13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

On the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency 217that its bandwidth violation is the most. Then, we will fix the transmission radiiof the nodes <strong>in</strong> the vic<strong>in</strong>ity of the node found <strong>in</strong> violation of the capacity constra<strong>in</strong>t.If a path be<strong>in</strong>g overheard <strong>by</strong> the node with the capacity violation turnsout to consist of a two-hop sub-path and two correspond<strong>in</strong>g transmission radiicover that constra<strong>in</strong>ed node, we will reduce it to one-hop path if possible. Theidea is taken from the triangulation relaxation of the shortest path construction.Note that when we compute the m<strong>in</strong>imum energy path, the relaxation step <strong>by</strong>add<strong>in</strong>g an edge to any exist<strong>in</strong>g path can reduce the cost of a specific node. Tothis end, we have computed the m<strong>in</strong>imum energy path but we would like tosatisfy the bandwidth constra<strong>in</strong>t <strong>by</strong> sacrific<strong>in</strong>g energy consumption. Hence, wewill take the reverse procedure of the relaxation step. We will select the firsttwo-hop sub-path with such property, and after we replace it <strong>by</strong> a s<strong>in</strong>gle relay,we will remove the load from these two hops and recalculate the load for thenew s<strong>in</strong>gle transmission. This exam<strong>in</strong>ation process will cont<strong>in</strong>ue until no nodehandl<strong>in</strong>g or overhear<strong>in</strong>g the traffic or no path re-construction has been made.This approach differs from the previous one <strong>in</strong> the process of repair<strong>in</strong>g path.The previous algorithm considers the reconstruction of the entire path whilethis approach considers the subsection of a path that causes the bandwidth constra<strong>in</strong>tviolation. Aga<strong>in</strong>, it is totally with<strong>in</strong> reason to end up with an <strong>in</strong>feasibleconfiguration.3 Simulation StudyThe cost we computed captures the global energy consumption. After we constructthe paths from all source-dest<strong>in</strong>ation pairs, we compute the total transmissionenergy consumption. If a node is <strong>in</strong>volved the communication of differentsource-dest<strong>in</strong>ation pair, its transmission power may not be the same <strong>in</strong> these differentpaths. As a result, we consider the total transmission power Energy[i ][j]for a particular path, and us<strong>in</strong>g T i,j as the weight for each paths’ transmissionpower, the average global energy consumption is equal to the sum of T i,j x Energy[i][j].That is, further<strong>in</strong>g the concept of an ideal MAC, the cost calculationassumes that a node can vary its transmission power depend<strong>in</strong>g on the dest<strong>in</strong>ationof the packet be<strong>in</strong>g handled each time. The simulations were conducted withrandomly placed nodes with<strong>in</strong> a 1500x500 rectangular area and without nodemobility. The capacity of each node, C, was the unit of bandwidth, hence C=1throughout the simulations. The traffic load matrix, T i,j , was produced <strong>in</strong> a randomfashion. Specifically, each element of T i,j , is uniformly randomly generatedto be a demand between 0 and L/2(N-1) (where L is a parameter controll<strong>in</strong>gthe relative load over all nodes and N is the number of nodes). The particularformula guarantees that the sum of traffic orig<strong>in</strong>at<strong>in</strong>g from source i is less thanwhich guarantees that the load of another nodes due to forward<strong>in</strong>g the load ofthis source-dest<strong>in</strong>ation pair is go<strong>in</strong>g to be less than 1 (i.e. A i =y:x=i∧ j ∈V ∧ y= ∑ T x,j ≤ 1 ). Note however the restriction of the traffic matrix andcapacity generation is not sufficient to avoid <strong>in</strong>feasible solution scenarios. Therelative load is a predef<strong>in</strong>ed parameter while the absolute load is def<strong>in</strong>ed as the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!