Andrea Richa1 Interference Models: Beyond the Unit-disk and Packet-Radio Models Andrea W. Richa Arizona State University.

Slides:



Advertisements
Similar presentations
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Constant Density Spanners for Wireless Ad hoc Networks Kishore Kothapalli (JHU) Melih Onus (ASU) Christian Scheideler (JHU) Andrea Richa (ASU) 1.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
TDMA Scheduling in Wireless Sensor Networks
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
July, 2007Simon Fraser University1 Probabilistic Coverage and Connectivity in Wireless Sensor Networks Hossein Ahmadi
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks Melih Onus (ASU) Kishore Kothapalli (JHU) Andrea Richa (ASU) Christian Scheideler (JHU)
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
1 On the Performance of Slotted Aloha with Capture Effect in Wireless Networks Arash Behzad and Julan Hsu Professor Mario Gerla CS218 Project UCLA December.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
6/28/2015CSC82601 Radio-resource sharing for adhoc Networking with UWB. by Francesca Cuomo, Cristina Martello, Andrea Baiocchi, and Fabrizio Capriotti.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
Towards a Widely Applicable SINR Model for Wireless Access Sharing Christian Scheideler University of Paderborn Joint work with Andrea Richa and Stefan.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 1 Presented by Fikret Sivrikaya Joint work with Costas Busch, Malik Magdon-Ismail,
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
Jamming-Resistant MAC Protocol1 A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks Baruch Awerbuch (JHU) Andrea W. Richa (ASU) Christian.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
1 An O(log n) Dominating Set Protocol for Wireless Ad- Hoc Networks under the Physical Interference Model Andrea W. Richa Arizona State University Joint.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Fast and Reliable Route Discovery Protocol Considering Mobility in Multihop Cellular Networks Hyun-Ho Choi and Dong-Ho Cho Wireless Pervasive Computing,
Backbone Topology Synthesis for Multi- Radio Meshed Wireless LANs Huei-jiun Ju and Izhak Rubin University of California, Los angeles(UCLA) Keon Jang, SA.
Hongkun Li, Yu Cheng, Chi Zhou Illinois Institute of Technology, Chicago, IL, USA IEEE GLOBECOM 2008.
Self-stabilizing energy-efficient multicast for MANETs.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Maximal Independent Set
Net 435: Wireless sensor network (WSN)
On the Physical Carrier Sense in Wireless Ad-hoc Networks
TexPoint fonts used in EMF.
Introduction Wireless Ad-Hoc Network
<month year> <doc.: IEEE doc> January 2013
Protocols.
On Constructing k-Connected k-Dominating Set in Wireless Networks
Information Sciences and Systems Lab
Protocols.
Presentation transcript:

Andrea Richa1 Interference Models: Beyond the Unit-disk and Packet-Radio Models Andrea W. Richa Arizona State University

Andrea Richa2 Ad hoc Networks ●Wireless stations communicating over a wireless medium with no centralized infrastructure ●How to model ad hoc networks? –Need models that are close to reality, but which still allow for the design and formal analysis of algorithms

Andrea Richa3 Modeling Wireless Networks ●Wireless communication very difficult to model accurately: –Shape of transmission range –Interference –Mobility –Physical carrier sensing

Andrea Richa4 Outline Introduction → Simple Models of Wireless networks ●Bounded Interference Models ●SIT Model –What have we done? Leader Election; Constant Density Spanner ●Extended SINR Model ●Future Work and Conclusions

Andrea Richa5 Unit-Disk Graph ●Unit-Disk Graph (UDG) –Given a transmission radius R, nodes u, v are connected iff d(u,v) ≤ R –Too simple a model u R v u'

Andrea Richa6 ●Transmission range could be of arbitrary shape ●Does not consider interference R u UDG: What is the Problem? ●quasi-UDGs [Kuhn et al. 03]: - some uncertainty/non-uniformity in transmission, but still does not consider interference

Andrea Richa7 ●Can handle arbitrary transmission shapes ●Nodes u, v can communicate directly iff they are connected. ●Interference Model: –(interference range) = (transmission range) –too simplistic! u v w v' Packet Radio Network (PRN)

Andrea Richa8 ●While in the PRN model, s can send a message to t in 2 steps, no uniform protocol can successfully send a message in expected o(n) number of steps: linear slowdown PRN: What is the problem? v n-2 nodes s t ≤ r t ≤ r i ≥ r t

Andrea Richa9 Transmission and Interference Ranges: ●Separate values. ●Interference range constant times bigger than transmission range. Preliminary work: –most assume disk-shaped interference –[Adler and Scheideler '98]: too restrictive model for transmission –…–… Bounded Interference Models u rtrt v w u' riri does not cause interference at u (even if all nodes outside transmit at the same time) may cause interference at u

Andrea Richa10 Outline Introduction Simple Models of Wireless Networks Bounded Interference Models → SIT Model –What have we done: Leader Election; Constant Density Spanner ●Extended SINR Model ●Future Work and Conclusions

Andrea Richa11 SIT Model ●SIT (Sensing - Interference - Transmission) –Separate transmission and interference ranges via cost function –arbitrary, non-disk communication shapes –bounded interference ●Carrier sensing: –Physical carrier sensing: sense whether the channel is busy or not –Virtual carrier sensing ●fully probabilistic model

Andrea Richa12 Why Physical Carrier Sensing? ●Using physical carrier sensing, we can extract information from the network without relying on successful message transmissions –quite often it is enough just to know if at least one node is sending a message, rather than receiving the message –linear speedup ●It comes for “free” v

Andrea Richa13 Cost Function ●Euclidean distance d(,) ●Cost function c: –symmetric: c(u,v) = c(v,u) − , depends on the environment –c(u,v)  [ d(u,v)/(1+  ), (1+  ) d(u,v)] –c may not be a metric w u v a b

Andrea Richa14 Transmission and Interference Ranges ●Transmission power P ●Transmission range r t (P); Interference range r i (P) –A node v can only cause interference at node v’ if c(v,v’) ≤ r i (P), w.h.p. –If c(v,w) ≤r t (P) then v successfully receives a message from w provided no other node v' with c(v, v') ≤ r i (P) also transmits at the same time, w.h.p. w rt(P)rt(P) v' ri(P)ri(P) u v c(v,w)  r t (P) c(v,v')  r i (P)

Andrea Richa15 Physical Carrier Sensing ●Clear Channel Assessment (CCA) circuit: –Monitors the medium as a function of Received Signal Strength Indicator (RSSI) –Energy Detection (ED) bit set to 1 if RSSI exceeds a certain threshold –Has a register to set the threshold T in dB

Andrea Richa16 Physical Carrier Sensing ●Carrier sense transmission (CST) range, denoted r st (T, P) ●Carrier sense interference (CSI) range, denoted r si (T, P) ●Both ranges grow monotonically in both T and P. ●We will assume that P is fixed, and omit this parameter in the remainder of this talk. w v r st (T,P) v' v'' r si (T,P) c(w,v)  r st (T, P) c(w, v')  r si (T, P) c(w, v'')  r si (T, P)

Andrea Richa17 Carrier Sensing Ranges w v r st (T) v' v'' r si (T) c(w,v)  r st (T) c(w, v')  r si (T) c(w, v'')  r si (T) ●If c(v,w) ≤ r st (T), then w senses a transmission by node v, w.h.p. ●If w senses a transmission then there is at least one node v' transmitting a message such that c(v',w) ≤ r si (T), w.h.p. ●Nodes outside of r si (T) cannot be sensed by node w, w.h.p.

Andrea Richa18 Outline Introduction Simple Models of Wireless Networks Bounded Interference Models SIT Model → What have we done? Leader Election; Constant Density Spanner ●Extended SINR Model ●Future Work and Conclusions

Andrea Richa19 SIT:What have we done? ●Constant density dominating set and topological spanner: –Local-control –Self-stabilizing [Dijkstra '74], even in the presence of adversarial behavior –No knowledge (estimate) of the size or topology of the network –Nodes do not need globally distinct labels –Constant size messages ●Broadcasting and information gathering: Use constant density spanner

Andrea Richa20 Dominating Sets ●Dominating set (DS): a subset U of nodes such that each node v is either in U or has a node w in U within its transmission range (i.e., c(v,w) ≤ r t ) ●Transmission graph G t (V,E t ): edge (u,v)  E t iff c(u,v) ≤ r t ●Density of U: maximum number of neighbors that a node has in U. ●Seek for connected dominating set of constant density Dominator / Leader Density = 3

Andrea Richa21 Constant Density Dominating Set ●Our results: Locally self-stabilizing randomized protocol that converges to a constant density dominating set of the transmission graph G t in O(log 4 n) steps w.h.p. ●Uncertainties in our model make it harder! ●Without any estimate on the size of network, we need to exploit physical carrier sensing!

Andrea Richa22 Dominating Set Algorithm Basic principles: ●Nodes are either inactive or active (the potential leader nodes) and work in synchronous rounds ●Rounds organized into time frames of k rounds each (k sufficiently large constant). ●i-active node: active node that selected round i of the k rounds in a frame for its activities (like k-coloring) ●Initially, all nodes are 1-active ●Each round r of given frame consists of 2 steps: Round 1Round 2Round kRound 1Round 2 ….

Andrea Richa23 Step 1: “Waking up” nodes Step 1: ●Each r-active node transmits an ACTIVE signal. inactive r-active

Andrea Richa24 Step 1: “Waking up” nodes Step 1: ●Each r-active node transmits an ACTIVE signal. ●Each inactive node performs physical carrier sensing. No channel acitivity for last k rounds, including round r : inactive node becomes r-active inactive changes from inactive to r-active in Step 1 r-active

Andrea Richa25 Step 2: Leader Election Step 2: ●Each r-active node transmits a LEADER signal with probability p (for some constant p<1). inactive r-active

Andrea Richa26 Step 2: Leader Election Step 2: ●Each r-active node transmits LEADER signal with probability p (for some constant p<1). ●An r-active node not sending but either sensing or receiving a LEADER signal becomes inactive. inactive r-active changes from r-active to inactive in Step 2 such conflicts will eventually be resolved

Andrea Richa27 Why k rounds (k-coloring)? Fact: In G t,any Maximal Independent Set (MIS) is also a dominating set of constant density [Luby '85, Dubhashi et al., '03, Kuhn et al., '04, Gandhi and Parthasarathy '04] ●Given uncertainties in our model, we cannot guarantee that leader nodes will form an independent set without risking loss of coverage (i.e., having some inactive nodes not covered by any leader) Solution: we use k independent sets (one for each color) to guarantee coverage!

Andrea Richa28 Different Sensing Ranges ●E.g., an inactive node v uses different sensing ranges for the round r when it attempts to become active, and for other rounds. ●Interference-free communication among r-active (leader) nodes ●Coverage for all nodes u rtrt riri no active node transmitting here in round r whp if an active node transmitted here in a round other than r, v would have sensed whp

Andrea Richa29 Topological Spanners ●Definition: Given a graph G(V,E), find a subgraph H(V,E') such that d H (u,v) ≤ t d G (u,v) –Distances measured in number of edges (number of hops) –H is also called a t-spanner ●Previous Work (weaker models): [Alzoubi et. al., '03], [Dubhashi et. al., '03], …

Andrea Richa30 Constant Density Topologial Spanner ●Our results: Our local self-stabilizing protocol achieves a constant density 5-spanner of the transmission graph G t,, in O(log4 n + (D log D) log n) time w.h.p. –D: density of the original network u l l' v s t Active node Inactive node Gateway node Gateway edge Other edges

Andrea Richa31 Simulations ●90% of work through physical carrier sensing ●Performance comparable with other overlay network protocols (which need more assumptions, use simpler communication models)

Andrea Richa32 SIT: What is the problem? u rtrt riri Problem: Sharp threshold for transmission? –forward error correction Problem: Does not consider signal-to- noise ratio? –conservative model Problem: Does not consider unbounded (physical) interference!! –many transmitting nodes far away from u could still interfere at node u Solution: Extended SINR model could still interfere at u

Andrea Richa33 Outline Introduction Simple Models of Wireless Networks Bounded Interference Models SIT Model What have we done? Leader Election; Constant Density Spanner → Extended SINR Model ●Future Work and Conclusions

Andrea Richa34 Log-normal Shadowing ●Well-approximated by our cost model (SIT model) –irregular coverage area –sharp transmission threshold (forward error correction) ●when node u transmits with power P, received power at node v is  : path loss coefficient P c(u,v) 

Andrea Richa35 SINR Model ●Signal-Interference-Noise-Ratio (SINR) condition: A message sent by node u is received at node v iff - N: Gaussian variable for background noise - S: set of transmitting nodes -  : constant that depends on transmission scheme ●“Unbounded interference“ P/||u v||  N +  w in S P/||w v||  > 

Andrea Richa36 Extended SINR Model ●Extend SINR model to incorporate physical carrier sensing ●ED-bit set to 1 at v iff N +  w in S P/||w v||  >T

Andrea Richa37 Extended SINR Model Problem: Difficult to rigorously analyze routing protocols in this model! Solution: Reduce (extended) SINR model to bounded interference model with proper MAC scheme PHY MAC Extended SINR model Bounded interference model

Andrea Richa38 SINR X Bounded Interference Fact: If node distribution in ad hoc network is of constant density, then SINR simplifies to bounded interference. v transmission range interference range may cause interference does not cause interference

Andrea Richa39 SINR X Bounded Interference So how do we get from arbitrary distribution to constant density distribution of nodes??? v transmission range interference range may cause interference does not cause interference

Andrea Richa40 Getting Down to Constant Density ●Each node is initially inactive. ●Each node v maintains a probability of transmission p v. Goal: For each transmission range R v of node v,  w in R v p w =  (1) bounded interference

Andrea Richa41 Getting Down to Constant Density Density Estimation: ●Each node v chooses one of two time steps uniformly at random, say step s (the other step is s): –Step s: v transmits PING signal with probability p v –Step s: v senses channel Channel free: p v :=min{(1+  )p v, p max } Channel busy: p v :=max{(1-  )p v, p min } (  >0 is a small constant) Multiplicative increase, multiplicative decrease scheme.

Andrea Richa42 Algorithms for SINR Model ●W.h.p., in O(log n) time steps, our locally self- stabilizing algorithm converges to the right density estimates for all nodes. –the subset of nodes actively transmitting at any time step is of constant density, w.h.p. ●Current Work: Dominating set algorithm for extended SINR model is locally self-stabilizing and needs O(log n) time steps, w.h.p., to arrive at a stable constant density dominating set.

Andrea Richa43 SINR: What is the problem? Is the model sufficiently realistic?? ●Our interference model conservative: – signal cancellation – different signal strengths – bit recovery

Andrea Richa44 Self-Stabilization ●wireless communication too complex: no model will be able to accurately take into account all that can happen Problem: What happens if things deviate from proposed model? Solution: Protocols need to be self-stabilizing, i.e., they need to go back to a valid configuration for the model

Andrea Richa45 Collaborators ●Wireless Models: –Christian Scheideler (Technical U. of Munich), –Paolo Santi (U. of Pisa), –Kishore Kothapalli (IIIT), –Melih Onus (ASU) ●Simulations: –Martin Reisslein (ASU), –Luke Ritchie (ASU)

Andrea Richa46 More Future Work ●throughput ●power control ●future devices: MIMO (send/receive at same time), cognitive radio (continuous scan of available frequencies) ●alternatives to pure multihop ad-hoc networks? –wireless mesh networks: basestations form a mesh, everybody else ad-hoc ●energy-efficiency

Andrea Richa47 Questions?

Andrea Richa48 Publications ●K. Kothapalli, C. Scheideler, M. Onus, A.W. Richa. Constant density spanners for wireless ad-hoc networks. In Proceedings of the 17th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), pages , ●K. Kothapalli, M. Onus, A.W. Richa and C. Scheideler. Efficient Broadcasting and Gathering in Wireless Ad Hoc Networks. In Proceedings of the IEEE International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN), pages , ●L. Ritchie, S. Deval, M. Onus, A. Richa, and M. Reisslein. Evaluation of Physical Carrier Sense Based Spanner Construction and Maintenance as well as Broadcast and Convergecast in Ad Hoc Networks. Submitted to IEEE Transactions on Mobile Computing. ●A.W. Richa, C. Scheideler, P. Santi. Leader Election Under the Physical Interference Model in Wireless Multi-Hop Networks. Manuscript.

Andrea Richa49 Log-Normal Shadowing ●Received power at a distance of d relative to received power at reference distance d 0 in dB is -10 log(d/d 0 )  + X  -  : path loss coefficient - X  : Gaussian variable with standard deviation 

Andrea Richa50 Topological Spanner Protocol ●Each round has time slots reserved for each phase of the protocol Three phase protocol: 1.Phase I: Dominating set 2.Phase II: Refined Distributed Coloring 3.Phase III: Gateway Discovery One round Ph. I Phase II Phase III Ph. I Phase IIPhase III Time

Andrea Richa51 Quasi-Unit Disk Graphs (q-UDG) [Kuhn et al’03] Given parameter 0<  modify UDG as follows: ●d(u,v)≤  successful transmission ●d(u,v)>1: v outside u’s transmission range ●  <d(u,v) ≤ 1: transmission may or may not be successful What is the problem? –model for transmission too conservative –does not model interference –green zone as “interference zone”? no interference within transm. range disk shaped interference u δ 1 ? ? ? ? ?

Andrea Richa52 –senses an ACTIVE signal with CSI range of r t ; if it did not sense any signal for the last k-1 rounds it senses with CST range of r i and if channel is clear, it becomes r-active

Andrea Richa53 Maximal Independent Sets Fact: In G t,any Maximal Independent Set (MIS) is also a dominating set of constant density –[Luby '85], [Dubhashi et. al., '03], [Kuhn et. al., '04], [Gandhi and Parthasarathy '04] ●Ideally, we would like to be able to show that the set of leader nodes form a MIS. However…