Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking &Amp; Computing 2003
DOI: 10.1145/778415.778433
|View full text |Cite
|
Sign up to set email alerts
|

The K-Neigh Protocol for Symmetric Topology Control in Ad Hoc Networks

Abstract: We propose an approach to topology control based on the principle of maintaining the number of neighbors of every node equal to or slightly below a specific value k. The approach enforces symmetry on the resulting communication graph, thereby easing the operation of higher layer protocols. To evaluate the performance of our approach, we estimate the value of k that guarantees connectivity of the communication graph with high probability. We then define k-Neigh, a fully distributed, asynchronous, and localized … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
92
0

Year Published

2004
2004
2011
2011

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 162 publications
(92 citation statements)
references
References 29 publications
0
92
0
Order By: Relevance
“…( r : (r ∈ RN brsp) ∧ (power(p, r) > power(p, q)))} highestp ← any q such that q ∈ highestSetp 4 myP owerp ← power(p, highestp) 5 The set P os p is the set of 2-tuples q, x q , y q , where x q and y q are the Euclidian x, y-coordinates of process q. We do not specify a particular way for p to obtain G 2h p and P os p as the focus of this paper is on the topology generated by the algorithm (they can be easily obtained by the exchange of messages with topology information).…”
Section: A Topology Control Algorithm That Considers Overhearingmentioning
confidence: 99%
See 1 more Smart Citation
“…( r : (r ∈ RN brsp) ∧ (power(p, r) > power(p, q)))} highestp ← any q such that q ∈ highestSetp 4 myP owerp ← power(p, highestp) 5 The set P os p is the set of 2-tuples q, x q , y q , where x q and y q are the Euclidian x, y-coordinates of process q. We do not specify a particular way for p to obtain G 2h p and P os p as the focus of this paper is on the topology generated by the algorithm (they can be easily obtained by the exchange of messages with topology information).…”
Section: A Topology Control Algorithm That Considers Overhearingmentioning
confidence: 99%
“…We compared TCO with GG because GG presented good results in [6] for an interference metric similar to ours. In particular, it outperformed the algorithms CBTC [21] and KNeigh [5]. Finally, we compared TCO with RNG because it is another classical result of computational geometry upon which many topology control results are based.…”
Section: Evaluation Of Interferencementioning
confidence: 99%
“…The topology control problem [22] has been deeply investigated in the literature in recent years, including theoretical studies aimed at characterizing optimal topologies according to some performance metric (see, e.g., [19,21,25]), and more practical approaches presenting distributed, localized topology control protocols, sometimes with proven performance bounds with respect to optimal [2,3,8,10,15,18,20,27,28]. Included in this work is our original k-Neighbors approach [2,3], upon which this current work builds.…”
Section: Related Workmentioning
confidence: 99%
“…Included in this work is our original k-Neighbors approach [2,3], upon which this current work builds. Some papers [4,5] also addressed the topology control problem with the goal of reducing interference, instead of energy consumption as traditionally done in the topology control literature.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation