Beruflich Dokumente
Kultur Dokumente
Abstract: Cluster Management using Cluster Size Ratio delivering messages in a decentralized environment where
(CMCSR) is a completely distributed algorithm for partitioning network topology fluctuates is not a welldefined problem
a given set of mobile nodes into clusters. The proposed [1].
algorithm tries to reduce the amount of computational and
information overhead while maintaining a stable cluster 1.2 Clustering in Ad Hoc Networks
formation. It constructs and maintains a backbone topology A wireless ad hoc network consists of nodes that move freely
based on a minimal dominating set (MDS) of the network.
and communicate with each other using wireless links. Ad-
According to this algorithm, each node determines the
membership in the MDS for itself and its one-hop neighbors
hoc networks do not use specialized routers for path
based on one-hop neighbor information that is disseminated discovery and traffic routing. One way to support efficient
among neighboring nodes using willingness and priority communication between nodes is to develop wireless
information of the nodes. The algorithm then ensures that the backbone architecture; this means that certain nodes must be
members of the MDS are connected into a connected selected to form the backbone. Over time, the backbone
dominating set (CDS), which can be used to form the backbone must change to reflect the changes in the network topology
infrastructure of the communication network to facilitate as nodes move around. The algorithm that selects the
routing. The algorithm outperforms the existing algorithms with members of the backbone should naturally be fast, but also
respect to stability. Load balancing the cluster heads using the should require as little communication between nodes as
cluster size ratio is the heuristic used in this algorithm. possible, since mobile nodes are often powered by batteries.
One way to solve this problem is to group the nodes into
1. Introduction clusters, where one node in each cluster functions as cluster
head, responsible for routing [2].
This section discusses elementary issues of ad hoc networks
and benefits of clustering. 1.3 Benefits of clustering
Ad-hoc networks are suited for use in situations where an
1.1 Ad Hoc Networks infrastructure is unavailable or to deploy one is not cost
In the next generation of wireless communication systems, effective. One of many possible uses of mobile ad-hoc
there will be a need for the rapid deployment of independent networks is in some business environments, where the need
mobile users. Significant examples include establishing for collaborative computing might be more important
survivable, efficient, dynamic communication for outside the office environment than inside, such as in
emergency/ rescue operations, disaster relief efforts, and business meeting outside the office to brief clients on a
military networks. Such network scenarios cannot rely on given assignment.
centralized and organized connectivity, and can be Mobile ad-hoc networks allow the construction of flexible
conceived as applications of ad hoc networks. An ad hoc and adaptive networks with no fixed infrastructure. These
network is an autonomous collection of mobile users that networks are expected to play an important role in the future
communicate over relatively bandwidth constrained wireless wireless generation. Future wireless technology will require
links. Since the nodes are mobile, the network topology may highly-adaptive mobile networking technology to effectively
change rapidly and unpredictably over time. The network is manage multi-hop ad-hoc network clusters, which will not
decentralized, where all network activity including only operate autonomously but also will be able to attach at
discovering the topology and delivering messages will be some point to the fixed networks.
taken care by the nodes, i.e., routing functionality will be
incorporated into mobile nodes. 2. Literature Review
The set of applications for ad hoc networks is diverse, This section emphasizes some of the past clustering
ranging from small, static networks that are constrained by techniques.
power sources, to large-scale, mobile, highly dynamic
networks. The design of network protocols for these 2.1 Types of Topology Management
networks is a complex issue. Regardless of the application, There are two approaches to topology management in ad
ad hoc networks need efficient distributed algorithms to hoc networks:
determine network organization, link scheduling, and
• Power control.
routing. However, determining viable routing paths and
• Hierarchical topology organization.
(IJCNS) International Journal of Computer and Network Security, 59
Vol. 2, No. 4, April 2010
other. We will only consider bidirectional links. It is priorities that consists of two components: (a) Neighboring
assumed the MAC layer will mask unidirectional links and Nodes, (b) Willingness value assigned to a node as a
pass only bidirectional links. Beacons could be used to function of its mobility and energy level.
determine the presence of neighboring nodes. After the We denote the willingness value of node i by Wi, the speed
absence of some number of successive beacons from a of node i by a scalar Mi that ranges from 0 to 1 meters per
neighboring node, it is concluded that the node is no longer second, and the remaining energy on node i as Ei in the
a neighbor. Two nodes that have a wireless link will, range of 0 and 1. The willingness Wi is a function that
henceforth, be said to be one wireless hop away from each should be defined according to the following criteria:
other. They are also said to be immediate neighbors.
Communication between nodes is over a single shared 1. To enhance survivability, each node should have the
channel. responsibility of serving as a cluster head with some
nonzero probability determined by its willingness value.
In ad hoc networks the nodes within each neighborhood are 2. To facilitate with the stability and the frequency with
not known a priori. The individual cluster may transition to which cluster head elections must take place, the
spatial TDMA for inter-cluster and intra-cluster willingness value of a node should remain constant as long
communication. All nodes broadcast their node identity as the variation of the speed and energy level of the node do
periodically to maintain neighborhood integrity. Due to not exceed some threshold values.
mobility, a node’s neighborhood changes with time. As the 3. To avoid electing cluster heads that quickly lose
mobility of nodes may not be predictable, changes in connectivity with their neighbors after being elected, the
network topology over time are arbitrary. However, nodes willingness value of a node should decrease drastically after
may not be aware of changes in their neighborhood. the mobility of the node exceeds a given value.
Therefore, clusters and cluster heads must be updated 4. To prolong the battery life of a node, its willingness
frequently to maintain accurate network topology. value should decrease drastically after the remaining energy
of the node drops below the given level.
3.2.1 Attributes of a node
Willingness value (Wi) is as specified below:
The attributes of a node and their functionality are as given
Wi = 2log2(Ei+.9)log2(Mi+2)
in Table I.
Here the constants 0.9 and 2 in Eq. (1) eliminate the
Table 1: Attributes of a node and their functionality
boundary conditions in the logarithmic operations. The
ATTRIBUTE FUNCTION logarithmic operations on the speed and the remaining
energy values render higher willingness values in the high
ID Unique name given to node
energy and low speed field, while giving close to zero values
ENERGY The capacity to work in
in the low energy and high-speed region.
MOBILITY The speed of the node when it
is moving Priority value (Pi) is a function of no.of neighbors and
WILLINGNESS How much the node is willing willingness
to be a cluster head i.prio = 2log2(Wi)/n
PRIORITY Has the priority among other Figure 1 illustrates the effect of the two factors on the
nodes to became a cluster head priority values. From the Figure 2 we can conclude that the
CLUSTER SIZE Cluster size ratio which it is priority is directly proportional to the willingness value and
having number of neighbors.
TYPE Whether it is cluster head or
gateway or door way or
member
NEIGHBORS Number of one – hop neighbors
1
Duration, which provides a basis for evaluating the shaped line indicates the cluster head duration with load i..e.
performance of the proposed load-balancing heuristic. incase of CMCSR.
For the purposes of these simulations we have set the cluster
head budget to be a function of the maximum amount of
4.2 Nodes Vs Number of Cluster Heads
work it performs That is, once a node becomes a cluster
head it will remain a cluster head until it has exhausted its Figure 3 shows the graph for the average number of cluster
maximum work load, or until it loses out to another cluster heads formed during the topology management. The
head based on the rules of the cluster election heuristic. topology management is executed for 1800 seconds for each
of x nodes and the values are noted. The diamond shaped
The proposed CMCSR algorithm makes a noticeable line indicates the number of cluster head formed during
difference in the cluster head duration (ranging from 4% to topology management without load (TMPO). Second the
28%). This shows that the load-balancing heuristics topology management executed for the 600 seconds for each
generates longer cluster head durations; it will also produce x nodes and the values are noted. Totally the program is
much tighter and more deterministic responses (stability). executed for 18000 seconds. The square shaped line
These results are not surprising. Therefore, once a cluster indicates the cluster head formed during topology
head is elected it continues as cluster head for a maximum management with load (CMCSR).
of the programmed budget. This will provide the longer
cluster head durations that we see. The cluster size ratio 16
2
4.1 Nodes Vs Cluster Head Duration
0
Figure 2 shows the graph for the average cluster head 10 20 30 40 50 60 70 80 90 100
duration. X-axis takes the number of nodes and y-axis No.of Nodes
shows the cluster head duration in seconds. The topology TMPO CMCSR
management is executed for 1800 seconds for each x nodes
Figure 3. Average no. of clusters
and the values are noted. Totally the program is executed for
18000 seconds. The diamond shaped line indicates the
cluster head duration without load i.e. incase of TMPO.
25
30
25
20
Cluster Head Duration(in Sec)
20
15
15
10
10
5
0
10 20 30 40 50 60 70 80 90 100
No. of Nodes
0
TMPO CMCSR
900 1800 2700 3600
Syst em Execut ed(Sec)
Figure 2. Average Cluster head duration Vs no. of nodes TMPO CMCSR
Second the topology management is executed for the 600 Figure 4. Average Cluster head duration
seconds for each x nodes and the values are noted. Totally
the program is executed for 18000 seconds. The square
(IJCNS) International Journal of Computer and Network Security, 63
Vol. 2, No. 4, April 2010
4.3 Improvement in Cluster head Duration Sciences Research 2(6): 336-340, INSInet Publication,
2006.
Figure 4 shows the graph for the average cluster head
[4] L. Hu. “Topology Control for Multihop Packet Radio
duration. X-axis takes system executed in seconds and y-
Networks,”. IEEE Transactions on Communications,
axis shows the average cluster head duration in seconds.
41(10), Oct. 1993.
The below graph is constructed under the following
[5] S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and
conditions. Both TMPO and CMCSR is run for 900 sec,
P. R. Kumar, “Power Control in Ad-Hoc Networks:
1800 sec, 2700 sec and 3600 sec by taking total number of
Theory, Architecture, Algorithm and Implementation of
nodes into account as 50. The diamond shaped line indicates
the COMPOW Protocol,” Proceedings of the European
the cluster head duration without load and the square shaped
Wireless Conference on Next Generation Wireless
line indicates the cluster head duration with load. The
Networks: Technologies, Protocols, Services and
results related to the above three graphs indicates that
Applications, pages 156-162, Florence, Italy, Feb. 25-
CMCSR outperforms TMPO.
28, 2002.
[6] H. Takagi and L. Kleinrock, “Optimal Transmission
Ranges for Randomly Distributed Packet Radio
5. Conclusions Terminals,” IEEE Transactions on Communications,
32(3),7, Mar. 1984.
The cluster size load balancing heuristics have been [7] L. Li, V. Bahl, Y.M. Wang, and R. Wattenhofer,
proposed for ad hoc networks. The cluster election heuristics “Distributed Topology Control for Power Efficient
favor the election of cluster heads based on node willingness Operation in Multihop Wireless Ad Hoc Networks,”
and number of neighbors. Here the heuristic places a cluster Proceedings of IEEE Conference on Computer
size budget on the contiguous amount of time that a node Communications (INFOCOM), Apr. 2001.
acts as cluster head. As seen from the simulation results, [8] R. Ramanathan and R. Rosales-Hain, “Topology
this heuristic produce larger cluster head durations while Control of Multihop Wireless Networks using Transmit
decreasing the cluster size and enhancing the stability. Power Adjustment,” Proceedings of IEEE Conference
on Computer Communications (INFOCOM), IEEE,
Our proposed CMCSR is a novel energy-aware topology Mar. 26-30, 2000.
management approach based on dynamic node priorities and [9] R. Prakash, “Unidirectional Links Prove Costly in
cluster size load in ad hoc networks. CMCSR consists of two Wireless Ad-Hoc Networks,” Proceedings of the
parts that implement the MDS and CDS elections Discrete Algorithms and Methods for Mobile
respectively. Compared to five prior heuristics of MDS and Computing and Communications - DialM, Seattle, WA,
CDS elections in ad hoc networks, MDS offers four key Aug. 20, 1999.
advantages. i) CMCSR obtains the MDS and CDS of the [10] S. Bandyopadhyay and E. J. Coyle, “An Energy
network without any negotiation stage; only two-hop Efficient Hierarchical Clustering Algorithm for
neighbor information is needed. ii) CMCSR allows nodes in Wireless Sensor Networks”, In Proc. INFOCOM 2003,
the network to periodically re-compute their priorities, so as San Francisco, Apr, 2003.
to balance the cluster head role and prolong the battery life [11] M. Maeda and Ed Callaway, "Cluster Tree Protocol
of each node. iii) CMCSR introduces the willingness value (ver.0.6)",http://www.ieee802.org/15/pub/2001/May01/
of a node, which decides the probability of the node being 01189r0P80215_ TG4-Cluster-Tree-Network.pdf.
elected into the MDS according to the battery life and [12] L. Bao and J.J. Garcia-Luna-Aceves, “Transmission
mobility of the node and iv) MDS introduces doorway Scheduling in Ad Hoc Networks with Directional
concept for the CDS in addition to the well-known gateway Antennas,” Proc. ACM Eighth Annual International
and cluster head concepts. Conference on Mobile Computing and networking,
A key contribution of this work consists of converting the Atlanta, Georgia, USA, Sep, 23-28 2002.
static attributes of a node, such as node identifier, into a [13] B. Chen, K. Jamieson, H. Balakrishnan, and R.
dynamic control mechanism that incorporates the three key Morris, “Span: an Energy-Efficient Coordination
factors for topology management in ad hoc networks -- the Algorithm for Topology Maintenance in Ad Hoc
nodal battery life, mobility, and cluster size load balancing. Wireless Networks,” In Proc. 7th ACM MOBICOM,
Although existing proposals have addressed all these Rome, Italy, Jul, 2001.
aspects, CMCSR constitutes a more comprehensive [14] C.C. Chiang, H.K. Wu, W. Liu, and M. Gerla,
approach. “Routing in Clustered Multihop, Mobile Wireless
Networks with Fading Channel,” IEEE Singapore
References International Conference on Networks SICON'97, pages
[1] http://w3.antd.nist.gov/wahn_mahn.shtml. 197-211, Singapore, Apr. 14-17, 1997.
[2] Tomas Johansson and Lenka Carr-Motyˇckov´. “On [15] L. Bao and J.J. Garcia-Luna-Aceves, “Topology
Clustering in Ad Hoc Networks,” First Swedish Management in Ad Hoc Networks,” Proc of the 4th
National Computer Networking Workshop, ACM Interational Symposium on Mobile Ad Hoc
SNCNW2003, 8-10 September, 2003. Networking and Computing (MOBIHOC), Annapolis,
[3] R.Pandian, P.Seethalakshmi and V.Ramachandran, Maryland, USA, Jun. 2003.
“Enhanced Routing Protocol for Video Transmission
over Mobile Adhoc Network,” Journal of Applied
64 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Authors Profile
Mr D K L V Chandra Mouly received M.Tech (CSE) from S V
University College of Engineering, Tirupati, India in the year
2007. Currently he is pursuing his Ph.D. (Part-time) at S V
University, Tirupati. His areas of interests are Computer Networks
and Distributed Systems.