correct-basepaper-efficient broadcasting in mobile ad hoc networks
Post on 04-Apr-2018
220 Views
Preview:
TRANSCRIPT
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
1/15
Efficient Broadcasting in MobileAd Hoc Networks
Majid Khabbazian, Student Member, IEEE, and Vijay K. Bhargava, Fellow, IEEE
AbstractThis paper presents two efficient broadcasting algorithms based on 1-hop neighbor information. In the first part of the
paper, we consider sender-based broadcasting algorithms, specifically the algorithm proposed by Liu et al. In their paper,
Liu et al. proposed a sender-based broadcasting algorithm that can achieve local optimality by selecting the minimum number of
forwarding nodes in the lowest computational time complexity On log n, where n is the number of neighbors. We show that this
optimality only holds for a subclass of sender-based algorithms. We propose an efficient sender-based broadcasting algorithm based
on 1-hop neighbor information that reduces the time complexity of computing forwarding nodes to On. In Liu et al.s algorithm,n nodes are selected to forward the message in the worst case, whereas in our proposed algorithm, the number of forwarding nodes in
the worst case is 11. In the second part of the paper, we propose a simple and highly efficient receiver-based broadcasting algorithm.
When nodes are uniformly distributed, we prove that the probability of two neighbor nodes broadcasting the same message
exponentially decreases when the distance between them decreases or when the node density increases. Using simulation, we
confirm these results and show that the number of broadcasts in our proposed receiver-based broadcasting algorithm can be even less
than one of the best known approximations for the minimum number of required broadcasts.
Index TermsWireless ad hoc networks, flooding, broadcasting, localized algorithms.
1 INTRODUCTION
BROADCASTING is a fundamental communication operationin which one node sends a message to all other nodes inthe network. Broadcasting is widely used as a basicmechanism in many ad hoc network protocols. Forexample, ad hoc on-demand routing protocols such asAODV [1] and DSR [2] typically use broadcasting in theirroute discovery phase. Broadcasting is also used fortopology updates, for network maintenance, or simply for
sending a control or warning message. The simplestbroadcasting algorithm is flooding, in which every nodebroadcasts the message when it receives it for the first time.Using flooding, each node receives the message from all itsneighbors in a collision-free network. Therefore, the broad-cast redundancy significantly increases as the averagenumber of neighbors increases. High broadcast redundancycan result in high power and bandwidth consumption inthe network. Moreover, it increases packet collisions, whichcan lead to additional transmissions. This can cause severenetwork congestion or significant performance degradation,a phenomenon called the broadcast storm problem [3].Consequently, it is crucial to design efficient broadcastingalgorithms to reduce the number of required transmissions
in the network.A set of nodes is called a Dominating Set (DS) if any node
in the network either belongs to the set or is a 1-hop
neighbor of a node in the set. The set of broadcasting nodesforms a Connected DS (CDS). Therefore, the minimumnumber of required broadcasts is not less than the size ofthe minimum CDS. Unfortunately, finding the minimumCDS is NP-hard, even for the unit disk graphs [4], [5].However, there are some distributed algorithms that canfind a CDS whose size is smaller than a constant factor of
the size of the minimum CDS [6], [7]. These algorithms canbe employed to find a small-sized CDS that can be used as avirtual backbone for broadcasting in ad hoc networks.However, this approach is not efficient in networks withfrequent topology changes, as maintaining a CDS is oftencostly [8].
The main objective of efficient broadcasting algorithms isto reduce the number of broadcasts while keeping thebandwidth and computational overhead as low as possible.One approach to classify broadcasting algorithms is basedon the neighbor information they use. Some broadcastingalgorithms such as flooding and probabilistic broadcastingalgorithms [9], [10] do not rely on neighborhood knowl-
edge. These algorithms cannot typically guarantee fulldelivery and/or effectively reduce the number of broad-casts. Moreover, to decide whether or not to broadcast, theymay use a threshold (such as probability of broadcast),which may not be easy to find for different networksituations. In the second category, broadcasting algorithmsrequire having 2-hop or more neighbor information. Thebroadcasting algorithms in this category can reduce thenumber of broadcasts in the network and guarantee fulldelivery [11], [12], [13]. However, they may induce highoverhead in highly dynamic networks as they need tomaintain 2-hop network connectivity.
In this paper, we propose two broadcasting algorithms
based on 1-hop neighbor information. The first proposed
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 2, FEBRUARY 2009 231
. M. Khabbazian is with the Department of Electrical and ComputerEngineering, University of British Columbia, 2523 Pearkes Lane,Vancouver, BC V6T 2C3, Canada. E-mail: majidk@ece.ubc.ca.
. V.K. Bhargava is with the Department of Electrical and ComputerEngineering, University of British Columbia, 2356 Main Mall, Vancouver,BC V6T 1Z4, Canada. E-mail: vijayb@ece.ubc.ca.
Manuscript received 3 Jan. 2007; revised 25 Aug. 2007; accepted 9 Apr. 2008;published online 19 June 2008.For information on obtaining reprints of this article, please send e-mail to:tmc@computer.org, and reference IEEECS Log Number TMC-0002-0107.
Digital Object Identifier no. 10.1109/TMC.2008.94. 2009 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
2/15
algorithm is a sender-based algorithm. In sender-basedalgorithms, the broadcasting nodes select a subset of theirneighbors to forward the message. We compare ourproposed broadcasting algorithm to one of the bestsender-based broadcasting algorithms that use 1-hopinformation [8]. In [8], Liu et al. propose a broadcastingalgorithm that reduces the number of broadcasts and
achieves local optimality by selecting the minimum numberof forwarding nodes with minimum time complexityOn log n, where n is the number of neighbors. We showthat this optimality only holds for a subclass of sender-based broadcasting algorithms employing 1-hop informa-tion and prove that our proposed sender-based algorithmcan achieve full delivery with time complexity On.Moreover, Liu et al.s algorithm selects n forwarding nodesin the worst case, while our proposed algorithm selects11 nodes in the worst case. Based on our simulation results,our sender-based algorithm results in fewer broadcasts thandoes Liu et al.s algorithm. All these interesting propertiesare achieved at the cost of a slight increase in end-to-end
delay. Thus, our first proposed algorithm is preferred toLiu et al.s algorithm when the value of n is typically large,and it is important to bound the packet size.
We also propose a receiver-based broadcasting algorithmin this paper. In receiver-based algorithms, the receiverdecides whether or not to broadcast the message. Theproposed receiver-based algorithm is a novel broadcastingalgorithm that can significantly reduce the number ofbroadcasts in the network. We show that using ourproposed receiver-based algorithm, two close neighborsare not likely to broadcast the same message. In otherwords, we prove that the probability of broadcast for a nodeNA exponentially decreases when the distance between NAand its broadcasting neighbor decreases or when thedensity of nodes increases. Based on our experimentalresults, the number of broadcasts using our receiver-basedalgorithm is less than one of the best known approxima-tions for the minimum number of required broadcasts.
The rest of this paper is organized as follows: In Section 2,we describe the system model and network assumptions. InSection 3, we discuss our proposed sender-based broad-casting algorithm and its characteristics. We propose asimple and highly efficient receiver-based broadcastingalgorithm in Section 4 and prove an interesting property ofthe algorithm. We also relax some system model assump-tion in this section. In Section 5, we verify the theoreticalresults using simulation and compare the number of
forwarding nodes of our proposed broadcasting algorithmswith that of one of the best existing broadcasting algorithmsand an approximated lower bound of the optimal solution.Finally, we provide conclusions in Section 6.
2 SYSTEM MODEL
Our system model is very similarto that used by Liu et al. [8].We assume that all nodes are located in a 2D plane and havea transmission range of R. Therefore, the topology of thenetwork can be represented by a unit disk graph. We assumethat the network is connected. Two nodes are consideredneighbors if they are in the transmission range of each other.
We suppose that each node knows its location via a
localization technique such as Global Positioning System(GPS) or the lightweight techniques summarized in [14].Each node periodically broadcasts a very short Hellomessage, which includes its ID and position. Thus, eachnode gets the position of its neighbors as well.In the mediumaccess control (MAC) layer, we assume that scheduling isdone according to the p-persistent CSMA/CA protocol,
which is based on IEEE 802.11 in the broadcast mode. Inthe p-persistent CSMA/CA protocol, when a node has amessage to transmit, it initiates a defer timer by a randomnumber and starts listening to the channel. If the channel isbusy, it continues to listen until the channel becomes idle.When the channel is idle, it starts decrementing the defertimer at the end of each time unit. The message is broadcastwhen the timer expires.
3 AN EFFICIENT SENDER-BASED BROADCASTINGALGORITHM
3.1 Algorithm Structure
Our first proposed broadcasting algorithm is a sender-based algorithm, i.e., each sender selects a subset of nodesto forward the message. Each message can be identified byits source ID and a sequence number incremented for eachmessage at the source node. Algorithm 1 is a generalsender-based broadcasting algorithm and indicates thestructure of our proposed sender-based broadcastingalgorithm. Upon expiration of the timer, the algorithmrequests the MAC layer to schedule a broadcast. Themessage scheduled in the MAC layer is buffered and thenbroadcast with a probability p. This adds another delay (i.e.,the MAC-layer delay) in broadcasting the message. TheMAC-layer delay in IEEE 802.11 is a function of severalfactors including the network traffic. Note that there is achance that a node changes its decision (regarding theselected nodes or regarding whether to broadcast) duringthe MAC-layer delay due to receiving other copies of themessage. This chance is not negligible when the delay in theMAC layer is comparable to the average value of the timerset in the broadcasting algorithm. As stated in [15], onesolution to this problem is a cross-layer design in which thenetwork layer is given the ability to modify or removepackets that are present in the MAC-layer queue. Thissolution allows the broadcasting algorithms to performclose to their ideal performance even for very small averagetimer values [15]. In the entire paper, we assume that eitherthe MAC-layer delay is negligible compared to the averagedelay set by the algorithm or the network layer (hence, thealgorithm) is able to modify or remove packets buffered inthe MAC-layer queue (in this case, the algorithm does notrequire to set a defer timer).
The sender-based broadcasting algorithms can be di-vided into two subclasses. In the first subclass, each nodedecides whether or not to broadcast solely based on the firstreceived message and drops the rest of the same messagesthat it receives later. Liu et al.s algorithm falls in thissubclass and achieves local optimality by selecting theminimum number of forwarding nodes in the lowest
computational time complexity.
232 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 2, FEBRUARY 2009
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
3/15
In the second subclass of sender-based broadcastingalgorithms, each node can decide whether or not to
broadcast after each message reception. However, if a nodebroadcasts a message, it will drop the rest of the samemessages that it receives in the future. Therefore, eachmessage is broadcast once at most by a node using thebroadcasting algorithms in both subclasses. Our firstproposed broadcasting algorithm falls in this subclass ofsender-based broadcasting algorithms. We show that theproposed algorithm can reduce both the computationalcomplexity of selecting the forwarding nodes and themaximum number of selected nodes in the worst case.
Algorithm 1 shows the basic structure of our proposedsender-based broadcasting algorithm. As shown inAlgorithm 1, each node schedules a broadcast for areceived message if the node is selected by the senderand if it has not scheduled the same message before.Clearly, each message is broadcast once at most by anode, which is similar to Liu et al.s algorithm. However,in Liu et al.s algorithm, each node may only schedule abroadcast when it receives a message for the first time.In contrast, in Algorithm 1, a broadcast schedule can beset at any time. For example, a message can be droppedafter the first reception but scheduled for broadcastthe second time. Clearly, the main design issue inAlgorithm 1 is how to select the forwarding nodes.
Algorithm 1. A general sender-based algorithm1: Extract information from the received message M
2: if M has been scheduled for broadcast or does notcontain nodes ID then
3: drop the message4: else
5: set a defer timer6: end if
7: When defer timer expires8: Select a subset of neighbors to forward the message9: Attach the list of forwarding node to the message
10: Schedule a broadcast
3.2 Forwarding-Node Selection Algorithm
Let us consider point A as the node NA and a circle CA;R
centered at A with a radius R as the transmission range
of NA. We use AB to denote the distance between twopoints A and B. Before delving into the algorithmdescription and proofs, we need to define the followingterms:
Definition 1 (bulged slice). As illustrated in Fig. 1, we define abulged slice around A as the intersection area of three circleswith radius R and centers A, M, and N, where AM R,AN R, and MN R. Note that in any bulged slice AMN,we have ffMAN
3.
Definition 2 (right/left bulged slice). As shown in Fig. 2, letA and Bbe two points such that 0 < AB R and AMN be abulged slice around A. Suppose that the point B is on one ofthe arcs AM
_or AN
_of the bulged slice AMN. In this case,
AMN is called the right bulged slice of B around A if itcontains the
3clockwise rotation of point B around A and is
called its left bulged slice around A otherwise.
Definition 3 (bulged angle). Let B1 and B2 be two bulgedslices around A. The bulged angle ffAB1;B2 is defined to beequal to 0 < 2 ifB2 is an counterclockwise rotation ofB1 around A.
Definition 4 (B-coverage set). A subset of neighbors of NA iscalled a B-coverage set of NA if any nonempty bulged slicearound A contains at least one node from the set. A bulgedslice is empty if there is no node inside it.
Definition 5 (slice-based selection algorithm). Aforwarding-node selection algorithm is called a slice-based selectionalgorithm (or slice-based algorithm) if for any node NA, itselects a B-coverage set of it.
A node can have several different B-coverage sets. There-fore, there is more than one slice-based selection algorithm.For example, a trivial slice-based selection algorithm wouldbe one that selects all of the neighbors as the B-coverage set.Clearly, this algorithm will result in flooding if it is used asthe forwarding-node selection scheme in Algorithm 1. Inthis section, we first show that Algorithm 1 can achieve fulldelivery if it uses any slice-based algorithm to select the
forwarding nodes. We then present an efficient slice-based
KHABBAZIAN AND BHARGAVA: EFFICIENT BROADCASTING IN MOBILE AD HOC NETWORKS 233
Fig. 1. A bulged slice around A.
Fig. 2. Left bulged slice of B and right bulged slice of C around A.
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
4/15
algorithm that selects 11 nodes in the worst case and has
computational complexity On, where n is the number of
neighbors.
Lemma 1. For any two points P1 and P2 inside a bulged slice,we have
P1P2 R:
Proof. As shown in Fig. 3, the line passing through P1 and
P2 intersects the bulged slice AMN at P01 and P
02. Clearly,
P1P2 P01P02. Therefore, to prove the lemma, it is
sufficient to show that P01P02 R. This is easy to show
if both P01 and P02 are on the same arc of the bulged slice.
Thus, without loss of generality, we can assume that P01and P02 are on the arcs AM
_and AN
_, respectively. Let us
consider the perpendicular bisector of the line segment
P01M (line L). Line L passes through N becauseNM NP01 R. Since the point P
02 is on the arc AN
_,
the line segment MP02 will cross the line L at a point Q.
Using triangle inequality, we have
P01P02 QP
02 QP
01
QP02 QM
P02M R:
Note that Q is on the line L; hence, QP01 QM. tu
Consider two points A and B such that R < AB 2R. As
shown in Fig. 4, the line segment AB intersects the circle
CA;R at point Q. Let AQM and AQN be the left and right
bulged slices of Q around A, respectively. The following
lemmas hold:
Lemma 2. A point P is inside the bulged slice AQM or AQN if
AP R and BP R.
Proof. It is easy to show that for any triangle 4ABC,
AM AB or AM AC, where M is a point on the line
segment BC. Consequently, in the triangle 4P AB
(shown in Fig. 4), we have
P Q AP R or P Q BP R:
Therefore, P Q R. Thus, based on the bulged slice
definition, the point P is inside the bulged slice AQM
orAQN
. tu
Lemma 3. For any point P 6 A inside the bulged slice AQM orAQN, we have
BP < BA:
Proof. Using triangle inequality, we get
BP BQ QP BQ R BA:
Note that this equality holds only when BP BQ QPand QP R or simply when P A. tu
Theorem 1. In a collision-free network, Algorithm 1 can achievefull delivery if it uses a slice-based selection algorithm to selectthe forwarding nodes.
Proof. Using Algorithm 1, each node broadcasts the
message at most once. Therefore, broadcasting willeventually terminate. By contradiction, suppose there isat least one node that has not received the message afterthe broadcasting termination. Let us consider thefollowing set:
fNX; NY; NZjNX has broadcast the message;
NZ has not received the message; and
NY is the neighbor of both NX and NZg:
Suppose NS is the node that initiated broadcasting, andNT is a node that has not received the message. Thenetwork is connected; thus, there is a path between NS andNT. Clearly, we can find two neighbor nodes NC and NBalong the path from NT to NS such that NC has notreceived the message, while NB has received it. Supposethat NB has received the message from NA. Consequently,NA; NB; NC 2 ; thus, 6 ;. As a result, we have
9NA0 ; NB0 ; NC02 s:t:8NX; NY; NZ2 : A0C0XZ: 1
Obviously, NA0 and NC0 are not neighbors, because NC0
has not received the message. Thus, A0C0 > R. UsingLemma 2, B0 is inside the bulged slice A0P1P2 or A
0P1P3,where P1 is the intersection of line segment A
0C0 and thecircle CA0;R, and A0P1P2 and A0P1P3 are the left and theright bulged slices ofP1 around A
0, respectively. Without
loss of generality, assume that B
0
is inside the bulged
234 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 2, FEBRUARY 2009
Fig. 3. Upper bound on the distance between nodes inside a bulged
slice.
Fig. 4. Other properties of bulge slice from Lemmas 2 and 3.
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
5/15
slice A0P1P2. Since NA0 has at least one neighbor (i.e., NB0)in this slice, there must be a selected node ND in the slicethat has forwarded the message. Using Lemma 1, we getB0D R; hence, nodes ND and NB0 are neighbors.Therefore, ND; NB0 ; NC0 2 . However, this contradicts(1) because using Lemma 3, we have
DC0 < A 0C0:
tu
Algorithm 2 shows our proposed slice-based selectionalgorithm. Suppose that node NA uses the proposedalgorithm to select the forwarding nodes from its neighbors.Let us assume that NA stores all of its neighbors IDs andlocations in an array of length n, where n is the number ofneighbors. The algorithm selects the first node NS1randomly from the array. The first node can also be selecteddeterministically by, for example, selecting the node that isthe farthest away from NA. Let LBAP and RBAP denotethe left bulged slice and right bulged slice of P around A,
respectively. Suppose that NSi is the last node selected bythe algorithm. To select the next node, the algorithm iteratesthrough the array and selects the node NSi1 such that it isinside the slice LBASi, ffALBASi;LBASi1 6 0, and
8NB inside LBASi :
ffA LBASi;LBAB ffA LBASi;LBASi1 :2
If there is no such node, the algorithm selects NSi1 such that
8NB inside CA;R :
ffA LBASi;RBASi1 ffA LBASi;RBAB :3
The algorithm terminates by selecting the last node NSm if
NSm is inside LBAS1 or NS1 is inside LBASm orSm1 S1.
Algorithm 2 A slice-based selection algorithmInput: ListA1 . . . n: List of all neighbors of NAOutput: A B-coverage set of NA : fNSig
1: ind 1; i 02: repeat
3: ang max 0; ang min 24: i i 15: NSi ListAind6: chk false7: for j 1; j lengthListA; j++ do8: if ListAj is in LBASi then9: if ffALBASi;LBAListAj > ang max
then
10: chk true11: ind max j12: ang max ffALBASi;LBAListAj13: end if
14: else
15: if ffALBASi;RBAListAj < ang minthen
16: ind min j17: ang min ffALBASi;RBAListAj18: end if
19: end if
20: end for
21: if chk then
22: ind ind max23: else
24: ind ind min25: end if
26: until S1 is in LBAListAind OR ListAind is in
LBAS127: if ind6 1 then28: NSi1 ListAind29: end if
Lemma 4. Suppose the proposed algorithm selects m nodesfNS1 ; NS2 ; . . . ; NSmg. For any 1 i < m 2, we have
ffA LBASi;LBASi2 >
3:
Proof. Based on (2), (3), and the algorithm terminationcondition, we can show that
ffA LBASi;LBASi2 > ffA LBASi;LBASi1 for any 1 i < m 2. By contradiction, assume that
ffA LBASi;LBASi2
3:
Therefore, Si2 is inside LBASi. Thus, using (2), wehave
ffA LBASi;LBASi2 ffA LBASi;LBASi1 ;
which is a contradiction. tu
Theorem 2. The proposed slice-based selection algorithm willselect at most 11 nodes.
Proof. By contradiction, assume that the algorithm selectsmore than 11 nodes. Therefore, S11 is not in LBAS1.Using Lemma 4, we get
ffA LBAS1;LBAS11
X5i1
ffA LBAS2i1;LBAS2i1 > 5
3:
T h e r e f o r e , ffALBAS11;LBAS1 < 2 5 3
3.
Consequently, S1 is inside LBAS11; thus, the proposedslice-based algorithm will terminate after selecting S11.tu
The above theorem gives an upper bound on the number of
nodes selected by the proposed selection algorithm. InSection 5, using simulation, we show that the averagenumber of selected nodes (when the nodes are distributeduniformly) is less than six.
Theorem 3. Time complexity of the proposed slice-based selectionalgorithm is On, where n is the number of neighbors.
Proof. The algorithm selects the first node in O1. To selecteach of the other nodes, the algorithm performs Onoperations by checking all the neighbors in the array.Therefore, the complexity of the algorithm is Om n,where m is the number of selected nodes. UsingTheorem 2, we have m 11; thus, the time complexity
of algorithm isO
n. tu
KHABBAZIAN AND BHARGAVA: EFFICIENT BROADCASTING IN MOBILE AD HOC NETWORKS 235
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
6/15
3.3 Reducing the Number of Forwarding Nodes
In the sender-based broadcasting algorithms, each broad-casting node attaches a list of its selected forwarding nodesto the message before broadcasting it. This procedure willincrease the bandwidth and power required to broadcastthe message. As shown earlier, our proposed slice-basedselection algorithm reduces the number of selected for-
warding nodes to 11 in the worst case. In this section, weshow how to further reduce the number of selected nodes.
Recall that the proposed slice-based algorithm selects asubset of NAs neighbors such that there is at least oneselected node in any nonempty bulged slice around A.Suppose NA extracts the list of the forwarding nodes fromeach message it receives. Let LA be a subset of NAsneighbors that has broadcast the message or been selectedby other nodes to forward it. Since all of the selectedforwarding nodes are required to broadcast the message, itis sufficient for NA to find a subset of its neighbors SA suchthat any nonempty bulged slice around A contains at leastone node from SA [ LA. Algorithm 2 can be simply
extended to achieve this in On. Note that the extendedalgorithm can start with a node from LA and select anynode in LA as soon as it appears in the left bulged slice ofthe previously selected node. Finally, the extended algo-rithm removes all of the nodes in LA from the set ofselected nodes.
3.4 Maximizing the Minimum Node Weight ofB-Coverage Set
Suppose node NA assigns a weight to each of its neighbors.The weight can represent the neighbors battery lifetime, itsdistance to NA, the average delay of the node, the level oftrust, or a combination of them. In some scenarios, we may
desire to find a B-coverage set such that its minimum nodeweight is the maximum or its maximum node weight is theminimum among that of all B-coverage sets. For example,assume that the weight of each node represents its batterylifetime in a wireless network. It may be desirable to selectthe nodes with a higher battery lifetime to forward themessage in order to keep the nodes with a lower batterylifetime alive. Algorithm 3 shows how to find a B-coverageset such that its minimum node weight is the maximumamong that of all B-coverage sets. A similar approach can beused to find a B-coverage set such that its maximum nodeweight is the minimum.
Algorithm 3. Maximizing the minimum node weightInput: ListA1 . . . n: List of all neighbors of NAOutput: A B-coverage set of NA with highest minimumnode weight
1: SListA sortListA {Sort the neighbor nodes bytheir weights} fSListi ! SListj , i jg
2: H n; T 1; m bn2e
3: St Algorithm 2SList14: if St is a B-coverage set for NA then
5: return SList[1]6: end if
7: while H > T 1 do8: St Algorithm 2SList1 . . . m {Pass m nodes
with the highest weights to Algorithm 2 as the input}
9: if St is a B-coverage set for NA then
10: H m11: m dTm
2e
12: else
13: T m14: m dHm
2e
15: end if
16: end while17: return Algorithm 2SList1 . . . H
Algorithm 3 first sorts the nodes by their weights in
decreasing order. Then, in each step, it passes m nodes with
the highest weights to Algorithm 2 as input and gets a set of
(at most 11) nodes as output, where 1 m n is an integer
initially set to dn2e. If the output set is a B-coverage set,
Algorithm 3 sets H to m and decreases m to dTm2e, where T
and H are variables initially set to 1 and n, respectively.
Otherwise, it sets T to m and increases m to dHm2e. After a
finite number of steps, we get H T 1. Algorithm 3 then
returns the output of Algorithm 2SList1 . . . H.
Corollary 1. Algorithm 3 will select at most 11 nodes.
Proof. The proof is clear, as Algorithm 3 returns an outputof Algorithm 2 (Line 17). tu
Theorem 4. The time complexity of Algorithm 3 is On log n.
Proof. Algorithm 3 requires On log n operations to sort thelist of neighbors ListA1 . . . n. The computational com-plexity of Algorithm 2 is On. Therefore, Algorithm 3performs On operations in each iteration of the whileloop. The while loop terminates after Olog n iterationsbecause it uses a binary search approach to find theminimum value of H. Consequently, the order ofAlgorithm 3 is On log n log n n. tu
Theorem 5. The minimum weight of nodes of the B-coverageset selected by Algorithm 3 is the maximum among that ofall B-coverage sets.
Proof. Suppose that Stmin is a B-coverage set such that theminimum weight of nodes in Stmin is greater than orequal to that of other B-coverage sets. Let NX 2 Stmin bethe node with the minimum weight in Stmin. Assumethat NA has K neighbors with weights greater than orequal to the weight of NX. Therefore, the output ofAlgorithm 2SList1 . . . K is a B-coverage set. Note thatAlgorithm 3 finds the minimum H such that the outputof Algorithm 2SList1 . . . H is a B-coverage set for NA.Therefore, H K, and thus, the minimum weight of
nodes of the B-coverage set selected by Algorithm 3 isgreater than or equal to the weight of NX. tu
3.5 Similarity with a Topology Control Algorithm
In [16] and [17], the authors proposed a cone-basedtopology control algorithm, where each node makes localdecisions about its transmission power. The objective of thealgorithm is to minimize the transmission power of eachnode without violating the network connectivity. In order todo that, each node NA transmits with the minimum powerP such that in every nonempty cone of degree aroundNA, there is some node that NA can reach with power P. Acone is nonempty if there is at least a node in the cone that
NA can reach using its maximum power. For
2
3 , they
236 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 2, FEBRUARY 2009
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
7/15
proved that the network remains connected if the cone-
based algorithm is employed.Suppose that we use cones instead of bulged slices in the
proposed forwarding-node selection algorithm. Therefore,the algorithm will select the forwarding node set such thatany nonempty cone of degree around NA contains at leastone node from the forwarding node set. Surprisingly, thisalgorithm will not guarantee full delivery. Fig. 5 shows acounterexample for the case where 2
3. Fig. 6 shows that
even for 3
, full delivery cannot be guaranteed. In bothFigs. 5 and 6, the node NA initiates broadcasting and selectsonly NB and NC to forward the message. Suppose that ND isclose enough to the point M such that it is the only nodethat can reach NE. In this case, NE will not receive the
message because ND is not selected by neither NB nor NC toforward the message. Note that the cone-based and theforwarding-node selection algorithms use different ap-proaches. In the cone-based algorithm, a node NA increasesits power from zero until there is a node in each nonemptycone around NA. However, in the forwarding-node selec-tion algorithm, a node NA selects some nodes (the forward-ing nodes) until there is a selected node in each nonemptybulged slice around NA.
4 A HIGHLY EFFICIENT RECEIVER-BASEDBROADCASTING ALGORITHM
In this section, we propose a novel receiver-based broad-casting algorithm that can significantly reduce redundantbroadcasts in the network. As mentioned earlier, inreceiver-based broadcasting algorithms, the receiver of themessage decides whether or not to broadcast the message.Therefore, a potential advantage of receiver-based broad-casting algorithms over sender-based ones is that they donot increase the size of the message by adding a list offorwarding nodes.
4.1 Algorithm Structure
Algorithm 4 shows a general approach used in severalreceiver-based broadcasting algorithms [13], [18]. Our
proposed receiver-based broadcasting algorithm employs
this approach. Clearly, the main design challenge ofAlgorithm 4 is to determine whether or not to broadcast areceived message. A trivial algorithm is to refrain broad-
casting if and only if all the neighbors have received themessage during the defer period. Although this algorithm issimple to implement, it has limited effect in reducing thenumber of redundant broadcasts. Suppose NAs defer timeexpires at t0. Using the above strategy, node NA willbroadcast if some of its neighbors (at least one) have notreceived the message by t0. However, this broadcast isredundant if all such neighbors receive the message fromother nodes after time t0. This scenario typically occurswhen t0 is small compared to the maximum defer time. Inthe next section, we introduce a responsibility-basedscheme (RBS) that further reduces the redundant broadcastswithout any changes in the MAC-layer defer-time design.
Algorithm 4. A general receiver-based algorithm1: Extract information from the received message M2: if M has been received before then
3: drop the message4: else5: set a defer timer
6: end if
7: When defer timer expires8: decide whether or not to schedule a broadcast
4.2 Responsibility-Based Scheme
Algorithm 5 shows the proposed RBS. The main idea ofAlgorithm 5 is that a node avoids broadcasting if it is notresponsible for any of its neighbors. A node NA is notresponsible for a neighbor NB if NB has received themessage or if there is another neighbor NC such that NC hasreceived the message and NB is closer to NC than it is to NA.Suppose NA stores IDs of all its neighbors that havebroadcast the message during the defer period. Whenexecuted by a node NA, Algorithm 5 first uses thisinformation to determine which neighbors have notreceived the message (Lines 1-9 of Algorithm 5). It thenreturns false if and only if it finds a neighbor NB that has notreceived the message and
AB BC
KHABBAZIAN AND BHARGAVA: EFFICIENT BROADCASTING IN MOBILE AD HOC NETWORKS 237
Fig. 5. A counterexample for 23
.
Fig. 6. A counterexample for 3 .
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
8/15
for any NAs neighbor NC that has received the message.
The output of RBS determines whether or not the broadcast
is redundant.
Algorithm 5. RBSInput: ListA: List of all neighbors of NA, and ListB: List ofbroadcasting neighborsOutput: true or false
1: ListC ListA2: for i 1; i lengthListC; i++ do3: for j 1; j lengthListB; j++ do4: if distListCi; ListBj R then5: removeElementListCi; ListC6: break7: end if8: end for
9: end for10: ListD ListA ListC11: for i 1; i lengthListC; i++ do12: check true13: for j 1; j lengthListD; j++ do14: if distListCi; ListDj < distListCi; NA
then
15: check false16: break17: end if18: end for19: if check then
20: return (false)
21: end if22: end for
23: return (true)
Example 1. As shown in Fig. 7, NA has five neighbors.
Suppose that NA has received a message from NF. Note
that NA has the position of all its neighbors. Therefore, it
can find that NE and ND have received the message but
NB and NC have not. As shown in Fig. 7, NA is not
required to broadcast because
BE < BA and CD < CA:
Theorem 6. In a collision-free network, Algorithm 4 can achievefull delivery if it uses the proposed RBS to determine whetheror not to broadcast.
Proof. Using Algorithm 5, each node broadcasts a messageat most once. Therefore, broadcasting will eventuallyterminate. By contradiction, suppose there is at least onenode that has not received the message after the
broadcasting termination. Let us consider the set
fNX; NYjNX and NY are neighbors;
NX has received the message; and
NY has not received the messageg:
Suppose NS is the node that initiated broadcasting,and NT is a node that has not received the message. Thenetwork is connected; thus, there is a path between NSand NT. Clearly, we can find two neighbor nodes NB andNA along the path from NT to NS such that NB has notreceived the message, while NA has. Consequently,NA; NB 2 ; thus, 6 ;. As a result, we have
9NA0 ; NB0 2 s:t: 8NX; NY 2 : A0B0 XY : 4
Clearly, NA0 has not broadcast since NB0 has notreceived the message. Therefore, there must be a nodeNC0 such that NC0 has received the message and C0B0 R and BX Rg:
Note that the nodes positions have a Poisson distribu-tion. Therefore, using Lemma 6, we get
P rb 9NP inside IDA;R;DB;R;DQ;QB 1 e
IDA;R;DB;R ;DQ;QB
! 1 e
Rd2
3 :9
Thus,
P rbBrd 1 P rb
1 X1k0
Prob jj k Prb j jj k ;
where jj is the cardinality of the set . Therefore, using(9) and Lemma 5, we get
P rbBrd 1
X1
k0
ke
k!1 e
Rd2
3
k
1 ee
Rd2
3;
where is the area of the hatched crescent in Fig. 8(collection of all points Q, QA > R, and QB R):
DB;R IDA;R;DB;R
R2 2 arccosd
2R
d
ffiffiffiffiffiffiffiffiffiffiffiffi ffiffiffiffiffiffiffiffiffiffiffiR2
d
2
2s:
tu
Corollary 2. Using Theorem 8, we get
P rbBrd eRAB2
3 :
Proof. Consider the function
fx x ex 1:
It is easy to show that fx has a global minimum atx 0. Therefore, we have
1 ex x
for any real number x. As a result, we get
P rbBrd 1 ee
Rd2
3 eRd2
3 :
tu
It is also possible that node NB receives the message from
more than one neighbor in its defer period. In this case, the
number of NBs neighbors that have received the message
increases, and the number of that have not received the
message decreases. Consequently, the probability that NB is
required to broadcast the message further decreases
compared to the case where NB receives the message from
only one neighbor. It is worth mentioning that RBS can
guarantee that the number of forwarding nodes is within a
constant factor of the optimal solution (minimum CDS) if it
is provided with 2-hop neighbor information [21].
4.4 Relaxing Some System Model Assumptions
We assumed in Section 2 that the nodes are placed in a 2D
plane. However, this assumption is not used in the proof of
Theorem 6. Therefore, the proposed receiver-based algo-
rithm can also achieve full delivery when the nodes are
distributed in a 3D space. Note that in this case, RBS uses
3D node positions.
We can also relax the assumption that all the nodes havethe same transmission range R. When the nodes transmis-
sion ranges are different, the topology graph should be
defined as a directed graph for which there is a link from
NA to NB ifNB is in the transmission range of NA. Suppose
G is an undirected graph obtained by removing unidirec-
tional links of the topology graph. We assume that G is
connected and define two nodes as neighbors if there is a
link between them in G (i.e., they are in the transmission
range of each other). Note that many wireless MAC
protocols such as IEEE 802.11 require bidirectional links.
Let us assume that nodes put not only their ID and position
but also their transmission range into the hello messages
that they periodically broadcast. Therefore, the neighbors ofa node know both its position and transmission range. In
this case, nodes can use Algorithm 6 to decide whether or
not to broadcast.Algorithm 6 is a modified version of RBS. When
executed by a node NA, Algorithm 6 uses the position and
transmission range of the broadcasting nodes to determine
which neighbors have not received the message. It then
returns false if and only if it finds a neighbor NB that has not
received the message and
AB BC or BC > transmission range of NC
for any NAs neighbor NC that has received the message.
Algorithm 6. Modified RBSInput: ListA: List of all neighbors of NA, and ListB: List of
broadcasting neighborsOutput: true or false
1: ListC ListA2: for i 1; i lengthListC; i++ do3: for j 1; j lengthListB; j++ do4: if distListCi; ListBj RListBj then5: {RListBj: Transmission range of node ListBj}6: removeElementListCi; ListC7: break
8: end if
240 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 2, FEBRUARY 2009
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
11/15
9: end for
10: end for
11: ListD ListA ListC12: for i 1; i lengthListC; i++ do13: check true14: for j 1; j lengthListD; j++ do15: if distListCi; ListDj < distListCi; NA
then16: if distListCi; ListDj RListDj then17: check false18: break
19: end if
20: end if
21: end for
22: if check then
23: return (false)24: end if25: end for
26: return (true)
Corollary 3. In a collision-free network, Algorithm 4 can achievefull delivery if it uses the modified RBS to determine whetheror not to broadcast.
Proof. The proof is similar to the proof of Theorem 6. Bycontradiction, suppose there is at least one node that hasnot received the message after the broadcasting termina-tion. Let us consider the set
NX; NYjNX and NY are neighbors;
NX has received the message; and
NY has not received the message
:
Suppose NS is the node that initiated broadcasting, and
NT is a node that has not received the message. There is apath between NS and NT in G; thus, we can find twoneighbors NA and NB along the path from NS to NT suchthat NA has received the message and NB has notreceived it. Consequently, NA; NB 2 ; thus, 6 ;. Asa result, we have
9NA0 ; NB0 2 s:t: 8NX; NY 2 : A0B0 XY : 10
Clearly, NA0 has not broadcast, since NB0 has not received
the message. Therefore, there must be a node NC0 such
that NC0 has received the message and
C0B0 < A0B0 and C0B0 Transmission range of NC0 :
This result contradicts (10) because NC0 ; NB0 2 . tu
We can relax the assumption of having precise position
information as well. The reader is referred to [21] for
more details about broadcasting under uncertain position
information.
5 SIMULATION
5.1 Average Number of Nodes Selected by theProposed Sliced-Based Algorithm
In Section 3, we proved that the proposed forwarding-node
selection algorithm selects 11 nodes in the worst case. In
practice, the number of selected nodes is typically less than
11. To avoid the complexity of mathematical analysis, we
used a simulation to find the average number of selected
nodes. For a given number of neighbors 1 n 160, werandomly put n points inside a circle with radius R. We then
ran the proposed selection algorithm and obtained thenumber of selected nodes. To get the average number of
selected nodes, we ran simulation 106 times for each given n.As shown in Fig. 9, the average number of selected nodes is
less than six and approaches five when n increases. Note that
the proposed sliced-based selection algorithm does not
necessarily select a B-coverage with a minimum number ofnodes. However, there is a sliced-based selection algorithm
that can find a B-coverage with a minimum number of nodes
in On log n and can consequently reduce the averagenumber of selected nodes. It is worth mentioning that Fig. 9
shows the average number of selected nodes by the sourcenode (the node that initiates the broadcasting). For the rest ofbroadcasting nodes, the average number of selected nodes is
at least one less than that for the source node because of the
optimization technique introduced in Section 3.
5.2 Probability of Broadcast Using the ProposedRBS
Suppose that the proposed receiver-based algorithm is used
for broadcasting in the network. Assume that node NBreceives a message from NA for the first time. It has been
proven that the probability ofNB broadcasting the message
P rbBrdB exponentially decreases when the distance AB
decreases or when the node density increases. We usedsimulation to confirm this theoretical result. For the
simulation, we considered two nodes NA and NB with
distance 0 < d R from each other. We uniformly placed
nodes with density inside the network and checked
whether or not NB was required to broadcast the message.
We ran simulation 106 times for a given and R. We then
estimated P rbBrdB by the ratio of the number of times NBwas required to broadcast over the total number of runs.
Figs. 10, 11, 12, and 13 show the simulation results for
several values of, d, and R. As shown in these figures, theprobability of broadcast exponentially decreases when d
decreases or when increases. For example, when R 300 m
KHABBAZIAN AND BHARGAVA: EFFICIENT BROADCASTING IN MOBILE AD HOC NETWORKS 241
Fig. 9. Average number of nodes selected by the proposed slice-based
algorithm.
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
12/15
and 4 104, the probability of broadcast is 0.1 ford 250 m and reduces to 104 for d 200 m. This propertycan justify why the proposed receiver-based algorithm cansignificantly reduce the number of broadcasts in the net-work. Fig. 14 illustrates an instance of using RBS for the casewhere R 300 m, 4 104, and nodes are placed in asquare area of 1;000 1;000 m2. As shown in Fig. 14, onlynine nodes (represented by stars) among 400 nodes broad-
cast the message.
5.3 Performance of Proposed Sender-Based andReceiver-Based Algorithms
The main objective of efficient broadcasting algorithms is toreduce the number of broadcasts. Therefore, we consideredthe ratio of broadcasting nodes over the total number ofnodes as the metric to evaluate the performance of theproposed broadcasting algorithms. Using the ns-2 simula-tor, we evaluated this metric against two parameters:transmission range and node density. In each simulationrun, we uniformly distributed N nodes in a 1;000 1;000 m2 square area, where N network area. Arandomly generated topology was discarded if it led to adisconnected network. Only one broadcasting occurred in
each simulation run by a randomly selected node. Table 1
242 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 2, FEBRUARY 2009
Fig. 11. Probability of broadcast for R 400 m.
Fig. 12. Probability of broadcast for R 500 m.
Fig. 13. Probability of broadcast for R 600 m.
Fig. 14. Broadcasting nodes in a 1;000 1;000 m2 square area with
400 nodes.
TABLE 1Simulation Parameters
Fig. 10. Probability of broadcast for R 300 m.
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
13/15
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
14/15
range was set to 250 m. Figs. 18 and 19 compare theaverage delivery ratio of the broadcasting algorithms for
different probabilities of message-reception failure. Asshown in these figures, the Edge Forwarding algorithm isthe most robust broadcasting algorithm against message-reception failure. This is because the impact of message lossis less when the broadcast redundancy is high. Interest-ingly, the robustness of the RBS algorithm significantlyimproves as the node density increases. The simulationresults indicate that the slice-based algorithm is the leastrobust broadcasting algorithm against message-receptionfailure. This is mainly due to the fact that the slice-basedalgorithm selects a small number of nodes (less than six onthe average) to forward the message. Therefore, when theprobability of message-reception failure is high, it is very
likely that most of the selected nodes fail to receive andthus forward the message.
Finally, we simulated the broadcasting algorithms in a
mobile wireless setting. The nodes were initially distributed
using a uniform distribution. In the simulation, we used a
random walk mobility model and set the maximum velocity
to 10 m/s. We fixed the transmission range to 250 m and
varied the total number of nodes within 25-1,000. The
simulation results indicate that all the broadcasting algo-
rithms considered in this paper can achieve a high delivery
ratio (above 95 percent on the average) for N! 50, where N
is the total number of nodes in the network. This is mainly
because the implemented broadcasting algorithms make
broadcasting decisions on the fly. For N 25, the
implemented algorithms failed to achieve a high delivery
ratio because the network could easily get disconnected due
to the nodes mobility. Clearly, broadcasting algorithms
cannot achieve a high delivery ratio in such scenarios. It is
worth mentioning that for N! 50, the ratio of broadcasting
nodes is almost the same as the case where there is no
mobility (see Fig. 15).
6 CONCLUSION AND FUTURE WORK
In the first part of this paper, we proposed a forwarding-
node selection algorithm that selects at most 11 nodes in
On, where n is the number of neighbors. This limited
number of nodes is an improvement over Liu et al.salgorithm, which selects n nodes in the worst case and has
time complexity On log n. Moreover, we showed that our
proposed forwarding-node selection algorithm results in
fewer broadcasts in the network. In the second part of the
paper, we proposed an efficient receiver-based algorithm
and showed why it significantly reduces the number of
forwarding nodes in the network. We also relaxed some
system model assumptions that are typically used in the
broadcasting algorithms. Interestingly, the 2-hop-based
version of our proposed receiver-based algorithm can
guarantee constant approximation to the optimal solution
(minimum CDS). As far as the authors know, this is the firstbroadcasting algorithm that constructs a CDS on the fly
and can guarantee both full delivery and a constant
approximation ratio to the optimal solution. As part of
our future work, we will investigate the necessary condi-
tions to guarantee both full delivery and constant approx-
imation ratio to the minimum CDS.
REFERENCES[1] C. Perkins, Ad Hoc on Demand Distance Vector (AODV) Routing,
IETF Internet draft, work in progress, 1997.[2] D. Johnson and D. Maltz, Dynamic Source Routing in Ad Hoc
Wireless Networks, Mobile Computing, T. Imielinski and
H.F. Korth, eds., Kluwer Academic Publishers, 1996.[3] S. Ni, Y. Tseng, Y. Chen, and J. Sheu, The Broadcast StormProblem in a Mobile Ad Hoc Network, Proc. ACM MobiCom 99,pp. 151-162, 1999.
[4] M. Garey and D. Johnson, Computers and Intractability: A Guide tothe Theory of NP-Completeness. W.H. Freeman, 1990.
[5] B. Clark, C. Colbourn, and D. Johnson, Unit Disk Graphs,Discrete Math., vol. 86, pp. 165-177, 1990.
[6] P. Wan, K. Alzoubi, and O. Frieder, Distributed Construction ofConnected Dominating Set in Wireless Ad Hoc Networks, Proc.IEEE INFOCOM 02, vol. 3, pp. 1597-1604, 2002.
[7] S. Funke, A. Kesselman, U. Meyer, and M. Segal, A SimpleImproved Distributed Algorithm for Minimum CDS in Unit DiskGraphs, ACM Trans. Sensor Networks, vol. 2, no. 3, pp. 444-453,2006.
[8] H. Liu, P. Wan, X. Jia, X. Liu, and F. Yao, Efficient FloodingScheme Based on 1-Hop Information in Mobile Ad Hoc Net-
works, Proc. IEEE INFOCOM, 2006.
244 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 2, FEBRUARY 2009
Fig. 19. Average delivery ratio versus probability of message-reception
failure N 400.
Fig. 18. Average delivery ratio versus probability of message-reception
failure N 100.
-
7/31/2019 Correct-basepaper-efficient Broadcasting in Mobile Ad Hoc Networks
15/15
[9] Y. Tseng, S. Ni, and E. Shih, Adaptive Approaches to RelievingBroadcast Storms in a Wireless Multihop Mobile Ad HocNetworks, Proc. 21st Intl Conf. Distributed Computing Systems(ICDCS 01), pp. 481-488, 2001.
[10] Y. Sasson, D. Cavin, and A. Schiper, Probabilistic Broadcast forFlooding in Wireless Mobile Ad Hoc Networks, Proc. IEEEWireless Comm. and Networking Conf. (WCNC 03), pp. 1124-1130,2003.
[11] W. Lou and J. Wu, Double-Covered Broadcast (DCB): A
Simple Reliable Broadcast Algorithm in Manets, Proc. IEEEINFOCOM 04, pp. 2084-2095, 2004.[12] J. Wu and F. Dai, Broadcasting in Ad Hoc Networks Based on
Self-Pruning, Proc. IEEE INFOCOM 03, pp. 2240-2250, 2003.[13] W. Peng and X. Lu, On the Reduction of Broadcast Redun-
dancy in Mobile Ad Hoc Networks, Proc. ACM MobiHoc 00,pp. 129-130, 2000.
[14] T. He, C. Huang, B. Blum, J. Stankovic, and T. Abdelzaher,Range-Free Localization Schemes in Large Scale Sensor Net-works, Proc. ACM MobiCom 03, pp. 81-95, 2003.
[15] A. Keshavarz-Haddad, V. Ribeiro, and R. Riedi, DRB and DCCB:Efficient and Robust Dynamic Broadcast for Ad Hoc and SensorNetworks, Proc. Fourth Ann. IEEE Conf. Sensor, Mesh and Ad HocComm. and Networks (SECON 07), June 2007.
[16] R. Wattenhofer, L. Li, P. Bahl, and Y. Wang, Distributed TopologyControl for Power Efficient Operation in Multihop WirelessAd HocNetworks, Proc. IEEE INFOCOM 01, pp. 1388-1397, 2001.
[17] L. Li, J. Halpern, P. Bahl, Y. Wang, and R. Wattenhofer, A Cone-Based Distributed Topology-Control Algorithm for WirelessMulti-Hop Networks, IEEE/ACM Trans. Networking, vol. 13,pp. 147-159, 2005.
[18] M. Sun, W. Feng, and T. Lai, Broadcasting in Ad Hoc NetworksBased on Self-Pruning, Proc. IEEE Global Telecomm. Conf.(GLOBECOM 01), pp. 2842-2846, 2001.
[19] A. Papoulis, Probability and Statistics. Prentice Hall, 1990.[20] R. Chang and R. Lee, On the Average Length of Delaunay
Triangulations, BIT Numerical Math., vol. 24, pp. 269-273, 1984.[21] M. Khabbazian and V.K. Bhargava, Localized Broadcasting with
Guaranteed Delivery and Bounded Transmission Redundancy,IEEE Trans. Computers, vol. 57, no. 8, pp. 1072-1086, Mar. 2008.
[22] Y. Cai, K. Hua, and A. Phillips, Leveraging 1-Hop NeighborhoodKnowledge for Efficient Flooding in Wireless Ad Hoc Networks,Proc. 24th IEEE Intl Performance, Computing, and Comm. Conf.(IPCCC 05), pp. 347-354, 2005.
[23] J. Wu and H. Li, On Calculating Connected Dominating Set forEfficient Routing in Ad Hoc Wireless Networks, Proc. Third IntlWorkshop Discrete Algorithms and Methods for Mobile Computing andComm. (DIAL-M 99), pp. 7-14, 1999.
Majid Khabbazian received the BSc degree incomputer engineering from the Sharif Universityof Technology, Tehran, Iran, in 2002 and theMASc degree in electrical and computer en-gineering from the University of Victoria, BritishColumbia, Canada, in 2004. He is currently aPhD candidate in the Department of Electricaland Computer Engineering, University of BritishColumbia, Vancouver, British Columbia, Cana-
da, where he is a university graduate fellowshipholder. He was a university graduate fellowship recipient at theUniversity of Victoria. His current research interests include cryptogra-phy and wireless network security. He is a student member of the IEEE.
Vijay K. Bhargava received the BSc, MSc, andPhD degrees from Queens University, Kingston,Ontario, Canada in 1970, 1972, and 1974,respectively. Currently, he is a professor andthe head of the Department of Electrical andComputer Engineering, University of BritishColumbia, Vancouver, British Columbia, Cana-da. He was with the University of Victoria from1984 to 2003 and with Concordia University,Montreal, from 1976 to 1984. He is a coauthor of
the book Digital Communications by Satellite (John Wiley & Sons,1981), a coeditor of Reed-Solomon Codes and Their Applications(IEEE,
1994), and a coeditor of Communications, Information and NetworkSecurity(Kluwer Academic Publishers, 2003). His research interests arein wireless communications. He is very active in the IEEE and wasnominated by the IEEE Board of Directors for the office of IEEEPresident-Elect. He has served on the Board of the IEEE InformationTheory Society and the IEEE Communications Society. He is a pastpresident of the IEEE Information Theory Society. He is the editor-in-chief for the IEEE Transactions on Wireless Communications. Hereceived the IEEE Centennial Medal in 1984, the IEEE CanadasMcNaughton Gold Medal in 1995, the IEEE Haraden Pratt Award in1999, the IEEE Third Millennium Medal in 2000, the IEEE GraduateTeaching Award in 2002, and the Eadie Medal of the Royal Society ofCanada in 2004. He is a fellow of the IEEE, the Engineering Institute ofCanada (EIC), the Canadian Academy of Engineering, and the RoyalSociety of Canada.
. For more information on this or any other computing topic,
please visit our Digital Library at www.computer.org/publications/dlib.
KHABBAZIAN AND BHARGAVA: EFFICIENT BROADCASTING IN MOBILE AD HOC NETWORKS 245
top related