Regions for symmetric and asymmetric t 2 + R2 − r 2 ⎡ 2 2 2 1/ 2 ⎫
link formation. − 4t R − ( t 2 + R 2 − r 2 ) ⎤ ⎬
2tR ⎣⎢ ⎦⎥ ⎭
same cluster to act as leader and divides the nodes in
the neighborhood of it with the newly appointed For r=R this simplifies to
leader. The new leader then announces its neighbors
⎛ t ⎞ 1
⎟ − t ( 4R − t )
that it is now their leader. The previous leader also 2 1/ 2
informs about the newly appointed leader to the A(t , R ) = 2 R 2 arccos ⎜ 2
(3)
⎝ 2R ⎠ 2
other cluster leaders. Note that MaxNodes is at least
greater than twice of the MinNodes to divide a Assuming an omni-directional antenna, if R
cluster into two clusters. denotes the transmission range of both the nodes,
A peculiar characteristic of this protocol is that then there will be a symmetric link between the two
we did not make use of specialized graphs like unit nodes if and only if t ≤ R (it is assumed that signal
disk graphs, etc. However, the efficiency of the
strength beyond R is below a threshold value
protocol depends, to some extent, on the user-defined
required to set up a link). In this case, the area of
parameters. Therefore, the parameters like ε ,
intersection of the two nodes is,
MinNodes, MaxNodes should be selected carefully to
provide good performance in terms of target
⎛ 2π 3⎞
topology or connectivity. The characterization of AIS = R 2 ⎜⎜ − ⎟
these parameters is beyond the scope of this paper ⎝ 3 2 ⎟⎠
due to space limitations.
In what follows, we present an analysis of what which is the area of interference between the two
should be the transmission range of nodes so as to nodes. This completes the proof.
avoid alien-soldier-node problem.