Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks



Similar documents
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Recent advances in microelectromechanical

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Energy Optimal Routing Protocol for a Wireless Data Network

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network


Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

A Link-state QoS Routing Protocol for Ad Hoc Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

An Extended AODV Protocol to Support Mobility in Hybrid Networks

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Prediction of DDoS Attack Scheme

Quality of Service Routing in Ad-Hoc Networks Using OLSR

Figure 1. The Example of ZigBee AODV Algorithm

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Optimized Load Balancing Mechanism Using Carry Forward Distance

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Security in Ad Hoc Network

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

A Secure Key Management Scheme in Wireless Mesh Networks

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Review of DDoS and Flooding Attacks in MANET

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

other. A B AP wired network

The Monitoring of Ad Hoc Networks Based on Routing

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Energy Consumption analysis under Random Mobility Model

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IN THIS PAPER, we study the delay and capacity trade-offs

Introduction to LAN/WAN. Network Layer

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Technology White Paper Capacity Constrained Smart Grid Design

Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Scaling 10Gb/s Clustering at Wire-Speed

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

WIRELESS communication channels have the characteristic

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

A Survey: High Speed TCP Variants in Wireless Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Securing MANET Using Diffie Hellman Digital Signature Scheme

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Transcription:

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Dhaka, Bangladesh Abstract We consider ad-hoc wireless networks and the topology control problem defined as minimizing the amount of power needed to maintain connectivity. The issue boils down to selecting the optimum transmission power level at each based on the position information of reachable s. Local decisions regarding the transmission power level induce a subgraph of the maximum powered graph G max in which edges represent direct reachability at maximum power. We propose an analysis for constructing minimum-energy path-preserving subgraphs of G max, i.e., ones minimizing the energy consumption between pairs. We also propose an algorithm for constructing subgraph of G max based on 1-hop neighbor information. By presenting experimental results we show the effectiveness of our proposed algorithm. keywords: Ad-hoc Network. I. INTRODUCTION Minimizing energy consumption is a major design goal in ad-hoc wireless network. If networks are designed preserving minimum energy paths then significant reduction in energy consumption can be achieved. We have to choose the minimum power level for each to minimize the energy consumption for the whole network. We use the same model as [1] which considers, an n-, multi-hop, ad-hoc, wireless network deployed on a two-dimensional plane. Suppose that each is capable of adjusting its transmission power up to a maximum denoted by P max. Such a network can be modeled as a graph G=(V,E), with the vertex set V representing the s, and the edge set defined as follows: E = { x, y x, y V V d(x, y) R max } (1) where d(x,y) is the distance between s x and y and R max is the maximum distance reachable by a transmission at the maximum power P max. The graph G defined this way is called the maximum powered network. By setting a reduced power level for each, messages can be transmitted with a minimum energy among all the paths in the network. This will lessen average degree and produce a subgraph of G, while maintaining global connectivity. We say that a graph G G is a minimum-energy pathpreserving graph or, alternatively, that it has the minimum energy property, if for any pair of s (u,v) that are connected in G, at least one of the (possibly multiple) minimum energy paths between u and v in G also belongs to G. Minimum-energy path-preserving graphs were first defined in [2]. Typically, many minimum-energy path-preserving graphs can be formed from the original graph G. It has been shown that the smallest of such subgraphs of G is the graph G min = (V,E min ),where(u, v) E min iff there is no path of length greater than 1 from u to v that costs less energy than the energy required for a direct transmission between u and v. Let G i = (V,E i ) be a subgraph of G = (V,E) such that (u, v) E i iff (u, v) E and there is no path of length i that requires less energy than the direct one-hop transmission between u and v. Then G min can be formally defined as follows: G min = G 2 G4... Gn 1 (2) It is easy to see that any subgraph G of G has the minimumenergy property iff G G min. Thereby, each of G i G min, for any i = 2, 3,..., n-1 is a minimum-energy path-preserving graph. G 2 is the first of the series G i, it is the most practically useful derivative of the maximum powered graph G. An algorithm for constructing one such graph, G 2, was presented in [2]. It works reasonably well in dense networks but its performance degrades considerably when the network density drops to medium or low. Construction of G 2 efficiently in sparse and moderately dense networks with some assistance of the Medium Access Control (MAC) layer was presented in [1]. To construct G 3 we need 2-hop information that means information from the immediate neighbors and the neighbors of those immediate neighbors. Number of links in G 2 and G 3 is considerably less compared to the number of links within the maximum powered network. Interestingly, number of links in G 3 does not reduce significantly compared to G 2 but G 3 requires 1 hop more information than G 2. On the other hand, if we can construct G 3 and G 2 in a distributed way, we can also construct G 2 G 3. G 2 G 3 is definitely more close to G min than G 2 and it has a great amount of savings in comparison to G 2. Construction of G 3 involves exchanging many messages, and thus causes obvious energy overheads. We have tried not to increase the overhead but improve the performance of G 2. Then we construct G 3 with the information collected from only the neighbors found within the region having radius R max. The resulting graph is Local Minimum Energy Communication Network () is nothing but G 2 with limited information. We present here a distributed algorithm to locally construct G 2. This approach requires no further

information than G 2 but produces a reasonable amount of savings. II. RELATED WORKS Recent research has lead to exposure of mainly three dimensions directed at power control algorithms for wireless mobile networks. The first class of solutions looks at the issue from the perspective of MAC layer. Monks et al. [3] propose a modification to the IEEE 82.11 RTS-CTS handshake whereby a overhearing a CTS packet uses the received power to estimate its distance to the sender. Also, Sing et al. [4] propose techniques for powering-off the transceivers when they are not active. The significance of the second approach lies in its dealing with network layer. Most of the schemes in this class use distributed variants of the Bellman-Ford algorithm with various flavors of cost metrics derived from the notion of power. Metrics taken as standard are as follows: energy consumed per packet, time to network partition, variance in power levels, and(power) cost per packet. The findings in the second approach can play a leading role in the third approach that separates routing from topology control. Ramanathan [5] describe two centralized heuristic algorithms to minimize the maximum transmission power while trying to maintain connectivity or bi-connectivity, called Local Information No Topology (LINT) and Local Information Link-State Topology (LILT). COMPOW proposed by Narayanaswamy [6], chooses the smallest common power level for each emphasizing mainly on 1) connectivity, 2)traffic carrying capacity maximization, 3)contention reduction in MAC layer, and 4) low power requirement. It is pre-assumed that distribution of s are homogeneous, which in the long run may appear as a serious flaw. CLUSTERPOW was designed to overcome the shortcomings of COMPOW by introducing clusters. However, it still suffers from a significant message overhead. Cone-Based Topology Control (CBTC), generates a graph structure similar to the one proposed by Yao [7]. Suitable initial power level and the increment of power level at each step are the driving force of CBTC, and plays a pioneer role in determining the number of overhead messages. Rodoplu [8] introduce the notion of relay region based on a specific power model. Their algorithm was later modified by Li [2] to trim some unnecessary edges. Our work closely relates to these two studies. N. Li [9] propose a distributed topology control algorithm (called LMST) based on constructing minimum spanning trees. Their algorithm achieves three goals: 1) connectivity, 2) bounded degree ( 6) and 3) bi-directional links. In LMST, each u collects the position information of all neighbors reachable at the maximum power. Based on this information, u creates its own local minimum spanning tree among the set of neighbors, where the weight of an edge is the necessary transmission power between its two ends. Once the tree has been constructed, u contributes to the final topology those s that are its neighbors in the spanning tree. One problem with LMST is that the resulting graph does not preserve the minimum-energy paths. III. ALGORITHM A. Power Model We are using the same power model as [1]. Here we assume the well known, generic, two-way, channel path loss model, where the minimum transmission power is a function of distance [1]. To send a packet from x to y, separated by distance d(x,y), the minimum necessary transmission power is approximated by P trans (x, y) =t d α (x, y), (3) where α 2 isthepath loss factor and t is a constant. Signal reception is assumed to cost a fixed amount of power denoted by r. Thus, the total power required for one-hop transmission between x and y becomes P total (x, y) =t d α (x, y)+r, (4) The model assumes that each is aware of its own position with a reasonable accuracy, e.g., via a GPS device. B. Previous approach to constructing G 2 An algorithm was presented in [8] based on relay region. Theconceptislikethis: Given a u and another v within u s communication range (at P max ), the relay region of v as perceived by u (with respect to u), R u v, is the collection of points such that relaying through v to any point in R u v takes less energy than a direct transmission to that point (see 1)). Given Fig. 1. u (a) The relay region of v with respect to u (b) The enclosure of the definition of relay region, the algorithm for constructing G 2 becomes straightforward. Construction of G 2 efficiently in sparse and moderately dense networks with some assistance of the Medium Access Control (MAC) layer was presented in [1].

Algorithm: 1. /* s main */ 2. /* ℵ is the set of discovered so far */ 3. /* ℵ s Neighbor set of s*/ 4. /* Suppose, s got a reply from r*/ 5. begin 6. ℵ s = ℵ s r 7. for each n in ℵ{ 8. /*get list of common neighbors 9. between n and r*/ 1. D=getCommonNeighbor(n,r,ℵ) 11. /*get list of common neighbors 12. between s and r*/ 13. G=getCommonNeighbor(s,r,ℵ) 14. Segment 1: 15. if r is in ℵ s { 16. /* case 1(a): */ 17. /* check for two length path 18. between s and r relaying through n*/ 19. if (cost(s, r) cost(s, n)+cost(n, r)){ 2. ℵ s = ℵ s {r} 21. goto Segment 2 22. } 23. /* case 1(b): */ 24. /* check for three length path between s 25. and r relaying n and d*/ 26. for each d in D{ 27. if (cost(s, r) cost(s, n) 28. +cost(n, d)+cost(d, r)){ 29. ℵ s = ℵ s {r} 3. goto Segment 2 31. } 32. } 33. } C. Algorithm We propose an algorithm for constructing close approximation of G 2 G 3 with much less overhead which works in a distributed way. We shall refer to our algorithm as the Local Minimum Energy Communication Network algorithm or algorithm in short through this paper. In algorithm, function cost(x, y) takes two s x and y as parameters and calculates the cost of direct transmission between them according to the equation 4 assuming t, the predetection threshold equal to 1 7 mw, additional receive power, r = 2mW and path loss factor, α = 4. Function getcommonneighbor(x,y,ℵ) determines the common neighbor set of x and y having information of set of s ℵ. The operation of the above algorithm is described from the viewpoint of one s. Heres broadcasts a single neighbor discovery message (NDM) at the maximum power P max. While s collects the replies of its neighbors, it learns their identities and locations. It constructs set ℵ and ℵ s. Initially, all those sets are empty (s doesn t even know what neighbors there are). Here N is defined as the set of all s that s has 34. Segment 2: 35. if n is in ℵ s { 36. /* case 2(a): */ 37. /* check for two length path 38. between s and n relaying through r*/ 39. if (cost(s, n) cost(s, r)+cost(r, n)){ 4. ℵ s = ℵ s {n} 41. goto Segment 3 42. } 43. /* case 2(b): */ 44. /* check for three length path between 45. s and n relaying r and d*/ 46. for each d in D{ 47. if (cost(s, n) 48. cost(s, r)+cost(r, d)+cost(d, n)){ 49. ℵ s = ℵ s {n} 5. goto Segment 3 51. } 52. } 53. /* case 2(c): */ 54. /* check for three length path between s 55. and n relaying through g and r*/ 56. for each g in G{ 57. if (cost(s, n) cost(s, g) 58. +cost(g, r)+cost(r, n)){ 59. ℵ s = ℵ s {n} 6. goto Segment 3 61. } 62. } 63. } 64. Segment 3: 65. continue 66. } 67. ℵ = ℵ r 68. End discovered so far and ℵ s is the set of its neighbors. Node s has to maintain direct link or direct communication with each in ℵ s, ℵ s ℵ. When s gets a reply from r it is added in the neighbor set ℵ s, then it considers 2 cases for each in ℵ. First it tries to find out a n in ℵ such that cost(s, r) >= cost(s, n)+cost(n, r), thenr is discarded from ℵ s because n can be used as a relay to transmit to r (see figure 2 case 1(a)). If cost(s, r) <cost(s, n)+cost(n, r) then there is no path of length two that can be used to transmit r with less energy than direct transmission between s and r. So,r will not be discarded from neighbor set ℵ s. Thus G 2 is forming here. Now a three length path that costs less energy than a direct transmission between s and r is searched on. If d is a common neighbor between n and r then cost(s, r) >= cost(s, n) + cost(n, d) + cost(d, r) condition is checked. If there is a that fulfils the above condition then r is discarded from ℵ s because there is path of length three which costs less than direct transmission (see Figure 3

Fig. 2. Case 1(a) Fig. 5. Case 2(b) Fig. 3. Case 1(b) case 1(b)). Now our algorithm search for the s that should be removed from neighbor set ℵ s after including r. First it discards all the s for which r can be used as relay in case of two length path (see figure 4). Thus G 2 is formed here. Then search for a d in common neighbor set of n and r and for a g in common neighbor set of s and r is done to find out a three length path that is less costly than direct transmission between s and n (see figure 5 and figure 6). This algorithm constructs G 2 in a proper way and then tries to construct G 3 from available (partial) information. As we know that construction of G 3 requires 2 hop information from neighbors which causes more messages to be exchanged and increases energy overheads. So we tried to improve performance of G 2 here. We constructed G 3 using Fig. 4. Case 2(a) Fig. 6. Case 2(c) the local information found by exchanging 1 hop information like G 2. We refer to the graph found by as G throughout this paper. D. Why G close to G 2 In this section we present scenario where local information from immediate neighbors are not enough to construct G 3. In Figure 7 the circle represents R max neighborhood of a. b and c is inside its neighbor region but d is outside of its sensing range. Suppose d is situated very close to R max i.e., near the boundary of a. As a has only local information in, it will see that there is no two or three length path that costs less than direct communication between a and b, therefore it maintains link ab. But in actual case it might happen that relaying through c and d may cost less than direct communication between a and b. So,acdb is the three length path that is considered in G 3 but not in. This is a case where produces more link than G 2. Lemma 1: G G 2. Proof: A link between two s u, v V is deleted in only when there is another minimum energy path of two or three length between the s, i.e. applies G 2 and locally G 3, thus, it does not destroy any minimum energy path having length two or three. Besides, produces some extra links as described in previous subsection. So the resultant graph G is definitely a superset of G 2.

7 6 original Fig. 7. An Extraneous Edge 5 4 3 2 Lemma 2: preserves connectivity. Proof: We presented G min as, 1 1 2 3 4 5 6 7 G min = G 2 G4... Gn 1 According to [2] G min is the smallest subgraph with the minimum energy property. G min has no redundant edges and also preserves connectivity. Thereby, each of G i G min,for any i = 2, 3,..., n-1 is a minimum-energy path preserving graph and also preserves connectivity. G 2 G 3 is a superset of G min according to Lemma 2 G G 2 G 3 and thus, preserves connectivity. A. Topological Analysis IV. EXPERIMENTAL RESULTS By simulation we evaluate the performance of our algorithm. Initially we deployed 25-3 s over a flat square area of 67m 67m according to uniform distribution. Figure 8 shows a typical deployment of 75 s, each having a maximum communication range of 25m. This is the starting graph G for our algorithm. The graph found by G 2 is figure 9 which shows a great amount of savings than original graph G. The next graph at figure 1 is found by G 3,thisalsohas a large amount of savings with respect to original graph G at figure 8. So, both G 2 and G 3 shows good results. Now the graph that is closer to G min than G 2 and also G 3 is G 2 G 3 is shown in figure 11. This graph has the least number of links among the graphs mentioned above. Figure 12 shows the graph we found by. Here the graph has just one more linkthanthatofg 2 G 3. This implies that the performance of is much closer to G 2 G 3 but incurs much less overhead than constructing G 3 (2 hop information) to calculate G 2 G 3. We perform more simulation on our algorithm deploying 25-1 s according to zipf distribution, figure 13 shows the starting graph G of our algorithm. It is a typical deployment of 75 s, each having a maximum communication range of 25m. The next two fig shows the graph found by G 2 (figure 14) and G 3 (figure 15) where both shows good savings. In uniform distribution G 2 G 3 (figure 16) and G (figure 17) both shows same no of links. We have got the same result here without increasing the overhead, it is definitely a good achievement. Fig. 8. Original Graph (uniform distribution) no. of s 75 7 G2 6 5 4 3 2 1 1 2 3 4 5 6 7 Fig. 9. G 2 (uniform distribution) no. of s 75 7 6 5 4 3 2 1 1 2 3 4 5 6 7 Fig. 1. G 3 (uniform distribution) no. of s 75

7 6 G2Int 7 6 G2 5 5 4 4 3 3 2 2 1 1 1 2 3 4 5 6 7 Fig. 11. G 2 G 3 (uniform distribution) no. of s 75 1 2 3 4 5 6 7 Fig. 14. G 2 (Zipf distribution) no. of s 75 7 6 7 6 5 5 4 4 3 3 2 2 1 1 1 2 3 4 5 6 7 1 2 3 4 5 6 7 Fig. 12. G (uniform distribution) no. of s 75 Fig. 15. G 3 (Zipf distribution) no. of s 75 7 6 original 7 6 G2Int 5 5 4 4 3 3 2 2 1 1 1 2 3 4 5 6 7 1 2 3 4 5 6 7 Fig. 13. Original Graph (Zipf distribution) no. of s 75 Fig. 16. G 2 G 3 (Zipf distribution) no. of s 75

7 6 5 4 3 no. of links 3 25 2 15 G2 2 1 1 2 3 4 5 6 7 Fig. 17. G (Zipf distribution) no. of s 75 Fig. 19. 1 5 2 3 4 5 6 7 8 9 1 no. of s comparison between G 2 and G in Zipf distribution no. of links 1 9 8 7 6 5 4 3 2 1 G2 5 1 15 2 25 3 no. of s TABLE I COMPARISON BETWEEN G 2 AND G IN UNIFORM DISTRIBUTION No of Edges Edges Nodes in G 2 in G 25 61.6 6. 35 85.2 81. 5 133.6 124.8 75 22.8 19.8 1 278. 262. 15 441.6 412.4 2 596. 562.8 3 948.8 92.8 Fig. 18. Comparison Between G 2 and G in Uniform distribution B. Comparison between G 2 and G Here we deployed 25-3 s over a flat square area of 67m 67m according to uniform distribution and simulate the network both for G 2 and. For illustration, Table I shows a comparison between the number of edges in G 2 and in. For a specific number of s there are five different scenarios. We have taken average number of edges or links for each set. We found here a saving of 4.85% without increasing overhead( see figure 18). Again, we simulate on a network of 25-1 s deployed over a flat square area of 67m 67m according to Zipf distribution. Table II shows a comparison between the number of edges in G 2 and in. Up to 6.18% of links is saved here (see figure 19). In both distribution the savings is quite satisfactory and considerably higher for denser networks. C. Overhead Analysis A s broadcasts NDM at first to know about its neighbors. In case of constructing G 2, the number of reply messages for any s is equal to NodeDegree(s). Nodedegree is defined as the number of neighbors it has within the region having radius R max. For constructing G 2 G 3, the number of reply messages is equal to, NodeDegree(s)+ n neighbor(s) NodeDegree(n). Now, we took the number of reply messages as overhead. To analysis on overhead cost by G 3 and G (or G 2 ) we simulate on networks of 25-3 s deployed over a flat square area of 67m 67m spread under uniform distribution ( 2) and 25-1 s deployed over a flat square area of 67m 67m according to Zipf distribution ( 21). For a specific number of s there are five different scenarios. We have taken average number of overhead messages for each set. We found that construction of G 3 causes huge amount of overhead with respect to G in both the cases. TABLE II COMPARISON BETWEEN G 2 AND G IN ZIPF DISTRIBUTION No of Edges Edges Nodes in G 2 in G 25 57.6 55.4 3 75.2 7.8 35 91.2 85.2 4 15.2 99.6 45 118. 111. 5 131.6 125.2 75 27.6 198.2 1 284.8 267.2

No. of overhead messages 3e+6 2.5e+6 2e+6 1.5e+6 1e+6 5 V. CONCLUSION The algorithm we have presented is a distributed algorithm that ensures minimum energy path preserving graphs in adhoc wireless networks. Our construction of is assisted by the rudimentary protocol of constructing G 2. Its need of information for an additional hop is served with no additional overhead and only through the previous information gained through G 2. Our studies assisted by some simulation results, have demonstrated the superiority and robustness of the new algorithm over the previous solutions for networks with moderate and low density of s. 5 1 15 2 25 3 No. of s Fig. 2. Overhead comparison between G 3 and G in Uniform distribution No. of overhead messages 25 2 15 1 5 2 3 4 5 6 7 8 9 1 No. of s Fig. 21. Overhead comparison between G 3 and G in Zipf distribution TABLE III OVERHEAD COMPARISON BETWEEN G 3 AND G IN UNIFORM DISTRIBUTION No of Overhead msg. Overhead msg. Nodes in G in G 3 25 16.8 1342.4 35 334.8 391.8 5 81.4 15613.6 75 1637.2 4113.8 1 382. 16442.8 15 6978.8 361218. 2 12421.6 852938.4 3 27777.6 2821319.2 REFERENCES [1] A. Rahman and P. Gburzynski, Mac-assisted topology control for ad-hoc wireless networks. International Journal of Communication Systems, vol. 19, no. 9, pp. 955 976, 26. [2] L. Li and J. Halpern, Minimum energy mobile wireless networks revisited, Proc. IEEE International Conference on Communications (ICC), june, 21. [3] J. P. Monks, V. Bhargavan, and W. M. Hwu, A power controlled MAC protocol for wireless packet networks, in Proceedings of INFOCOM, 21, pp. 219 228. [4] S. Singh and C. Raghavendra, Power efficient MAC protocol for multihop radio networks, in Proceedings of PIMRC, 1998, pp. 153 157. [5] R. Ramanathan and R. Rosales-Hain, Topology control of multihop wireless networks using transmit power adjustment, in In Proc. of IEEE INFOCOM 2, Tel Aviv, Israel, March 2, pp. 44 413. [6] S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and P. R. Kumar, Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol, in Proceedings of the European Wireless Conference - Next Generation Wireless Networks: Technologies, Protocols, Services and Applications, Florence, Italy, February 22, pp. 156 162. [7] Y.-S. C. h. Sze-Yao Ni, Yu-Chee Tseng and J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, in Mobicom, 1999. [8] V. Rodoplu and T. Meng, Minimum energy mobile wireless networks, IEEE Journal of Selected Areas in Communications, vol. 17, pp. 1333 1344, 1999. [9] N. Li, J. C. Hou, and L. Sha, Design and analysis of an MST-based topology control algorithm, in Proceedings of INFOCOM, 23. [1] T. Rappaport, Wireless communications: principles and practice, pp. 219 228, 1996. TABLE IV OVERHEAD COMPARISON BETWEEN G 3 AND G IN ZIPF DISTRIBUTION No of Overhead msg. Overhead msg. Nodes in G in G 3 25 38.8 4799.6 3 357.6 5274.4 35 515.2 956.4 4 675.2 13656.4 45 93.8 2331.2 5 1146.4 24828.4 75 2592.4 14965.6 1 4377.2 22126.8