13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

236 G. Cal<strong>in</strong>escu and P.-J. Wan3.5 4.5v 1 v 1 v 2vv124v 2v 4 4v 3v 4v 3 v 4v 33 34.54.5(a)(b)(c)Fig. 1. The network topology: (a) the nodes and their transmission ranges, (b) theasymmetric topology, and (c) symmetric topology.relay<strong>in</strong>g <strong>by</strong> <strong>in</strong>termediate nodes otherwise. Omnidirectional antennas are used<strong>by</strong> all nodes to transmit and receive signals. Such antennas are attractive dueto their broadcast nature. A s<strong>in</strong>gle transmission <strong>by</strong> a node can be received <strong>by</strong>many nodes with<strong>in</strong> its vic<strong>in</strong>ity. We assume that every node can dynamicallyadjust its transmitt<strong>in</strong>g power based on the distance to the receiv<strong>in</strong>g node andthe background noise. In the most common power-attenuation model [22], thesignal power falls as 1dwhere d is the distance from the transmitter antennaκand κ is a real constant between 2 and 5 dependent on the wireless environment.We assume that all receivers have the same threshold for signal detection, andnormalize this threshold to one. With these assumptions, the power required tosupport a l<strong>in</strong>k between two nodes separated <strong>by</strong> a distance d is d κ .The network topology of a wireless ad hoc network, which consists of allpossible one-hop communication l<strong>in</strong>ks among the nodes, is determ<strong>in</strong>ed <strong>by</strong> thetransmission ranges of the nodes. Depend<strong>in</strong>g on whether unidirectional l<strong>in</strong>ks orbidirectional l<strong>in</strong>ks are used for communications, the network topology is represented<strong>by</strong> either a directed graph referred to as the asymmetric topology, oranundirected graph referred to as the symmetric topology. In the asymmetric topology,there is an arc from a node u to another node v if and only v is with<strong>in</strong> thetransmission range of u. In the symmetric topology, there is an edge between twonodes u and v if and only they are with<strong>in</strong> the transmission ranges of each other.An example is depicted <strong>in</strong> Figure 1. Figure 1 (a) gives the positions and thetransmission ranges of all nodes. The asymmetric topology and the symmetrictopology are given <strong>in</strong> Figure 1 (a) and (b) respectively.Connectivity is one of the most important properties of an wireless ad hocnetwork. By asymmetric k-node (resp., k-edge) connectivity we mean the asymmetrictopology is k-node (resp., k-edge) (strongly) connected, and <strong>by</strong> symmetrick-node (resp., k-edge) connectivity we mean the symmetric topology is k-node

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!