Short Labeling Schemes for Topology Recognition in Wireless Tree Networks
نویسندگان
چکیده
We consider the problem of topology recognition in wireless (radio) networks modeled as undirected graphs. Topology recognition is a fundamental task in which every node of the network has to output a map of the underlying graph i.e., an isomorphic copy of it, and situate itself in this map. In wireless networks, nodes communicate in synchronous rounds. In each round a node can either transmit a message to all its neighbors, or stay silent and listen. At the receiving end, a node v hears a message from a neighbor w in a given round, if v listens in this round, and if w is its only neighbor that transmits in this round. Nodes have labels which are (not necessarily different) binary strings. The length of a labeling scheme is the largest length of a label. We concentrate on wireless networks modeled by trees, and we investigate two problems. • What is the shortest labeling scheme that permits topology recognition in all wireless tree networks of diameter D and maximum degree ∆? • What is the fastest topology recognition algorithm working for all wireless tree networks of diameter D and maximum degree ∆, using such a short labeling scheme? We are interested in deterministic topology recognition algorithms. For the first problem, we show that the minimum length of a labeling scheme allowing topology recognition in all trees of maximum degree ∆ ≥ 3 is Θ(log log ∆). For such short schemes, used by an algorithm working for the class of trees of diameter D ≥ 4 and maximum degree ∆ ≥ 3, we show almost matching bounds on the time of topology recognition: an upper bound O(D∆), and a lower bound Ω(D∆ ), for any constant < 1. Our upper bounds are proven by constructing a topology recognition algorithm using a labeling scheme of length O(log log ∆) and using time O(D∆). Our lower bounds are proven by constructing a class of trees for which any topology recognition algorithm must use a labeling scheme of length at least Ω(log log ∆), and a class of trees for which any topology recognition algorithm using a labeling scheme of length O(log log ∆) must use time at least Ω(D∆ ), on some tree of this class. keywords: topology recognition, wireless network, labeling scheme, feasibility, tree, time ∗Département d’informatique, Université du Québec en Outaouais, Gatineau, Québec J8X 3X7, Canada. [email protected] †Département d’informatique, Université du Québec en Outaouais, Gatineau, Québec J8X 3X7, Canada. [email protected]. Partially supported by NSERC discovery grant 8136–2013 and by the Research Chair in Distributed Computing at the Université du Québec en Outaouais. ar X iv :1 70 4. 01 92 7v 1 [ cs .D C ] 6 A pr 2 01 7
منابع مشابه
Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks
Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...
متن کاملCongestion Control Approaches Applied to Wireless Sensor Networks: A Survey
Wireless Sensor Networks (WSNs) are a specific category of wireless ad-hoc networks where their performance is highly affected by application, life time, storage capacity, processing power, topology changes, the communication medium and bandwidth. These limitations necessitate an effective data transport control in WSNs considering quality of service, energy efficiency, and congestion control. ...
متن کاملA Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks
Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملA Novel Multicast Tree Construction Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks
Many appealing multicast services such as on-demand TV, teleconference, online games and etc. can benefit from high available bandwidth in multi-radio multi-channel wireless mesh networks. When multiple simultaneous transmissions use a similar channel to transmit data packets, network performance degrades to a large extant. Designing a good multicast tree to route data packets could enhance the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017