SlideShare a Scribd company logo
Scalable Wireless Ad-Hoc Network
Simulation using XTC

(Synopsis)
Project Pre requisitions:The XTC ad-hoc network topology control
algorithm shows three main advantages over previously proposed
algorithms. First, it is extremely simple. Second, it does not assume
the network graph to be a Unit Disk Graph; XTC proves correct also on
general weighted network graphs. Third, the algorithm does not
require availability of node position information. Instead, XTC operates
with a general notion of order over the neighbors’ link qualities. In the
special case of the network graph being a Unit Disk Graph, the
resulting topology proves to have bounded degree, to be a planar
graph, and—on average-case graphs—to be a good spanner. Employed
on Euclidean and Unit Disk Graphs.
Topology Control:For two communicating ad-hoc nodes u and v, the energy
consumption of their communication grows at least quadratically with
their distance. Having one or more relay nodes between u and v
therefore helps to save energy.
The primary target of a topology control algorithm is to
abandon long-distance communication links and instead route a
message over several small (energy-efficient) hops .For this purpose
each node in the ad-hoc network chooses a ”handful” of ”close by”
neighbors” in all points of the compass. Clearly nodes cannot abandon
links to ”too many” far-away neighbors in order to prevent the ad-hoc
network from being partitioned or the routing paths from becoming
noncompetitively long. In general there is a trade-off between
networks connectivity and sparseness. Let the graph G = (V;E)
denote the ad-hoc network before running the topology control
algorithm, with V being the set of ad-hoc nodes, and E representing
the set of communication links. There is a link (u; v) in E if and only if
the two nodes u and v can communicate directly. Running the topology
control algorithm will yield a sparse sub graph
Gtc= (V; Etc) of G, where Etc is the set of remaining links. The
resulting topology Gtc should have the following properties:
Property 1 (Symmetry):The resulting topology Gtc should be symmetric,
that is, node u is a neighbor of node v if and only if node v is a
neighbor of node u. Asymmetric communication graphs are
unpractical, because many
communication primitives become
unacceptably complicated. A simple ACK message confirming the
receipt of a Message, for example, is already a nightmare in an
asymmetric graph.
Property 2 (Connectivity):Two nodes u and v are connected if there is a path
from u to v, potentially through multiple hops. If two nodes are
connected in G, then they should still be connected in Gtc. Although a
minimum spanning tree (MST) is a sparse connected subgraph, it is
often not considered a good topology, since close-by nodes in the
original graph G might end up being far away in Gtc (G being a ring,
for instance). Therefore Property 2 is usually strengthened:
Property 2+ (Spanner):For any two nodes u and v, if the optimal path
between u and v in G has cost c, then the optimal path between u and
v in Gtc has cost f(c). If f(c) is bounded from above by a linear
function in c, the graph Gtc is called a spanner. Researchers have
studied a selection of cost metrics, the most popular being i) Euclidean
distance and ii) various energy metrics. The cost of a link in model i) is
the Euclidean distance of the link, in model ii) the distance is raised to
a predefined power. In both models the cost of a path is commonly
defined to be the sum of the costs of all links in the path. As
mentioned, the primary target of a topology control algorithm is to
abandon long-distance neighbors, or more formally.
Property 3 (Sparseness):The remaining graph Gtc should be sparse, that is,
the number of links should be in the order of the number of nodes, i.e.
jEtcj = O(jV j). This reflects that not too many close-by nodes must be
chosen, which reduces interference and thus saves energy. Since there
still might be some nodes with many neighbors (e.g. a star graph),
also Property 3 features an improved version.
Property 3+ (Low Degree):Each node in the remaining graph Gtc has a small
number of neighbors. In particular the maximum degree in the graph
Gtc should be bounded from above by a constant. Since connectivity
and sparseness run against each other, topology control has been a
thriving research area. In addition to the properties 1, 2, and 3, one
can often find secondary targets. For instance, it is popular (and often
for free) to ask the remaining graph to be planar in order to run a
geometric (a.k.a. geographic, location-based, position-based) routing
algorithm, such as GOAFR/GOAFR+ [11, 13], or GFG/GPSR [2, 9].

Preliminaries:In a weighted graph G = (V; E) every edge (u; v) 2
E is attributed a weight! uv. When referring to a weighted graph we
assume that the weights are symmetric: !uv = !vu. The nodes of a
Euclidean graph are assumed to be located in a Euclidean plane.
Furthermore the edge weight of an edge (u; v) is defined to be !uv =
juvj, where juvj is the Euclidean distance between the nodes u and v.
Note that the definition of Euclidean graphs does not contain a
statement on the existence of certain edges. A Unit Disk Graph is a
Euclidean graph containing an edge (u; v) if and only if juvj _ 1. Unit
Disk Graphs are often employed to model an ad-hoc network where all
network nodes are placed in an unobstructed plane and have equal
(normalized) transmission power and isotropic antennas that is
antennas sending with identical power in every direction of the plane.
Strongly related to edge weights is the cost of an edge. The cost of an
edge c(u; v) can be considered to represent the effort an algorithm is
required to expend in order to send a message over (u; v). Common
definitions of edge cost metrics include the hop or link metric c(u; v) _
1, the Euclidean metric c(u; v) = juvj, and the energy metric c(u; v) =
juvje for an attenuation exponent e _ 2. A path p(u; v) from a node u
to a node v being a sequence of consecutively contingent edges
starting at u and ending at v, the cost of a path jp(u; v)j is accordingly
defined to be the sum of the costs of all edges contained in the path.
XTC Algorithm:The algorithm consists of three main steps:
I) Neighbor ordering,
II) Neighbor order exchange, and
III) Edge selection.
Detail Explanation:In the first step each network node u computes a
total order over all its neighbors in the network graph G. From an
abstract point of view, this order is intended to reflect the quality of
the links to the neighbors. A node u will consider its neighbors in G (in
the third step of the algorithm) according to _u ordered with respect to
decreasing link quality: The link to a neighbor appearing early in the
order _u is regarded as being of higher quality than the link to a
neighbor placed later in _u. A neighbor w appearing before v in order
_u is denoted as w _u v. The neighbor order reflects a much more
general notion of link quality, such as signal attenuation or packet
arrival rate. In the second step the neighbor order information is
exchanged among all neighbors.
Typically a node u broadcasts its own neighbor order
while receiving the orders established by all of its neighbors. During
the third step, which does not require any further Communication,
each node locally selects those neighboring nodes which will form its
neighborhood in the resulting topology control graph, based on the
previously exchanged neighbor order information. For this purpose a
node u traverses _u with decreasing link quality: “Good” neighbors are
considered first, “worse” ones later. Informally speaking, a node u only
builds a direct communication link to a neighbor v if u has no “better”
neighbor w that can be reached more easily from v than u itself.
Although the XTC algorithm is executed at all
nodes, the detailed description as shown in the above box assumes the
point of view of a node u. Lines 1 and 2 correspond to Steps I) and
II). Lines 3-11 define Step III) in more detail: First the two sets Nu
and _ Nu are initialized to be empty. Now the neighbor ordering _u
established in Line 1, is traversed in increasing order. In Line 7 the
neighbor order _u of the currently considered neighbor v is examined:
If any of u’s neighbors w already processed appears in v’s order before
u (w _v u) node v is included in _ Nu (Line 8); otherwise v is added to
Nu (Line 10). After completion of the algorithm, the set Nu contains
u’s neighbors in the topology control graph GXTC. More formally, the
edge set EXTC of the graph GXTC = (V;EXTC) is EXTC = f(u; v)j 9u: v
2 Nug. In the algorithm as described above, each node constructs in
Step I) a total order over all its neighbors in G. In a variant of the
algorithm a node u could apply a growing radius technique— starting
with the “best” neighbor— to decide on a neighbor v’s inclusion in Nu
or _ Nu—based on _v—immediately when identifying v as the next
“worse” neighbor found so far. Applying such interleaving of steps I),
II) and III), u could terminate earlier, that is, as soon as having found
“enough” neighbors. Property 1 is symmetry of the resulting graph,
often has to be enforced by topology control algorithms.
Project Modules:The various modules in the protocol are as follows
Module 1: Sending the data in the form of packet
Module 2: Using the XTC algorithm the ranking for each
node is calculated.
 Distance
 Energy
 Link Quality
Module 3: Nodes exchange rankings with neighbors.

Module 4: Each node locally goes through all neighbors in
order of their ranking
 If the candidate ranks any of your already
processed neighbors higher than yourself, then
you do not need to connect to the candidate.
System requirements:S/w requirements:Operating system
: Red Hat Linux, version 7.1 and above,
Windows
Kernel Version
: Linux Kernel 2.2
Programming Language: J2SD1.4.1
H/w requirements:RAM
Hard Disk Drive
Processor
Monitor

:
:
:
:

128 MB
10GB
Pentium iii and above
15”

More Related Content

What's hot

Dynamics
DynamicsDynamics
Dynamics
nguyendattdh
 
Efficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environmentEfficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environment
Md Mahbubur Rahman
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
graphhoc
 
A study on_contrast_and_comparison_between_bellman-ford_algorithm_and_dijkstr...
A study on_contrast_and_comparison_between_bellman-ford_algorithm_and_dijkstr...A study on_contrast_and_comparison_between_bellman-ford_algorithm_and_dijkstr...
A study on_contrast_and_comparison_between_bellman-ford_algorithm_and_dijkstr...
Khoa Mac Tu
 
LSQR-Based-Precoding
LSQR-Based-PrecodingLSQR-Based-Precoding
LSQR-Based-Precoding
Qian Han
 
32 -longest-common-prefix
32 -longest-common-prefix32 -longest-common-prefix
32 -longest-common-prefix
Sanjeev Gupta
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
ambitlick
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
Gopi Saiteja
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlation
ijdpsjournal
 
Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...
slinpublishers
 
Dynamic uplink downlink optimization
Dynamic uplink downlink optimizationDynamic uplink downlink optimization
Dynamic uplink downlink optimization
Johnakv
 
2012 cvpr gtw
2012 cvpr gtw2012 cvpr gtw
2012 cvpr gtw
Chau Phuong
 
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
IJCNCJournal
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
IJCNCJournal
 
Finite DIfference Methods Mathematica
Finite DIfference Methods MathematicaFinite DIfference Methods Mathematica
Finite DIfference Methods Mathematica
guest56708a
 
Parellelism in spectral methods
Parellelism in spectral methodsParellelism in spectral methods
Parellelism in spectral methods
Ramona Corman
 
Fundamentals of Finite Difference Methods
Fundamentals of Finite Difference MethodsFundamentals of Finite Difference Methods
Fundamentals of Finite Difference Methods
1rj
 

What's hot (17)

Dynamics
DynamicsDynamics
Dynamics
 
Efficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environmentEfficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environment
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 
A study on_contrast_and_comparison_between_bellman-ford_algorithm_and_dijkstr...
A study on_contrast_and_comparison_between_bellman-ford_algorithm_and_dijkstr...A study on_contrast_and_comparison_between_bellman-ford_algorithm_and_dijkstr...
A study on_contrast_and_comparison_between_bellman-ford_algorithm_and_dijkstr...
 
LSQR-Based-Precoding
LSQR-Based-PrecodingLSQR-Based-Precoding
LSQR-Based-Precoding
 
32 -longest-common-prefix
32 -longest-common-prefix32 -longest-common-prefix
32 -longest-common-prefix
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlation
 
Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...
 
Dynamic uplink downlink optimization
Dynamic uplink downlink optimizationDynamic uplink downlink optimization
Dynamic uplink downlink optimization
 
2012 cvpr gtw
2012 cvpr gtw2012 cvpr gtw
2012 cvpr gtw
 
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
Finite DIfference Methods Mathematica
Finite DIfference Methods MathematicaFinite DIfference Methods Mathematica
Finite DIfference Methods Mathematica
 
Parellelism in spectral methods
Parellelism in spectral methodsParellelism in spectral methods
Parellelism in spectral methods
 
Fundamentals of Finite Difference Methods
Fundamentals of Finite Difference MethodsFundamentals of Finite Difference Methods
Fundamentals of Finite Difference Methods
 

Similar to Xtc a practical topology control algorithm for ad hoc networks (synopsis)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
GiselleginaGloria
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
Fransiskeran
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
East West University
 
Shortest path analysis
Shortest path analysis Shortest path analysis
Shortest path analysis
A K M Anwaruzzaman
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
pijans
 
Localized Algorithm for Channel Assignment in Cognitive Radio Networks
Localized Algorithm for Channel Assignment in Cognitive Radio NetworksLocalized Algorithm for Channel Assignment in Cognitive Radio Networks
Localized Algorithm for Channel Assignment in Cognitive Radio Networks
IJERA Editor
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...
sophiabelthome
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
SiddhantVerma49
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degree
IJCNCJournal
 
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
csandit
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
SiddhantVerma49
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
Krishna Nanda
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
Kashyap Davariya
 
Ijebea14 272
Ijebea14 272Ijebea14 272
Ijebea14 272
Iasir Journals
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
IOSR Journals
 
C0431320
C0431320C0431320
C0431320
IOSR Journals
 
A Review on Channel Routing On VLSI Physical Design
A Review on Channel Routing On VLSI Physical DesignA Review on Channel Routing On VLSI Physical Design
A Review on Channel Routing On VLSI Physical Design
IOSR Journals
 
Energy Efficient Geographical Forwarding Algorithm For Wireless Ad Hoc And Se...
Energy Efficient Geographical Forwarding Algorithm For Wireless Ad Hoc And Se...Energy Efficient Geographical Forwarding Algorithm For Wireless Ad Hoc And Se...
Energy Efficient Geographical Forwarding Algorithm For Wireless Ad Hoc And Se...
zhendong
 

Similar to Xtc a practical topology control algorithm for ad hoc networks (synopsis) (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Shortest path analysis
Shortest path analysis Shortest path analysis
Shortest path analysis
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
 
Localized Algorithm for Channel Assignment in Cognitive Radio Networks
Localized Algorithm for Channel Assignment in Cognitive Radio NetworksLocalized Algorithm for Channel Assignment in Cognitive Radio Networks
Localized Algorithm for Channel Assignment in Cognitive Radio Networks
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degree
 
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
 
Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
 
Ijebea14 272
Ijebea14 272Ijebea14 272
Ijebea14 272
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
A Review on Channel Routing On VLSI Physical Design
A Review on Channel Routing On VLSI Physical DesignA Review on Channel Routing On VLSI Physical Design
A Review on Channel Routing On VLSI Physical Design
 
Energy Efficient Geographical Forwarding Algorithm For Wireless Ad Hoc And Se...
Energy Efficient Geographical Forwarding Algorithm For Wireless Ad Hoc And Se...Energy Efficient Geographical Forwarding Algorithm For Wireless Ad Hoc And Se...
Energy Efficient Geographical Forwarding Algorithm For Wireless Ad Hoc And Se...
 

More from Mumbai Academisc

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
Mumbai Academisc
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
Mumbai Academisc
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
Mumbai Academisc
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
Mumbai Academisc
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
Mumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
Mumbai Academisc
 
Spring ppt
Spring pptSpring ppt
Spring ppt
Mumbai Academisc
 
Ejb notes
Ejb notesEjb notes
Ejb notes
Mumbai Academisc
 
Java web programming
Java web programmingJava web programming
Java web programming
Mumbai Academisc
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
Mumbai Academisc
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
Mumbai Academisc
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
Mumbai Academisc
 
Web based development
Web based developmentWeb based development
Web based development
Mumbai Academisc
 
Jdbc
JdbcJdbc
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
Mumbai Academisc
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
Mumbai Academisc
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
Mumbai Academisc
 
Engineering
EngineeringEngineering
Engineering
Mumbai Academisc
 

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Xtc a practical topology control algorithm for ad hoc networks (synopsis)

  • 1. Scalable Wireless Ad-Hoc Network Simulation using XTC (Synopsis)
  • 2. Project Pre requisitions:The XTC ad-hoc network topology control algorithm shows three main advantages over previously proposed algorithms. First, it is extremely simple. Second, it does not assume the network graph to be a Unit Disk Graph; XTC proves correct also on general weighted network graphs. Third, the algorithm does not require availability of node position information. Instead, XTC operates with a general notion of order over the neighbors’ link qualities. In the special case of the network graph being a Unit Disk Graph, the resulting topology proves to have bounded degree, to be a planar graph, and—on average-case graphs—to be a good spanner. Employed on Euclidean and Unit Disk Graphs. Topology Control:For two communicating ad-hoc nodes u and v, the energy consumption of their communication grows at least quadratically with their distance. Having one or more relay nodes between u and v therefore helps to save energy. The primary target of a topology control algorithm is to abandon long-distance communication links and instead route a message over several small (energy-efficient) hops .For this purpose each node in the ad-hoc network chooses a ”handful” of ”close by” neighbors” in all points of the compass. Clearly nodes cannot abandon links to ”too many” far-away neighbors in order to prevent the ad-hoc network from being partitioned or the routing paths from becoming noncompetitively long. In general there is a trade-off between networks connectivity and sparseness. Let the graph G = (V;E) denote the ad-hoc network before running the topology control algorithm, with V being the set of ad-hoc nodes, and E representing the set of communication links. There is a link (u; v) in E if and only if the two nodes u and v can communicate directly. Running the topology control algorithm will yield a sparse sub graph Gtc= (V; Etc) of G, where Etc is the set of remaining links. The resulting topology Gtc should have the following properties: Property 1 (Symmetry):The resulting topology Gtc should be symmetric, that is, node u is a neighbor of node v if and only if node v is a neighbor of node u. Asymmetric communication graphs are
  • 3. unpractical, because many communication primitives become unacceptably complicated. A simple ACK message confirming the receipt of a Message, for example, is already a nightmare in an asymmetric graph. Property 2 (Connectivity):Two nodes u and v are connected if there is a path from u to v, potentially through multiple hops. If two nodes are connected in G, then they should still be connected in Gtc. Although a minimum spanning tree (MST) is a sparse connected subgraph, it is often not considered a good topology, since close-by nodes in the original graph G might end up being far away in Gtc (G being a ring, for instance). Therefore Property 2 is usually strengthened: Property 2+ (Spanner):For any two nodes u and v, if the optimal path between u and v in G has cost c, then the optimal path between u and v in Gtc has cost f(c). If f(c) is bounded from above by a linear function in c, the graph Gtc is called a spanner. Researchers have studied a selection of cost metrics, the most popular being i) Euclidean distance and ii) various energy metrics. The cost of a link in model i) is the Euclidean distance of the link, in model ii) the distance is raised to a predefined power. In both models the cost of a path is commonly defined to be the sum of the costs of all links in the path. As mentioned, the primary target of a topology control algorithm is to abandon long-distance neighbors, or more formally. Property 3 (Sparseness):The remaining graph Gtc should be sparse, that is, the number of links should be in the order of the number of nodes, i.e. jEtcj = O(jV j). This reflects that not too many close-by nodes must be chosen, which reduces interference and thus saves energy. Since there still might be some nodes with many neighbors (e.g. a star graph), also Property 3 features an improved version. Property 3+ (Low Degree):Each node in the remaining graph Gtc has a small number of neighbors. In particular the maximum degree in the graph
  • 4. Gtc should be bounded from above by a constant. Since connectivity and sparseness run against each other, topology control has been a thriving research area. In addition to the properties 1, 2, and 3, one can often find secondary targets. For instance, it is popular (and often for free) to ask the remaining graph to be planar in order to run a geometric (a.k.a. geographic, location-based, position-based) routing algorithm, such as GOAFR/GOAFR+ [11, 13], or GFG/GPSR [2, 9]. Preliminaries:In a weighted graph G = (V; E) every edge (u; v) 2 E is attributed a weight! uv. When referring to a weighted graph we assume that the weights are symmetric: !uv = !vu. The nodes of a Euclidean graph are assumed to be located in a Euclidean plane. Furthermore the edge weight of an edge (u; v) is defined to be !uv = juvj, where juvj is the Euclidean distance between the nodes u and v. Note that the definition of Euclidean graphs does not contain a statement on the existence of certain edges. A Unit Disk Graph is a Euclidean graph containing an edge (u; v) if and only if juvj _ 1. Unit Disk Graphs are often employed to model an ad-hoc network where all network nodes are placed in an unobstructed plane and have equal (normalized) transmission power and isotropic antennas that is antennas sending with identical power in every direction of the plane. Strongly related to edge weights is the cost of an edge. The cost of an edge c(u; v) can be considered to represent the effort an algorithm is required to expend in order to send a message over (u; v). Common definitions of edge cost metrics include the hop or link metric c(u; v) _ 1, the Euclidean metric c(u; v) = juvj, and the energy metric c(u; v) = juvje for an attenuation exponent e _ 2. A path p(u; v) from a node u to a node v being a sequence of consecutively contingent edges starting at u and ending at v, the cost of a path jp(u; v)j is accordingly defined to be the sum of the costs of all edges contained in the path. XTC Algorithm:The algorithm consists of three main steps: I) Neighbor ordering, II) Neighbor order exchange, and III) Edge selection.
  • 5. Detail Explanation:In the first step each network node u computes a total order over all its neighbors in the network graph G. From an abstract point of view, this order is intended to reflect the quality of the links to the neighbors. A node u will consider its neighbors in G (in the third step of the algorithm) according to _u ordered with respect to decreasing link quality: The link to a neighbor appearing early in the order _u is regarded as being of higher quality than the link to a neighbor placed later in _u. A neighbor w appearing before v in order _u is denoted as w _u v. The neighbor order reflects a much more general notion of link quality, such as signal attenuation or packet arrival rate. In the second step the neighbor order information is exchanged among all neighbors. Typically a node u broadcasts its own neighbor order while receiving the orders established by all of its neighbors. During the third step, which does not require any further Communication, each node locally selects those neighboring nodes which will form its neighborhood in the resulting topology control graph, based on the previously exchanged neighbor order information. For this purpose a node u traverses _u with decreasing link quality: “Good” neighbors are considered first, “worse” ones later. Informally speaking, a node u only
  • 6. builds a direct communication link to a neighbor v if u has no “better” neighbor w that can be reached more easily from v than u itself. Although the XTC algorithm is executed at all nodes, the detailed description as shown in the above box assumes the point of view of a node u. Lines 1 and 2 correspond to Steps I) and II). Lines 3-11 define Step III) in more detail: First the two sets Nu and _ Nu are initialized to be empty. Now the neighbor ordering _u established in Line 1, is traversed in increasing order. In Line 7 the neighbor order _u of the currently considered neighbor v is examined: If any of u’s neighbors w already processed appears in v’s order before u (w _v u) node v is included in _ Nu (Line 8); otherwise v is added to Nu (Line 10). After completion of the algorithm, the set Nu contains u’s neighbors in the topology control graph GXTC. More formally, the edge set EXTC of the graph GXTC = (V;EXTC) is EXTC = f(u; v)j 9u: v 2 Nug. In the algorithm as described above, each node constructs in Step I) a total order over all its neighbors in G. In a variant of the algorithm a node u could apply a growing radius technique— starting with the “best” neighbor— to decide on a neighbor v’s inclusion in Nu or _ Nu—based on _v—immediately when identifying v as the next “worse” neighbor found so far. Applying such interleaving of steps I), II) and III), u could terminate earlier, that is, as soon as having found “enough” neighbors. Property 1 is symmetry of the resulting graph, often has to be enforced by topology control algorithms. Project Modules:The various modules in the protocol are as follows Module 1: Sending the data in the form of packet Module 2: Using the XTC algorithm the ranking for each node is calculated.  Distance  Energy  Link Quality
  • 7. Module 3: Nodes exchange rankings with neighbors. Module 4: Each node locally goes through all neighbors in order of their ranking  If the candidate ranks any of your already processed neighbors higher than yourself, then you do not need to connect to the candidate.
  • 8. System requirements:S/w requirements:Operating system : Red Hat Linux, version 7.1 and above, Windows Kernel Version : Linux Kernel 2.2 Programming Language: J2SD1.4.1 H/w requirements:RAM Hard Disk Drive Processor Monitor : : : : 128 MB 10GB Pentium iii and above 15”