Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-s2hrs Total loading time: 0 Render date: 2024-11-13T01:07:59.422Z Has data issue: false hasContentIssue false

8 - Topology management and control

Published online by Cambridge University Press:  05 December 2014

Mohammad S. Obaidat
Affiliation:
Monmouth University, New Jersey
Sudip Misra
Affiliation:
Indian Institute of Technology
Get access

Summary

Wireless sensor networks (WSNs) exhibit an “autocratic” operational policy with minimal human intervention. So, such networks must be self-configurable to maintain their autonomy. The requisitions of WSN-specific applications are quenched by temporal cooperation and coordination among the sensor nodes. Naturally, these nodes are expected to perpetuate a healthy intra-network infrastructure. However, they are power constrained with a bounded communication range and low computational ability. Hence, issues related to network infrastructure should be dynamically handled with efficacy.

Topology is a vital aspect of WSNs that needs attention for both network and fault management. In this chapter, we focus on two aspects of topology: (a) topology management, and (b) topology control.

Topology management is the process of deriving a simple graph of node connectivity by determining the inter-nodal links and virtual relationships for efficient operations within a network contour. Topology management aims at conserving the energy of the nodes and consequently extending the lifetime of the network with parallel maintenance of network connectivity.

Topology control of a WSN is a measure of the degree of network coverage and internode connectivity. Topology management and control might appear analogous. However, these two aspects are distinct, and so is their categorization, which we will discuss in this chapter.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Nancharaiah, B., Sudha, G. F. and Murthy, M. B. R., “A scheme for efficient topology management of wireless ad hoc networks using the MARI algorithm,” in 16th IEEE International Conference on Networks, ICON 2008, Dec. 12–14, 2008.
Mamun, Q., Ramakrishnan, S. and Srinivasan, B., “Multi-chain oriented logical topology for wireless sensor networks,” in 2nd International Conference, Computer Engineering and Technology (ICCET), April 16–18, 2010.
Misra, S., Woungang, I. and Misra, S. C., Guide to Wireless Sensor Networks, London: Springer-Verlag, 2009.CrossRefGoogle Scholar
Deb, B., Bhatnagar, S. and Nath, B., “A topology discovery algorithm for sensor networks with applications to network management,” Technical Report, Rutgers University, May 2001.
Deb, B., Bhatnagar, S. and Nath, B., “Multi-resolution state retrieval in sensor networks,” in Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 19–29,11 May 2003.
Chen, B., Jamieson, K., Balakrishnan, H. and Morris, R., “Span: an energy efficient coordination algorithm for topology maintenance in ad-hoc wireless networks,” Mobicom, Rome, Italy, pp. 70–84, July 2001.
Xu, Y., Bien, S., Mori, Y., Heidemann, J. and Estrin, D., “Topology control protocols to conserve energy in wireless ad-hoc networks,” Technical Report 6, University of California, Los Angeles, Center for Embedded Networked Computing, January 2003.
Cheng, S., Li, J. and Horng, G., “An adaptive cluster-based routing mechanism for energy conservation in mobile ad hoc networks,” Personal Communication, June 2012.
Schurgers, C., Tsiatsis, V. and Srivastava, M. B., “STEM: topology management for energy efficient sensor networks,” in Aerospace Conference Proceedings, IEEE, 2002.
Schurgers, C., Tsiatsis, V., Ganeriwal, S. and Srivastava, M. B., “Topology management for sensor networks: exploiting latency and density,” MOBIHOC’02, Lausanne, Switzerland, ACM, June 9–11, 2002.Google Scholar
Godfrey, B. P. and Ratajczak, D., “Naps: scalable, robust topology management in wireless ad-hoc networks,” ISPN’04, Berkeley, CA, ACM, April 26–27, 2004.Google Scholar
Heinzelman, W. R., Chandrakasan, A. and Balakrishnan, H., “Energy efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Jan. 4–7, 2000.
Heinzelman, W. B. et al., “Application specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, pp. 660–670, 2002.CrossRefGoogle Scholar
Hong, X. and Liang, Q., “An access based energy efficient communication protocol for wireless microsensor networks,” in 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2004), Vol. 2, pp. 1022–1026, Sept. 5–8, 2004.
Ye, M., Li, C., Chen, G. and Wu, J., “EECS, an energy efficient clustering scheme in wireless sensor networks,” in 24th IEEE International Performance, Computing and Communication ConferenceIPCCC, pp. 535–554, April 7–9, 2005.Google Scholar
Durresia, A., Paruchuri, V. and Barolli, L., “Clustering protocol for sensor networks,” in 20th International Conference, AINA 2006, Vol. 2, pp. 18–20, April 2006.
Busse, M., Haenselmann, T. and Effelsberg, W., “TECA: a topology and energy control algorithm for wireless sensor networks,” in International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM ‘06), Torremolinos, Malaga, Spain, ACM, Oct. 2–6, 2006.Google Scholar
Lindsey, S. and Raghavendra, C. S., “PEGASIS: power-efficient gathering in sensor information systems,” in IEEE Aerospace Conference Proceedings, 2002.
Kim, J., Kim, S., Kim, D. and Lee, W., “Low-energy efficient clustering protocol for ad-hoc wireless sensor network,” in 15th International Symposium on Personal, Indoor and Mobile Radio Communications, 2004 (PIMRC 2004), Vol. 2, pp. 1022–1026, Sept. 5–8, 2004.
Kumar, D., Aseri, T. C. and Patel, R. B., “EEHC: energy efficient heterogeneous clustered scheme for wireless sensor networks,” Computer Communications, Vol. 32, issue 4, pp. 662–667, March 2009.CrossRefGoogle Scholar
Li, B. M., Li, Z. and Vasilakos, A. V., “A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issues,” Proceedings of the IEEE, Vol. 25, No. 10, pp. 2367–2380, 2013.Google Scholar
Zhang, H. and Hou, J., “Maintaining sensing coverage and connectivity in large sensor networks,” Urbana, Vol. 1, pp. 89–124, 2003.Google Scholar
Wang, X., Xing, G., Zhang, Y., et al., “Integrated coverage and connectivity configuration in wireless sensor networks,” in Proceedings ACM International Conference Embedded Network Sensor Systems, pp. 28–39, 2003.
Huang, C. and Tseng, Y., “The coverage problem in a wireless sensor network,” Mobile Network Applications, Vol. 10, pp. 519–528, 2005.CrossRefGoogle Scholar
Bai, X., Yun, Z., Xuan, D., Jia, W. and Zhao, W., “Pattern mutation in wireless sensor deployment,” in Proceedings IEEE International Conference on Computer Communications, 2010, DOI: .
Wang, G., Cao, G. and La Porta, T., “Movement-assisted sensor deployment,” IEEE Transactions on Mobile Computing, Vol. 5, No. 6, pp. 640–652, June 2006.CrossRefGoogle Scholar
Howard, A., Mataric, M. and Sukhatme, G., “Mobile sensor network deployment using potential fields: a distributed, scalable solution to the area coverage problem,” Distrib. Autonom. Robot. Syst., Vol. 5, pp. 299–308, 2002.Google Scholar
Ganeriwal, S., Kansal, A. and Srivastava, M., “Self aware actuation for fault repair in sensor networks,” in Proceedings IEEE International Conference Robotics and Automation, Vol. 5, pp. 5244–5249, 2004.
Wang, G., Cao, G. and LaPorta, T., “A bidding protocol for deploying mobile sensors,” in Proceedings of the IEEE International Conference on Networks protocols, pp. 315–324, 2003.
Batalin, M. and Sukhatme, G., “Coverage, exploration and deployment by a mobile robot and communication network,” Telecommunication Systems, Vol. 26, No. 2–4, pp. 181–196, 2004.CrossRefGoogle Scholar
Liu, B. and Towsley, D., “A study of the coverage of large-scale sensor networks,” in Proceedings of the IEEE International Conference on Mobile Ad-Hoc Sensor Systems, pp. 475–483, 2004.
Kumar, S., Lai, T. and Arora, A., “Barrier coverage with wireless sensors,” in Proceedings of the ACM International Conference on Mobile Computer Networks, pp. 284–298, 2005.
Balister, P., Bollobas, B., Sarkar, A. and Kumar, S., “Reliable density estimates for coverage and connectivity in thin strips of finite length,” in Proceedings of the ACM International Conference on Mobile Computer Networks, pp. 75–86, 2007.
Chen, A., Kumar, S. and Lai, T., “Designing localized algorithms for barrier coverage,” in Proceedings ACM International Conference on Mobile Computer Networks, pp. 63–74, 2007.
Saipulla, A., Westphal, C., Liu, B. and Wang, J., “Barrier coverage of line-based deployed wireless sensor networks,” in Proceedings IEEE International Conference on Computer Communications, pp. 127–135, 2009.
Liu, B., Dousse, O., Wang, J. and Saipulla, A., “Strong barrier coverage of wireless sensor networks,” in Proceedings ACM International Symposium on Mobile Ad Hoc Network Computers, pp. 411–420, 2008.
Wong, S. and MacDonald, B., “A topological coverage algorithm for mobile robots,” in Proceedings of the IEEE/RSJ International Conference on Intelligent Robots Systems, Vol. 2, pp. 1685–1690, 2003.
Howard, A. and Mataric, M., “Cover me! A self-deployment algorithm for mobile sensor networks,” in Proceedings of the International Conference on Robotics Automation, Washington, DC, USA, 2002, DOI: .Google Scholar
Cheng, W., Li, M., Liu, K., et al., “Sweep coverage with mobile sensors,” in Proceedings of the IEEE International Symposium on Parallel Distribution Processes, 2008, DOI: .
Ye, W., Heidemann, J. and Estrin, D., “An energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the IEEE International Conference on Computer Communications, Vol. 3, pp. 1567–1576, 2002.
Van Dam, T. and Langendoen, K., “An adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the ACM International Conference on Embedded Network Sensor Systems, pp. 171–180, 2003.
Tseng, Y., Hsu, C. and Hsieh, T., “Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks,” Computer Networks, Vol. 43, No. 3, pp. 317–337, 2003.CrossRefGoogle Scholar
Zheng, R., Hou, J. and Sha, L., “Asynchronous wakeup for ad hoc networks,” in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Network Computers, pp. 35–45, 2003.
Polastre, J., Hill, J. and Culler, D., “Versatile low power media access for wireless sensor networks,” in Proceedings of the International Conference on Embedded Network Sensor Systems, pp. 95–107, 2004.
Ye, W., Silva, F. and Heidemann, J., “Ultra-low duty cycle MAC with scheduled channel polling,” in Proceedings 4th International Conference on Embedded Network Sensor Systems, pp. 321–334, 2006.
Narayanaswamy, S., Kawadia, V., Sreenivas, R. and Kumar, P., “Power control in ad-hoc networks: theory, architecture, algorithm and implementation of the COMPOW protocol,” in Proceedings of the European Wireless Conference, 2002. [Online.] Available: .
Santi, P. and Blough, D., “The critical transmitting range for connectivity in sparse wireless ad hoc networks,” IEEE Transactions Mobile Computing, Vol. 2, No. 1, pp. 25–39, Jan.–Mar. 2003.CrossRefGoogle Scholar
Kirousis, L., Kranakis, E., Krizanc, D. and Pelc, A., Power Consumption in Packet Radio Networks STACS 97, vol. 1200. Berlin: Springer-Verlag, 1997, pp. 363–374.
Marina, M. and Das, S., “Routing performance in the presence of unidirectional links in multihop wireless networks,” in Proceedings of the ACM International Symposium on Mobile Ad Hoc Network Computing, pp. 12–23, 2002.
Blough, D., Leoncini, M., Resta, G. and Santi, P., “On the symmetric range assignment problem in wireless ad hoc networks,” in Proceedings IFIP 17th World Computer Congress/TC1 Stream/2nd IFIP International Conference Theor. Comput. Sci., Found. Inf. Technol. Era Netw. Mobile Comput., pp. 71–82, 2002.
Wieselthier, J. E., Nguyen, J. and Ephremides, A., “On the construction of energy-efficient broadcast and multicast trees in wireless networks,” in Proceedings of the IEEE International Conference on Computer Communications, Vol. 2, pp. 585–594, 2000.
Cardei, M., Wu, J. and Yang, S., “Topology control in ad hoc wireless networks with hitch-hiking,” in Proceedings of the IEEE Communications Society Conference on Sensory Ad Hoc Communication Networks, pp. 480–488, 2005.
Li, N., Hou, J. and Sha, L., “Design and analysis of an MST-based topology control algorithm,” IEEE Transactions on Wireless Communications, Vol. 4, No. 3, pp. 1195–1206, May 2005.Google Scholar
Rodoplu, V. and Meng, T., “Minimum energy mobile wireless networks,” IEEE Journal on Selected Areas in Communication, Vol. 17, No. 8, pp. 1333–1344, Aug. 1999.CrossRefGoogle Scholar
Lin, S., Zhang, J., Zhou, G. et al., “ATPC: adaptive transmission power control for wireless sensor networks,” in Proceedings of the ACM International Conference on Embedded Network Sensor Systems, 2006, DOI: .
Liu, J. and Li, B., “Mobilegrid: capacity-aware topology control in mobile ad hoc networks,” in Proceedings of the 11th International Conference Computer Communications Networks, pp. 570–574, 2002.

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×