This document corresponds to the accepted manuscript of the article Kluge, R., Stein, M., Varró, G., Schürr, A., Hollick, M., Mühlhäuser, M.: "A Systematic Approach to Constructing Incremental Topology Control Algorithms using Graph Transformation," in: JVLC 2016. The URL of the formal version is https://dx.Communication networks form the backbone of our society. Topology control algorithms optimize the topology of such communication networks. Due to the importance of communication networks, a topology control algorithm should guarantee certain required consistency properties (e.g., connectivity of the topology), while achieving desired optimization properties (e.g., a bounded number of neighbors). Real-world topologies are dynamic (e.g., because nodes join, leave, or move within the network), which requires topology control algorithms to operate in an incremental way, i.e., based on the recently introduced modifications of a topology. Visual programming and specification languages are a proven means for specifying the structure as well as consistency and optimization properties of topologies. In this paper, we present a novel methodology, based on a visual graph transformation and graph constraint language, for developing incremental topology control algorithms that are guaranteed to fulfill a set of specified consistency and optimization constraints. More specifically, we model the possible modifications of a topology control algorithm and the environment using graph transformation rules, and we describe consistency and optimization properties using graph constraints. On this basis, we apply and extend a well-known constructive approach to derive refined graph transformation rules that preserve these graph constraints. We apply our methodology to re-engineer an established topology control algorithm, kTC, and evaluate it in a network simulation study to show the practical applicability of our approach. Meta-modeling [Sec. 2] WSN meta-model Topology control (TC) Graph constraints [Sec. 3] Structural constraints TC constraints Connectivity Consistency Graph transformation [Sec. 4] TC rules TC algorithm Context event rules Rule refinement [Sec. 5] Rule refinement algorithm Restoring rule applicability Enforcing termination Proving preservation of connectivity Evaluation [Sec. 6] RQ1: Correctness RQ2: Incrementality RQ3: Generalizability RQ4: Performance Figure 1: Overview of the proposed constructive methodology and structure of this paper (i) We characterize the required and desired properties of output topologies of a TC algorithm using graph constraints (as described in [42]).(ii) We use GT rules to describe TC operations, which specify the possible modifications during an execution of a TC algorithm, and context events, which specify the possible modifications by the environment.(iii) We apply and enhance the constructive refinement approach for GT rules presented in [42,43] to TC. Our approach is able to cope with temporarily constraint-violating rules, which contrary to [42,43] may not be restricted.(iv) We ...