Skip to main content

Constructing Interference-Minimal Networks

  • Conference paper
SOFSEM 2006: Theory and Practice of Computer Science (SOFSEM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3831))

Abstract

A wireless ad-hoc network can be represented as a graph in which the nodes represent wireless devices, and the links represent pairs of nodes that communicate directly by means of radio signals. The interference caused by a link between two nodes u and v can be defined as the number of other nodes that may be disturbed by the signals exchanged by u and v. Given the position of the nodes in the plane, links are to be chosen such that the maximum interference caused by any link is limited and the network fulfills desirable properties such as connectivity, bounded dilation or bounded link diameter. We give efficient algorithms to find the links in two models. In the first model, the signal sent by u to v reaches exactly the nodes that are not farther from u than v is. In the second model, we assume that the boundary of a signal’s reach is not known precisely and that our algorithms should therefore be based on acceptable estimations. The latter model yields faster algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arya, S., Mount, D.: Approximate Range Searching. Compututational Geometry: Theory & Applications 17(3–4), 135–152 (2000)

    MATH  MathSciNet  Google Scholar 

  2. Burkhart, M., von Rickenbach, P., Wattenhofer, R., Zollinger, A.: Does Topology Control Reduce Interference? In: Proc. 5th ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 9–19 (2004)

    Google Scholar 

  3. Callahan, P.B., Kosaraju, S.R.: A Decomposition of Multidimensional Point Sets with Applications to k-Nearest-Neighbors and n-Body Potential Fields. Journal of the ACM 42, 67–90 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  4. Chan, T.M.: Random Sampling, Halfspace Range Reporting, and Construction of (≤k)-Levels in Three Dimensions. SIAM J. on Computing 30(2), 561–575 (2000)

    Article  MATH  Google Scholar 

  5. Gudmundsson, J., Hammar, M., van Kreveld, M.: Higher Order Delaunay Triangulations. Computational Geometry: Theory & Appl. 23(1), 85–98 (2002)

    Article  MATH  Google Scholar 

  6. Gudmundsson, J., Narasimhan, G., Smid, M.: Distance-Preserving Approximations of Polygonal Paths. In: FST & TCS, pp. 217–228 (2003)

    Google Scholar 

  7. Haverkort, H.J., de Berg, M., Gudmundsson, J.: Box-Trees for Collision Checking in Industrial Installations. Computational Geometry: Theory & Applications 28(2-3), 113–135 (2004)

    Google Scholar 

  8. Lee, D.T.: On k-Nearest Neighbor Voronoi Diagrams in the Plane. IEEE Transactions on Computing 31, 478–487 (1982)

    Article  MATH  Google Scholar 

  9. Moaveni-Nejad, K., Li, X.-Y.: Low-Interference Topology Control for Wireless Ad Hoc Networks. Ad Hoc & Sensor Wireless Networks (2004) (Accepted for publ.)

    Google Scholar 

  10. Matoušek, J.: Range Searching with Efficient Hierarchical Cuttings. Discrete Computational Geometry 10, 157–182 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  11. Moffat, A., Takaoka, T.: An All Pairs Shortest Path Algorithm with Expected Time O(n 2 logn). SIAM Journal on Computing 16(6), 1023–1031 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  12. Narasimhan, G., Smid, M.: Approximating the Stretch Factor of Euclidean Graphs. SIAM Journal of Computing 30(3), 978–989 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  13. Prakash, R.: Unidirectional Links Prove Costly in Wireless Ad-Hoc Networks. In: Proc. 3rd Int. Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M), pp. 15–22 (1999)

    Google Scholar 

  14. Prim, R.C.: Shortest Connection Networks and Some Generalisations. Bell Systems Technical Journal, 1389–1410 (1957)

    Google Scholar 

  15. Ramos, E.A.: On Range Reporting, Ray Shooting and k-Level Construction. In: Proc. 15th Symp. on Computational Geometry, pp. 390–399 (1999)

    Google Scholar 

  16. von Rickenbach, P., Schmid, S., Wattenhofer, R., Zollinger, A.: A Robust Interference Model for Wireless Ad-Hoc Networks. In: Proc. 5th Int. Worksh. Alg. for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN), CD ROM (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Benkert, M., Gudmundsson, J., Haverkort, H., Wolff, A. (2006). Constructing Interference-Minimal Networks. In: Wiedermann, J., Tel, G., Pokorný, J., Bieliková, M., Štuller, J. (eds) SOFSEM 2006: Theory and Practice of Computer Science. SOFSEM 2006. Lecture Notes in Computer Science, vol 3831. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11611257_14

Download citation

  • DOI: https://doi.org/10.1007/11611257_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31198-0

  • Online ISBN: 978-3-540-32217-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics