Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
CS 336 March 19, 2012 Tandy Warnow.
Lower Bound for Sparse Euclidean Spanners Presented by- Deepak Kumar Gupta(Y6154), Nandan Kumar Dubey(Y6279), Vishal Agrawal(Y6541)
WSPD Applications.
 Distance Problems: › Post Office Problem › Nearest Neighbors and Closest Pair › Largest Empty and Smallest Enclosing Circle  Sub graphs of Delaunay.
Combinatorial Algorithms
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Approximation Algorithms: Combinatorial Approaches Lecture 13: March 2.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
A Distributed Algorithm for Minimum-Weight Spanning Trees by R. G. Gallager, P.A. Humblet, and P. M. Spira ACM, Transactions on Programming Language and.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Chapter 4: Straight Line Drawing Ronald Kieft. Contents Introduction Algorithm 1: Shift Method Algorithm 2: Realizer Method Other parts of chapter 4 Questions?
Steiner trees Algorithms and Networks. Steiner Trees2 Today Steiner trees: what and why? NP-completeness Approximation algorithms Preprocessing.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Introduction Outline The Problem Domain Network Design Spanning Trees Steiner Trees Triangulation Technique Spanners Spanners Application Simple Greedy.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Presenter: 施佩汝 劉冠廷 何元臣 陳裕美 洪家榮 Approximation Algorithms for Quickest Spanning Tree Problems.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
TECH Computer Science Graph Optimization Problems and Greedy Algorithms Greedy Algorithms  // Make the best choice now! Optimization Problems  Minimizing.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
COSC 2007 Data Structures II Chapter 14 Graphs III.
Approximating the Minimum Degree Spanning Tree to within One from the Optimal Degree R 陳建霖 R 宋彥朋 B 楊鈞羽 R 郭慶徵 R
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Wireless Communication using Directional Antennas.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
© Yamacraw, 2002 Symmetric Minimum Power Connectivity in Radio Networks A. Zelikovsky (GSU) Joint work with Joint work with.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
Maximal Independent Set and Connected Dominating Set Xiaofeng Gao Research Group on Mobile Computing and Wireless Networking Univ. of Texas at Dallas.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Spanning Tree Definition:A tree T is a spanning tree of a graph G if T is a subgraph of G that contains all of the vertices of G. A graph may have more.
The geometric GMST problem with grid clustering Presented by 楊劭文, 游岳齊, 吳郁君, 林信仲, 萬高維 Department of Computer Science and Information Engineering, National.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
On the Critical Total Power for k-Connectivity in Wireless Networks
Enumerating Distances Using Spanners of Bounded Degree
Research: algorithmic solutions for networking
Robustness of wireless ad hoc network topologies
Robustness of wireless ad hoc network topologies
Introduction Wireless Ad-Hoc Network
Clustering.
Winter 2019 Lecture 11 Minimum Spanning Trees (Part II)
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
The Minimum-Area Spanning Tree Problem
Autumn 2019 Lecture 11 Minimum Spanning Trees (Part II)
Presentation transcript:

Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio

Introduction Wireless Ad-Hoc Network  Each transceiver has a transmission power  which results in a transmission range

Introduction Wireless Ad-Hoc Network  Transceiver receives transmission from only if

Introduction Wireless Ad-Hoc Network  As a result a directed communication graph is  induced

Model & Problems Definition  A set of transceivers

Model & Problems Definition  A set of transceivers  is the power assignment

Model & Problems Definition  A set of transceivers  is the power assignment

Model & Problems Definitions  A set of transceivers  is the communication graph  is the power assignment

Model & Problems Definitions  A set of transceivers  is the communication graph  is the power assignment  is the cost of the assignment

Outline Connectivity problems Bounded hop broadcast Spanners Interference-free broadcast

 paths connecting to  A graph is k-vertex-connected if for  any two nodes there exist k-vertex-disjoint Connectivity Definitions 2-vertex-connected

 there exists so that  strongly connected and for each  For graph, a subset is a  connected backbone if restricted to is Connectivity Definitions Connected backbone

Connectivity Problem 1 (k-vertex-connectivity) Input:A set of transceivers, and a parameter Output:A power assignment with minimal possible cost, where is k-vertex connected

Connectivity Problem 1 (k-vertex-connectivity) Input:A set of transceivers, and a parameter Output:A power assignment with minimal possible cost, where is k-vertex connected -approximation algorithm

Connectivity Problem 2 (connected backbone) Input:A set of transceivers Output:A subset of and a power assignment with minimal possible cost, where (restricted to ) is strongly connected, and for each, there exists, such that

Connectivity Problem 2 (connected backbone) Input:A set of transceivers Output:A subset of and a power assignment with minimal possible cost, where (restricted to ) is strongly connected, and for each, there exists, such that Constant-factor approximation algorithm in time

 nodes to Fault-Tolerant Power Assignment Definitions  For each, let be a set of closest

 nodes to Fault-Tolerant Power Assignment Definitions  For each, let be a set of closest

 nodes to Fault-Tolerant Power Assignment Definitions  For each, let be a set of closest  Let

 Compute an of  Assign each the range (denote ) Fault-Tolerant Power Assignment The algorithm

 Compute an of  Assign each the range (denote ) Fault-Tolerant Power Assignment The algorithm

 For each edge of increase the range  of the nodes in such that each node Fault-Tolerant Power Assignment The algorithm  can reach all nodes in, and vice versa (denote )

 For each edge of increase the range  of the nodes in such that each node Fault-Tolerant Power Assignment The algorithm  can reach all nodes in, and vice versa (denote )

 Let  In each is assigned at most Fault-Tolerant Power Assignment Proof sketch  Case 1:

 Let  In each is assigned at most Fault-Tolerant Power Assignment Proof sketch  Case 1:

 Let  In each is assigned at most Fault-Tolerant Power Assignment Proof sketch  Case 2:

 Let  In each is assigned at most Fault-Tolerant Power Assignment Proof sketch  Case 2:

 Let  In each is assigned at most Fault-Tolerant Power Assignment Proof sketch  Easy to see

 Let  In each is assigned at most Fault-Tolerant Power Assignment Proof sketch  Easy to see  Kirousis et al. proved

 Let  In each is assigned at most Fault-Tolerant Power Assignment Proof sketch  Easy to see  Kirousis et al. proved  As a result and since degree of MST is constant

 Given the of, for any node, let Connected Backbone Power Assignment Definitions  be the size of the longest edge adjacent to

 Given the of, for any node, let Connected Backbone Power Assignment Definitions  be the size of the longest edge adjacent to

 Compute an of Connected Backbone Power Assignment The algorithm

 Compute an of Connected Backbone Power Assignment The algorithm

 Compute an of Connected Backbone Power Assignment The algorithm  Let be the set of all internal nodes of

 Compute an of Connected Backbone Power Assignment The algorithm  Let be the set of all internal nodes of  Assign each with (denote )

 Compute an of Connected Backbone Power Assignment The algorithm  Let be the set of all internal nodes of  Assign each with (denote )

 Compute an of Connected Backbone Power Assignment The algorithm  Let be the set of all internal nodes of  Assign each with (denote )

 Construct a power assignment for which Connected Backbone Power Assignment Proof sketch  it holds and,  as a result obtaining  is derived from

 For each node let be the transmission  Let be the connected backbone in Connected Backbone Power Assignment Proof sketch  range of in

 For each node let be all the nodes  within distance from Connected Backbone Power Assignment Proof sketch

 For each node let be all the nodes  within distance from Connected Backbone Power Assignment Proof sketch

 For each node compute of Connected Backbone Power Assignment Proof sketch  For each node let be all the nodes  within distance from

 For each node compute of Connected Backbone Power Assignment Proof sketch  For each node let be all the nodes  within distance from

Connected Backbone Power Assignment Proof sketch  In : Each node is assigned

Connected Backbone Power Assignment Proof sketch  In : Each node is assigned

Connected Backbone Power Assignment Proof sketch  In : Each node is assigned

Connected Backbone Power Assignment Proof sketch  Carmi et al. showed that

Connected Backbone Power Assignment Proof sketch  Carmi et al. showed that

Connected Backbone Power Assignment Proof sketch  Carmi et al. showed that

Connected Backbone Power Assignment Proof sketch  Carmi et al. showed that + + +

Connected Backbone Power Assignment Proof sketch  Carmi et al. showed that Using this and is at least longest edge in we obtain

Connected Backbone Power Assignment Proof sketch  Kirousis et al. proved that given an assigning each node with yields a 2-factor approximation for strong-connectivity (denote )

Connected Backbone Power Assignment Proof sketch  Kirousis et al. proved that given an assigning each node with yields a 2-factor approximation for strong-connectivity Using this fact we obtain (denote )

Connected Backbone Power Assignment Proof sketch  Therefore,

 at if there is a path from to any Broadcast  A graph is a broadcast graph rooted

 at if there is a path from to any Broadcast  A graph is a broadcast graph rooted

 graph rooted at if there is a path from to any Broadcast  A graph is a h-bounded-hop broadcast  and the number of hops is limited by 4-bounded-hop broadcast

 it remains h-bounded-hop broadcast graph Broadcast  A graph is a k-h-broadcast graph if 2-4-bounded-hop broadcast  even with the removal of up to nodes

Broadcast 2-vertex disjoint paths under 4 hops  it remains h-bounded-hop broadcast graph  A graph is a k-h-broadcast graph if  even with the removal of up to nodes

Broadcast 2-vertex disjoint paths under 4 hops  it remains h-bounded-hop broadcast graph  A graph is a k-h-broadcast graph if  even with the removal of up to nodes

root node and parameters Problem 3 (k-h-bounded broadcast) Input:A set of transceivers in, Output:A power assignment so that is k-h-broadcast and is minimized

 is 1-h-bounded hop graph The Algorithm Planar Case  Take a power assignment so that

 is 1-h-bounded hop graph The Algorithm Planar Case  Take a power assignment so that  Let be a directed spanning tree of Max distance – h hops

 is 1-h-bounded hop graph The Algorithm Planar Case  Take a power assignment so that  Let be a directed spanning tree of Max distance – h hops

The Algorithm Planar Case  Add edges from to its grandchildren

 Remove edges from the children of The Algorithm Planar Case  Add edges from to its grandchildren

 Remove edges from the children of The Algorithm Planar Case  Add edges from to its grandchildren Max distance – h-1 hops  Denote the resulting tree

The Algorithm Planar Case  No power is assigned yet!  We have a skeleton with a bounded cost

The Algorithm Planar Case  Assign

The Algorithm Planar Case  Assign

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  For each directed edge in  increase the range of all nodes in to  reach all nodes in

The Algorithm Planar Case  Denote the resulting power assignment

The Algorithm Planar Case  Denote the resulting power assignment  Along each path in there are  vertex-disjoint paths in of at most hops

Analysis  increase of is bounded by:  For a single edge in the power

Analysis  increase of is bounded by:  For a single edge in the power

Analysis  increase of is bounded by:  For a single edge in the power Power assignment in

Analysis Planar Case  increase of is bounded by:  For a single edge in the power  Node can be in many -s

Analysis Planar Case  increase of is bounded by:  For a single edge in the power  Node can be in many -s, with many edges

Analysis Planar Case  increase of is bounded by:  For a single edge in the power  Node can be in many -s, with many edges  But eventually only one ‘dominates’ the bound

Analysis Planar Case  A node can be dominated only by the  outgoing edges of in

 nodes (those in )  A single edge can dominate at most Analysis Planar Case  A node can be dominated only by the  outgoing edges of in

 nodes (those in )  A single edge can dominate at most Analysis  A node can be dominated only by the  outgoing edges of in  Recall,

 nodes (those in )  A single edge can dominate at most Analysis  A node can be dominated only by the  outgoing edges of in  As a result,

Analysis

Due to

Analysis PTAS due to Funke and Laue [24]

Analysis  for the k-h-broadcast problem  Let be the optimal power assignment  From,

Analysis  for the k-h-broadcast problem  Let be the optimal power assignment We need to bound  From,

Analysis  node has at least neighbors  Let be a power assignment so that each  Clearly,

Analysis -  Hamiltonian cycle based power  assignment for the k-(n-1)-broadcast  problem, so that

 Hamiltonian cycle based power  assignment for the k-(n-1)-broadcast  problem, so that  In each node has at least neighbors Analysis -

 Hamiltonian cycle based power  assignment for the k-(n-1)-broadcast  problem, so that  In each node has at least neighbors  From, Analysis – ( can be shown)

The Algorithm k-(n-1)-broadcast

The Algorithm  Compute an MST of k-(n-1)-broadcast

The Algorithm  Construct a Hamiltonian cycle with cost  Compute an MST of k-(n-1)-broadcast

The Algorithm  Construct a Hamiltonian cycle with cost  Compute an MST of  Assign each node to reach nodes  in both directions of the cycle  Example: k=4 k-(n-1)-broadcast

The Algorithm  Construct a Hamiltonian cycle with cost  Compute an MST of  Assign each node to reach nodes  in both directions of the cycle   As a result, k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan) k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan) k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan) k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan) k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan) k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan) k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan) 2-strongly connected undirected graph k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan)  Apply TSP-Approx (Bender and Checkuri) Square of every biconnected graph is Hamiltonian (Fleischner) k-(n-1)-broadcast

Hamiltonian Cycle Stage  Compute an MST of  Apply MST-Augmentation (Calinescu and Wan)  Apply TSP-Approx (Bender and Checkuri) The cost of the Hamiltonian cycle  As a result, k-(n-1)-broadcast

 A simple approximation due to: Analysis -  For any it holds: Back to k-h-broadcast

Analysis -  Take as before Back to k-h-broadcast

Analysis -  The most distant node at most hops away  Take as before Back to k-h-broadcast

Analysis -  The most distant node at most hops away  Take as before  Assign the root to reach all! Back to k-h-broadcast

Spanners What is a spanner?  A spanning subgraph that approximates  some measure of the original graph

Spanners What is a spanner?  A spanning subgraph that approximates  some measure of the original graph E.g., Euclidean distance

Spanners What is a spanner?  A spanning subgraph that approximates  some measure of the original graph E.g., Euclidean distance

Spanners What is a spanner?  A spanning subgraph that approximates  some measure of the original graph E.g., Euclidean distance times longer than in Shortest path is at most

Spanners What is a spanner?  A spanning subgraph that approximates  some measure of the original graph E.g., Euclidean distance times longer than in Shortest path is at most stretch factor

Spanners  We propose two spanner optimization measures  Distance – reducing transmission latency  Energy – increasing network lifetime

Spanner optimization measures The original graph  Let be the wireless nodes in the plane  Let be a weighted complete  graph  Weight function: The Euclidean distance

Spanner optimization measures The original graph  Let be the wireless nodes in the plane  Let be a weighted complete  graph  Weight function: Proportional to the energy required to transmit from to The Euclidean distance

Spanner optimization measures The original graph  Let be the wireless nodes in the plane  Let be a weighted complete  graph  Weight function:

Spanner optimization measures The spanner  Let p be a power assignment

Spanner optimization measures The spanner  Let p be a power assignment  is an induced directed graph,  where

Spanner optimization measures The spanner  Let p be a power assignment  is an induced directed graph,  where  The cost:

Spanner optimization measures Energy measure (stretch factor)  The energy of some path is its weight

Spanner optimization measures Energy measure (stretch factor)  The energy of some path is its weight  The minimum energy from to in 

Spanner optimization measures Energy measure (stretch factor)  The energy of some path is its weight  The minimum energy from to in 

Spanner optimization measures Energy measure (stretch factor)  The energy stretch factor of

Spanner optimization measures Energy measure (stretch factor)  The energy stretch factor of   We aim to minimize both and

Spanner optimization measures Energy measure (stretch factor)  The energy stretch factor of   Clear benefits  Prolonged network lifetime  Low cost  Low interference…  We aim to minimize both and

Spanner optimization measures Distance measure (stretch factor)  The distance of some path

 The minimum distance from to in Spanner optimization measures Distance measure (stretch factor)  The distance of some path 

Spanner optimization measures Distance measure (stretch factor)  The distance stretch factor of 

Spanner optimization measures Distance measure (stretch factor)  The distance stretch factor of   We aim to minimize both and

Spanner optimization measures Distance measure (stretch factor)  The distance stretch factor of   Clear benefits  Low delay in message delivery  Low cost  We aim to minimize both and

Main results Preliminaries  We consider a random, independent, and  uniform node distribution in a unit square The probability of our results converges to 1 as the number of nodes, n, increases

Main results Preliminaries  Spanners make sense only if the induced  graph is strongly connected  uniform node distribution in a unit square  We consider a random, independent, and

Main results Preliminaries  Spanners make sense only if the induced  graph is strongly connected  uniform node distribution in a unit square Otherwise, the stretch factor is infinity Path does not exist  We consider a random, independent, and

Main results Preliminaries  Spanners make sense only if the induced  graph is strongly connected  uniform node distribution in a unit square Þ The cost of any spanner is at least Þ the minimum cost of strong connectivity  We consider a random, independent, and

Main results Preliminaries  Spanners make sense only if the induced  graph is strongly connected  uniform node distribution in a unit square Þ The cost of any spanner is at least Þ the minimum cost of strong connectivity Þ (denote this cost )  We consider a random, independent, and

Main results Energy spanner  Develop power assignment so that  where,,

Main results Distance spanner  Develop a power assignment so that = O(1)

Technical details Some bounds…  Using [Zhang and Hou ‘05] Lower bound on the cost of any spanner

Technical details Some bounds…  Using [Zhang and Hou ‘05]  From [Kirousis et al. ‘00]  Minimum spanning tree of G The weight of the tree

Technical details Some bounds…  Using [Zhang and Hou ‘05]  From [Kirousis et al. ‘00]   Using [Berend et al. ‘08] & [Penrose ‘97] Maximum length edge of MST

Technical details Energy spanner [power assignment]

Technical details Energy spanner [power assignment]  Find the minimum spanning tree (MST)

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U Take diameter

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U Take diameter Add the -th node to U

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U Take diameter Add the -th node to U Remove first nodes from the diameter

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U Take diameter Add the -th node to U Remove first nodes from the diameter

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U Take diameter Add the -th node to U Remove first nodes from the diameter

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U Take diameter Add the -th node to U Remove first nodes from the diameter

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U Take diameter Add the -th node to U Remove first nodes from the diameter

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U

Technical details Energy spanner [power assignment]  Lemma: We can find nodes  so that any node is within  Find the minimum spanning tree (MST)  hops from some node in U  Let be a LAST rooted at  LAST [Khuller et al. ’93] is a spanning tree T of G, rooted at some so that and

Technical details Energy spanner [power assignment]  Define the power assignment p so that

Technical details Energy spanner [power assignment]  Define the power assignment p so that  Let

Technical details Energy spanner [power assignment]  Define the power assignment p so that  Let   Finally, For technical reasons

Technical details Energy spanner [cost analysis]

Technical details Energy spanner [stretch analysis]  If, there is a path P in G, so that  and

Technical details Energy spanner [stretch analysis]  If, there is a path P in G, so that  and  Therefore, since for every u,  path P also exists in

Technical details Energy spanner [stretch analysis]  Otherwise,

Technical details Energy spanner [stretch analysis]  For any two nodes, s and t, the path in  first arrives at some LAST origin  by using the MST edges (denote P’)

Technical details Energy spanner [stretch analysis]  For any two nodes, s and t, the path in  first arrives at some LAST origin  by using the MST edges (denote P’)

Technical details Energy spanner [stretch analysis]  For any two nodes, s and t, the path in  first arrives at some LAST origin  by using the MST edges (denote P’)  second travels through the edges of  from to t (denote P’’)

Technical details Energy spanner [stretch analysis]  For any two nodes, s and t, the path in  first arrives at some LAST origin  by using the MST edges (denote P’)  second travels through the edges of  from to t (denote P’’)

Technical details Energy spanner [stretch analysis]  Otherwise,  We bound the weight of P’ and P’’  Maximum edge of MST Lemma

Technical details Energy spanner [stretch analysis]  Otherwise,  We bound the weight of P’ and P’’ A possible path goes through s

Technical details Energy spanner [stretch analysis]  Otherwise,  We bound the weight of P’ and P’’  Eventually,

Technical details Distance spanner [power assignment]  The general idea is that for uniformly  distributed nodes, we can always find  “good” relays between any pair of nodes

Technical details Distance spanner [power assignment]  To find these relays, for any pair of nodes,  s and t, we start a recursive process

Technical details Distance spanner [power assignment]  To find these relays, for any pair of nodes,  s and t, we start a recursive process  At step i, we place adjacent disks along  the edge The diameter of a disk at step i is

Technical details Distance spanner [power assignment]  To find these relays, for any pair of nodes,  s and t, we start a recursive process  At step i, we place adjacent disks along  the edge The diameter of a disk at step i is

Technical details Distance spanner [power assignment]  To find these relays, for any pair of nodes,  s and t, we start a recursive process  At step i, we place adjacent disks along  the edge The diameter of a disk at step i is

Technical details Distance spanner [power assignment]  To find these relays, for any pair of nodes,  s and t, we start a recursive process  At step i, we place adjacent disks along  the edge The diameter of a disk at step i is The process ends when one of the disks has no relay nodes

Technical details Distance spanner [power assignment]  To find these relays, for any pair of nodes,  s and t, we start a recursive process  At step i, we place adjacent disks along  the edge  Finally, we use relay nodes to obtain a path We use an arbitrary node in each disk at the last non-empty step

 The power assignment p is obtained by  ensuring that all paths are in Technical details Distance spanner [power assignment]

 The power assignment p is obtained by  ensuring that all paths are in Technical details Distance spanner [power assignment]  Let be the constructed path from s to t

 The power assignment p is obtained by  ensuring that all paths are in Technical details Distance spanner [power assignment]  Let be the constructed path from s to t  And be all  the edges from u in all the paths

 The power assignment p is obtained by  ensuring that all paths are in Technical details Distance spanner [power assignment]  Let be the constructed path from s to t  And be all  the edges from u in all the paths  Finally,

Technical details Distance spanner [analysis]  Lemma: Let D be the maximum radius  disk which can be placed inside the unit  square, so there are no nodes in D Let r be the radius of D

Technical details Distance spanner [analysis]  Lemma: Let D be the maximum radius  disk which can be placed inside the unit  square, so there are no nodes in D Let r be the radius of D  Then,

Technical details Distance spanner [analysis]  From Lemma,

Technical details Distance spanner [analysis]  From Lemma,  Clearly,

Extended wireless network model Power assignment  The lifetime of node v is  Each node has an initial battery charge b(v)  Nodes have no fixed power supply  The network lifetime is

Wireless network model Power assignment  a power assignment p  Interference is a direct consequence of ?

Wireless network model Power assignment  Several interference models exist  a power assignment p  Number of nodes affected by transmission  Number of edges affected by transmission  Interference is a direct consequence of

Wireless network model Power assignment  Several interference models exist  a power assignment p  Number of nodes affected by transmission  Number of edges affected by transmission  We combine several common models by  defining the interference to be  Interference is a direct consequence of

Main results Contribution  We develop two power assignments: and

Main results Contribution  We develop two power assignments: and  can be computed in time and  where n is the number of nodes

Main results Contribution  We develop two power assignments: and  can be computed in time  where n is the number of nodes and

Technical details The construction  The first power assignment is local

Technical details The construction  The first power assignment is local  To compute simply assign  to all u  We use a Lemma from [Shpungin and Segal ’09]  to prove the correctness of this power assignment

Technical details The construction  The first power assignment is local  To compute simply assign  to all u  We use a Lemma from [Shpungin and Segal ’09]  to prove the correctness of this power assignment  (due to uniform distribution a path always exists)

Technical details The construction  The second power assignment is computed  by dividing the unit square into k grid cells

Technical details The construction  The second power assignment is computed  Then we compute a k shortest path trees rooted  at an arbitrary node in each cell  by dividing the unit square into k grid cells

Technical details The construction  The second power assignment is computed  Then we compute a k shortest path trees rooted  at an arbitrary node in each cell  The power assignment of nodes is increased to  assure all these k trees are included  by dividing the unit square into k grid cells

Technical details The construction  The second power assignment is computed  Then we compute a k shortest path trees rooted  at an arbitrary node in each cell  The power assignment of nodes is increased to  assure all these k trees are included  by dividing the unit square into k grid cells  The power assignment of nodes is increased again  to be at least