Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2008
DOI: 10.1145/1374618.1374632
|View full text |Cite
|
Sign up to set email alerts
|

An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model

Abstract: Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized or hopbased interference models in which the effect of interference is neglected beyond a certain range from the transmitter. However, interference is a more complex phenomenon that cannot, in general, be captured by localized models, implying that protocols based on such models are not guaranteed to work in practice. This paper is the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
82
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 101 publications
(82 citation statements)
references
References 31 publications
0
82
0
Order By: Relevance
“…The resulting leader backbone forms a connected dominating set (CDS). The use of a CDS in radio networks is a common strategy; c.f., [12,30,31,35,38]. Unlike this existing work, however, our task is simplified by both the availability of location information and the lack of need to deal explicitly with contention on the channel.…”
Section: The Leader Election Problemmentioning
confidence: 99%
“…The resulting leader backbone forms a connected dominating set (CDS). The use of a CDS in radio networks is a common strategy; c.f., [12,30,31,35,38]. Unlike this existing work, however, our task is simplified by both the availability of location information and the lack of need to deal explicitly with contention on the channel.…”
Section: The Leader Election Problemmentioning
confidence: 99%
“…Yet, recent works [14,24] support the conjecture that the same asymptotic result on the value of k holds also in a cost-based connection model, which is shown in [24] to closely resemble lognormal shadowing propagation (i.e., irregular coverage regions).…”
Section: Setting the Value Of Kmentioning
confidence: 77%
“…In this model, the radio signal strength (power) at a distance d from the transmitter is given by P/d α , where P is the transmission power and α > 2 is the path loss coefficient [16] (the actual value of the constant α depends on the environment -e.g., indoor or outdoor) 2 . Up to technical details, our results can be extended to more general radio propagation models that accounts for irregular radio coverage area, such as the cost-based model proposed in [19], which is shown to closely approximate log-normal shadowing propagation. In the following, we assume all nodes use the same transmit power, an arbitrary constant P .…”
Section: B Radio Signal Propagationmentioning
confidence: 89%
“…In [4], Brar et al present a localized, distributed implementation of the GreedyPhysical scheduling algorithm presented in [3], which thus achieves the same approximation bounds (under the approximate SINR interference model described above). In [19], Scheideler et al present a localized, distributed algorithm for building a dominating set under the exact SINR interference model. Both algorithms make extensive use of physical carrier sensing to achieve local computation at the nodes, while guaranteeing algorithm operations under the global SINR interference model.…”
Section: Related Workmentioning
confidence: 99%