Professional Documents
Culture Documents
37832239
37832239
37832239
Abstract—In this paper, we analyze the critical transmitting range for connectivity in wireless ad hoc networks. More specifically, we
consider the following problem: Assume n nodes, each capable of communicating with nodes within a radius of r, are randomly and
uniformly distributed in a d-dimensional region with a side of length l; how large must the transmitting range r be to ensure that the
resulting network is connected with high probability? First, we consider this problem for stationary networks, and we provide tight upper
and lower bounds on the critical transmitting range for one-dimensional networks and nontight bounds for two and three-dimensional
networks. Due to the presence of the geometric parameter l in the model, our results can be applied to dense as well as sparse ad hoc
networks, contrary to existing theoretical results that apply only to dense networks. We also investigate several related questions
through extensive simulations. First, we evaluate the relationship between the critical transmitting range and the minimum transmitting
range that ensures formation of a connected component containing a large fraction (e.g., 90 percent) of the nodes. Then, we consider
the mobile version of the problem, in which nodes are allowed to move during a time interval and the value of r ensuring
connectedness for a given fraction of the interval must be determined. These results yield insight into how mobility affects connectivity
and they also reveal useful trade offs between communication capability and energy consumption.
Index Terms—Wireless ad hoc networks, sparse ad hoc networks, sensor networks, energy consumption, topology control, critical
transmitting range.
1 INTRODUCTION
1536-1233/03/$17.00 ß 2003 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS
26 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2003
sensor networks, the individual unit should cost as little as The main difficulty that arises in this context is that the
possible, and inexpensive transceivers, which might not well-established model of random graph theory [3], [20]
allow the transmitting range to be adjusted, are likely to be cannot be used. In fact, a fundamental assumption in this
used [28]. model is that the probability of edge occurrences in the
Overall, the results presented in this paper are useful graph are independent, which is not the case in wireless ad
guidelines in the design of wireless ad hoc and sensor hoc networks. As an example, consider three nodes u; v; w
networks: Given the value of l (which is known, at least such that ðu; vÞ < ðu; wÞ, where ðx; yÞ denotes the distance
with a certain approximation, to the network designer) and between x and y. With common wireless technologies that
n (or r), we can set the transmitting range r to the minimum use omni-directional antennas, if u has a link to w, then it
value (or, disperse the minimum number n of nodes) that has also a link to v. Hence, the occurrences of edges ðu; vÞ
ensures connectedness w.h.p. and ðu; wÞ are correlated.
In many applications of wireless ad hoc networks, the A more recent theory, which is still in development, is
nodes are mobile. This complicates analysis of network the theory of geometric random graphs (GRG). In the theory of
characteristics because the network topology is constantly GRG, a set of n points is distributed according to some
changing in this situation. In this work, we consider density in a d-dimensional region R, and some property of
networks both with and without mobility. We present the resulting node placement is investigated. For example,
analytical results that apply to networks without mobility the longest nearest-neighbor link, the longest edge of the
and confine ourselves to simulation results for networks Euclidean Minimum Spanning Tree (MST), and the total
with mobility, due to the intractability of analysis with cost of the MST have been investigated. For a survey of
existing mathematical methods. GRG, the reader is referred to [8].
The first analytical result in this paper concerns one- Some of these GRG results can be applied in the study of
dimensional networks (i.e., nodes are placed along a line of connectivity in ad hoc networks. For example, consider a set
length l). We show that the communication graph that N of points distributed in the deployment region. It is
results when all the nodes have the same transmitting range known that the longest edge of the MST built on N equals
r is connected w.h.p. if rn 2l ln l, while it is not connected the critical transmitting range for connectivity [23]. Hence,
w.h.p. if rn < ð1 ÿ Þl ln l, for some constant 0 < < 1. This
results concerning the asymptotic distribution of the longest
closes a gap between lower and upper bounds on the
MST edge [22], [23] can be used to characterize the critical
product rn that were established in earlier versions of the
transmitting range, as has been done in [21].
paper [30], [31]. Next, we consider two and three-dimen-
Another notable result of the theory of GRG is that,
sional networks. We generalize the sufficient condition for
under the assumption of uniformly distributed points, the
connectedness w.h.p. to the two and three-dimensional
longest nearest-neighbor link and the longest MST edge
case, while we give a necessary condition for connectedness
have the same value (asymptotically as n ! 1). In terms of
w.h.p. that is weaker than in the one-dimensional case.
the resulting communication graph, this means that con-
Besides analytical results, in this paper, we present a
nectivity occurs (asymptotically) when the last isolated
considerable body of simulation results. These results
node disappears from the graph. This observation can be
demonstrate convincingly that significant reductions of
generalized to the case of k-connectivity: When the
transmitting range (and, therefore, significant reductions in
energy consumption as well) can be achieved by either minimum node degree becomes k, the graph becomes
connecting a large percentage (but not all) of the nodes for k-connected [24]. This result, which has been used in [1] to
stationary networks or allowing temporary disconnections characterize the k-connectivity of dense ad hoc networks,
for mobile networks. The results also show that mobility reveals an interesting analogy with nongeometric random
comes with a cost in terms of transmitting range and energy graphs, which display the same behavior.
consumption, i.e., the transmitting range required to Although interesting, the theory of GRG can be used
maintain connectedness continuously during a long simula- only to derive results concerning dense ad hoc networks. In
tion in a highly mobile network is approximately 10 percent fact, a standard assumption in this theory is that the
higher than that required to achieve connectedness in a
stationary network of the same size and having the same deployment region R is fixed, and the asymptotic behavior
number of nodes. However, simulations in which different of r as n grows to infinity is investigated, i.e., the node
mobility parameters were varied demonstrate that, for density is assumed to grow to infinity. A similar limitation
surprisingly large ranges of some parameter values, mobile applies to the model of Gupta and Kumar [12]. In their case,
networks are effectively stationary as far as the connected-
R is the disk of unit area, and the authors
qffiffiffishow
ffiffiffiffiffiffiffiffiffiffiffiffi that, if the
ness property is concerned, meaning that the transmitting log nþcðnÞ
range necessary for continuous connectedness is essentially units’ transmitting range is set to r ¼ n , then the
identical to that necessary for connectedness in a similar resulting network is connected w.h.p. if and only if
stationary network. cðnÞ ! 1. This result is obtained making use of the theory
of continuum percolation [19], which is also used in [9] to
2 RELATED WORK investigate the connectivity of hybrid ad hoc networks.
Until recently, only a few papers considered the probabil- Given the discussion above, the applicability of existing
istic modeling of the communication graph properties of theoretical results concerning connectivity in ad hoc net-
wireless ad hoc networks. works to realistic scenarios could be impaired. In fact, it is
SANTI AND BLOUGH: THE CRITICAL TRANSMITTING RANGE FOR CONNECTIVITY IN SPARSE WIRELESS AD HOC NETWORKS 27
known that real wireless networks cannot be too dense, due nodes, with jNj ¼ n, and P : N T ! ½0; ld , for some l > 0, is
to the problem of spatial reuse: When a node is transmit- the placement function. The placement function assigns to
ting, all the nodes within its transmitting range must be every element of N and to any time t 2 T a set of coordinates
silent, in order not to corrupt the transmission. If the node in the d-dimensional cube of side l, representing the node’s
density is very high, many nodes must remain silent when a physical position at time t. The choice of limiting the
node is transmitting, and the overall network capacity is admissible physical placement of nodes to a bounded
compromised [13]. region of IRd of the form ½0; ld , for some l > 0, is realistic and
In order to circumvent this problem, we add the size will ease the probabilistic analysis of Section 4. If the
of the deployment region as a parameter of the model, physical node placement does not vary with time, the
and characterize the critical transmitting range as the size network is said to be stationary, and function P can be
goes to infinity. The critical coverage range,2 which is represented simply as P : N ! ½0; ld .
closely related to the critical transmitting range, has been A range assignment for a d-dimensional network Md ¼
investigated in [25] for the case of nodes distributed in a ðN; P Þ is a function RA : N ! ð0; rmax that assigns to every
square with a side of length l according to a Poisson element of N a value in ð0; rmax , representing its transmit-
process of fixed density. The critical transmitting range ting range. Parameter rmax is called the maximum transmit-
for Poisson distributed points in a line of length l is ting range of the nodes in the network and depends on the
derived in [26]. However, these results are also difficult to features of the radio transceivers equipping the mobile
apply in real scenarios since, in a Poisson process, the nodes. We assume that all the nodes are equipped with
actual number of deployed nodes is a random variable transceivers having the same features; hence, we have a
itself. Hence, only the expected number of deployed nodes single value of rmax for all the nodes in the network.
can be controlled. In this paper, we are mostly concerned with range
In this paper, we consider a model similar to that of [25], assignments in which all the nodes have the same transmit-
[26], but under the assumption that a fixed number n of ting range r, called homogeneous range assignments. With
nodes are uniformly distributed in the deployment region this assumption, the communication graph of Md induced at
R ¼ ½0; ld . Furthermore, we consider also the case of a time t, denoted GMðtÞ , is defined as GMðtÞ ¼ ðN; EðtÞÞ, where
three-dimensional deployment region. In our analysis, the the edge ðu; vÞ 2 EðtÞ if and only if v is at distance at most r
node density lnd might either converge to 0, or to a constant from u at time t. If ðu; vÞ 2 EðtÞ, node v is said to be a neighbor
c > 0, or diverge as the size of the deployment region grows of u at time t. GMðtÞ corresponds to a point graph as defined
to infinity, depending on the relative values of r, n, and l. in [33]. Although quite simplistic, the point graph model is
Thus, our results can be applied both to dense, as well as widely used in the analysis of ad hoc networks. If the radio
sparse, ad hoc networks. coverage area is not regular, as it is likely to be the case in
To conclude this section, we mention a more general real-life scenarios, the results presented in this paper are still
connectivity problem for ad hoc networks, called the useful since the transmitting range can be thought of as the
range assignment problem. In this version of the problem, radius of the largest circular subarea of the actual area of
nodes are not all forced to have the same transmitting coverage. In this case, there could exist nodes that are
range, and the goal is to find a range assignment that connected in reality that would not be connected consider-
generates a (strongly) connected communication graph ing the circular region; thus, the actual probability of
while minimizing some measure of energy consumption. connectedness could be higher compared to our results.
The solution of the range assignment problem can be In the next section, we consider probabilistic solutions to
seen as the optimal result of the execution of a topology the following problem for stationary ad hoc networks:
control protocol.3 Thus, the investigation of the range Definition 1 (Minimum Transmitting Range (MTR)).
assignment problem gives hints on the best possible Suppose n nodes are placed in R ¼ ½0; ld ; what is the
energy savings achievable by any topology control minimum value of r such that the resulting communication
protocol. It has been shown that determining an optimal graph is connected?
range assignment is solvable in polynomial time in the
one-dimensional case, while it is NP-hard (i.e., computa- Observe that, when dealing with the magnitude of l, the
tionally infeasible) in the two and three-dimensional cases choice of unit is important. In the following, we assume that
[5], [15]. A constrained version of this problem has been r and l are measured using the same arbitrary unit, which is
investigated in [2], [4]. therefore canceled out when discussing the relative sizes of
r and l.
Given the number of nodes, minimizing r while
3 PRELIMINARIES
maintaining a connected network is of primary importance
A d-dimensional mobile wireless ad hoc network is if energy consumption is to be reduced. In fact, the energy
represented by a pair Md ¼ ðN; P Þ, where N is the set of consumed by a node for communication is directly
dependent on its transmitting range. Furthermore, a small
2. Network coverage is defined as follows: Every node covers a circular
area of radius rc , and the monitored area R is covered if every point of R is at
value of r reduces the interferences between node transmis-
a distance at most rc from at least one node. The goal is to find the critical sions, thus increasing the network capacity [13]. Observe
value of rc that ensures coverage w.h.p. that we could just as easily have stated the problem as one
3. A topology control protocol is an algorithm in which nodes adjust
their transmitting ranges in order to achieve a desired topological property, of finding the minimum number of nodes to ensure
e.g., connectedness, while reducing energy consumption. connectedness given a fixed transmitting range. In fact,
28 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2003
Lemma 1. Assume that n nodes are placed in ½0; l, and that the
line is divided into C ¼ l=r segments of equal length r. Assign
to every cell ci , for i ¼ 0; . . . ; C ÿ 1, a bit bi , denoting the
Fig. 1. Node placement generating a disconnected communication
presence of at least one node in the cell. Without loss of
graph.
generality, assume bi ¼ 0 if ci is empty, and bi ¼ 1 otherwise.
Let B ¼ fb0 . . . bCÿ1 g be the string obtained by concatenating
results, and gives no clue, for instance, on the actual the bits bi , for i ¼ 0; . . . ; C ÿ 1. If B contains a substring of the
multiplicative factor needed to ensure connectedness w.h.p. form f10 1g, where 0 denotes that one or more 0s may occur,
Thus, its usefulness in a realistic setting is limited. In this then the resulting communication graph is disconnected.
section, we derive a more precise characterization of the
critical transmitting range in one-dimensional networks, Observe that the condition stated in Lemma 1 is
providing explicit values to the multiplicative constants. sufficient, but not necessary to produce a disconnected
We start with the following theorem, which gives a more graph. In fact, there exist node placements such that B does
precise sufficient condition for connectedness w.h.p. than not contain any substring of the form f10 1g, but the
that provided by Theorem 3. resulting communication graph is disconnected.
Let us denote with DISCONNl and El10 1 the events
Theorem 4. Assume that n nodes, each with transmitting range corresponding to all the values of the random variables
r, are distributed uniformly and independently at random in Z1 ; . . . ; Zn such that the resulting communication graph is
R ¼ ½0; l and assume that rn ¼ kl ln l for some constant k > 0. disconnected, or a substring of the form f10 1g occurs in B,
Further, assume that r ¼ rðlÞ l and n ¼ nðlÞ 1. If k > 2, or respectively. The subscript l indicates that we are consider-
k ¼ 2 and r ¼ rðlÞ 1, then liml!1 P ðCONNl Þ ¼ 1. ing these events in the case that the length of the line is l.
Proof. See Appendix. u
t Since CONNl ¼ l ÿ DISCONNl and El10 1 DISCONNl ,
it is immediate that a necessary condition for connectedness
Observe that the conditions on the magnitude of r ¼ rðlÞ w.h.p. is that liml!1 P ðEl10 1 Þ ¼ 0.
and n ¼ nðlÞ in the statement of Theorem 4 are not In order to evaluate liml!1 P ðEl10 1 Þ, we decompose the
10 1
restrictive. In fact, if r ¼ ðlÞ, then every node is able to event El by conditioning on the disjoint events
transmit directly to most of the other nodes, and connect- fðn; CÞ ¼ hg, for h ¼ 0; . . . ; C, i.e.,
edness is ensured independently of n. The condition n ¼
ÿ X C ÿ
nðlÞ 1 is a straightforward consequence of the first P El10 1 ¼ P El10 1 jfðn; CÞ ¼ hg P ððn; CÞ ¼ hÞ:
condition since otherwise the probability of connectedness h¼0
would be negligible.
Observe that, when l grows to infinity, P ðEl10 1 Þ is defined
Note that the value of k established in Theorem 4 is the
as the sum of an infinite number of nonnegative terms
same as that obtained in [26] when nodes are distributed
t1 ; t2 ; . . . . Clearly, if there exists at least one term th such that
with Poisson density , where ¼ n=l. Hence, the sufficient
conditions for connectivity w.h.p. in the cases of Poisson liml!1 th ¼ > 0, then liml!1 P ðEl10 1 Þ > 0. In what fol-
and uniformly distributed nodes are the same. lows, we prove that, if rn ¼ ð1 ÿ Þl ln l and r ¼ ðl Þ, for some
Let us now consider the necessary condition for 0 < < 1, then liml!1 th ¼ > 0, where h ¼ dE½ðn; CÞe. Thus,
connectedness w.h.p. The bound of Theorem 3 is obtained in these conditions, the communication graph is not
by analyzing the probability of existence of an isolated connected w.h.p.
node. In fact, the existence of an isolated node implies that We start with ÿ a lemma that characterizes
the asymptotic
the resulting communication graph (which is a point graph behavior of P El10 1 jfðn; CÞ ¼ hg as l goes to infinity.
[33]) is disconnected. However, the class of disconnected
Lemma 2. If 0 < h C and r ¼ rðlÞ l, then
point graphs is much larger than the class of point graphs
containing at least one isolated node. For this reason, the ÿ
lim P El10 1 jfðn; CÞ ¼ hg ¼ 1:
bounds established in [31] are not tight. In [31], it is l!1
conjectured that the upper bound stated in Theorem 3 is
actually tight. In what follows, we prove that this conjecture Proof. See Appendix. u
t
is true. The result derives from a more accurate approxima-
tion of the class of disconnected point graphs, which is Let us set h ¼ dE½ðn; CÞe. By Lemma 2, if 0 < h C and
based on occupancy theory. liml!1 P ððn; CÞ ¼ hÞ ¼ > 0, then the communication
In order to derive the lower bound, we consider the graph is not connected w.h.p. The following lemma
following subdivision of the placement region into cells. We establishes the asymptotic value of P ððn; CÞ ¼ hÞ in the
assume that a line of length l is subdivided into C ¼ l=r hypothesis that rn ¼ ð1 ÿ Þl ln l and r ¼ ðl Þ, for some
segments of equal length r. With this subdivision, if there 0 < < 1.
exists an empty cell ci separating two cells ciÿ1 ; ciþ1 that Lemma 3. Assume that n nodes, each with a transmitting range
each contains at least one node, then the nodes in ciÿ1 are
of r, are distributed uniformly and independently at random in
unable to communicate to those in ciþ1 , and the resulting
R ¼ ½0; l, and assume that rn ¼ ð1 ÿ Þl ln l and r ¼ ðl Þ, for
communication graph is disconnected (see Fig. 1). The
some 0 < < 1. Then, liml!1 P ððn; CÞ ¼ hÞ ¼ > 0.
following lemma, whose immediate proof is omitted,
establishes a sufficient condition for the communication Proof. See Appendix. u
t
graph to be disconnected.
30 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2003
We are now ready to state the necessary condition for Thus, there is a substantial reduction in transmitting
connectedness w.h.p. range from the worst case, but also a significant increase
compared to the best-case.
Theorem 5. Assume that n nodes, each with a transmitting
range of r, are distributed uniformly and independently at 4.2 The Two and Three-Dimensional Cases
random in R ¼ ½0; l, and assume that rn ¼ ð1 ÿ Þl ln l for In this section, we provide necessary and sufficient
some 0 < < 1. If r ¼ rðlÞ 2 ðl Þ, then the communication conditions for connectedness w.h.p. in the cases of two
graph is not connected w.h.p. and three-dimensional networks.
Proof. The proof follows immediately by Lemmas 2 and 3, We start with the following theorem, which is a direct
and by observing that in the hypotheses of the theorem, generalization of Theorem 4.
we have Theorem 8. Assume that n nodes, each with a transmitting
l range of r, are distributed uniformly and independently at
h ¼ dE½ðn; CÞe C; random in R ¼ ½0; ld , for d ¼ 2; 3, and assume that rd n ¼
r
kld ln l for some constant k > 0, with r ¼ rðlÞ l and
r l l, and n ¼ nðlÞ 1. u
t n ¼ nðlÞ 1. If k > d kd , or k ¼ d kd and r ¼ rðlÞ 1, then
the communication graph is connected w.h.p., where
Observe that Theorem 5 holds only when r ¼ rðlÞ is ðl Þ,
for some 0 < < 1. Although this expression covers a wide kd ¼ 2d dd=2 .
range of functions for r, many other interesting functions Proof. The proof is similar to that of Theorem 4. In this case,
(for instance, functions including logarithmic terms) are not the deployment region R is subdivided into nonoverlap-
considered. When r is not of the form ðl Þ, the following ping d-dimensional cells of side 2pr ffidffi . u
t
weaker result holds [30].
Theorem 6. Assume that n nodes, each with a transmitting Unfortunately, generalizing the necessary condition of
range of r, are distributed uniformly and independently at Theorem 5 to the two and three-dimensional case is not
random in R ¼ ½0; l and assume that r ¼ rðlÞ l and straightforward. In fact, in these cases, the conditions for the
n ¼ nðlÞ 1. If rn l ln l, then the communication graph is graph to be disconnected are more difficult to analyze. For
not connected w.h.p. instance, a “hole” in one dimension (as in the case of the
El10 1 event of the previous section) is not sufficient to cause
We summarize the analysis above in the following disconnectedness because there could exist paths that “go
theorem, which is the main result of this section. around the hole” using other dimensions, thereby main-
taining connectivity. Thus, we are only able to state the
Theorem 7. Assume that n nodes, each with a transmitting range
following weaker necessary condition for connectedness,
of r, are distributed uniformly and independently at random in which is obtained by analyzing the probability of an
R ¼ ½0; l and assume that rn ¼ kl ln l for some constant k > 0. isolated node.
Further, assume that r ¼ rðlÞ l and n ¼ nðlÞ 1. If k > 2, or
k ¼ 2 and r ¼ rðlÞ 1, then the communication graph is Theorem 9. Suppose n nodes are placed in R ¼ ½0; ld , with
connected w.h.p. If k ð1 ÿ Þ and r ¼ rðlÞ 2 ðl Þ for some d ¼ 2; 3, according to the uniform distribution. Further,
0 < < 1, then the communication graph is not connected w.h.p. assume that r ¼ rðlÞ l and n ¼ nðlÞ 1. If rd n 2 Oðld Þ, then
If r is not of the form ðl Þ, but rn l ln l, then the the communication graph is not connected w.h.p.
communication graph is not connected w.h.p. Proof. See Appendix. u
t
5. In the latter case, the simulation for n ¼ 4 was not considered, due to its
scarce significance.
32 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2003
TABLE 2
Values of the Transmitting Range r
(Expressed as a Fraction of l) Ensuring Connectedness W.H.P.
TABLE 3
Values of the Transmitting Range
Considered in Our Simulations
Fig. 13. Values of the ratio r100 =rstationary (y-axis) for different values of
Fig. 12. Values of the ratio r100 =rstationary (y-axis) for different values of
tpause in the random waypoint model.
pstationary in the random waypint model.
the nodes. Regarding the influence of mobility patterns, El10 1 , i.e., El1 ¼ l ÿ El10 1 . It can be easily seen that El1
corresponds to all the values of the random variables
simulation results have shown that connectedness is only
Z1 ; . . . ; Zn such that the 1-bits in B are consecutives.
marginally influenced by whether motion is intentional or Given the hypothesis of independence of the random
not, but it is rather related to the “quantity of mobility,” variables Z1 ; . . . ; Zn , when exactly h ÿcells out of C are
which can be informally defined as the percentage of empty (i.e., h bits in B are 0), P El1 jfðn; CÞ ¼ hg
stationary nodes with respect to the total number of nodes. corresponds to the ratio of all configurations of ðC ÿ
For example, when about n=2 nodes are static, the network hÞ consecutive 1-bits over all possible configurations
can be regarded as stationary from a connectivity point of of h 0-bits in C positions, i.e.,
view. Further investigation in this direction is needed and is ÿ hþ1
a matter of ongoing research. P El1 jfðn; CÞ ¼ hg ¼ ÿC :
h
connected. Let ðn; CÞ be the random variable denoting We can rewrite the last limit as:
the number of empty cells. Since ðn; CÞ is a nonnegative
integer random variable, then hþ1 ðh þ 1Þ!
lim ÿC ¼ lim :
C!1 C!1 CðC ÿ 1Þ . . . ðC ÿ h þ 1Þ
h
P ððn; CÞ > 0Þ E½ðn; CÞ;
Since h C, we have:
where E½ðn; CÞ is the expected value of ðn; CÞ ([20,
pp. 10-11]). We have [16]: ðh þ 1Þ! ðh þ 1Þ!
lim ¼ lim :
C!1 CðC ÿ 1Þ . . . ðC ÿ h þ 1Þ C!1 Ch
1 n
E½ðn; CÞ ¼ C 1 ÿ : Taking the logarithm, we obtain:
C
We want to investigate the asymptotic value of E½ðn; CÞ ðh þ 1Þ!
lim ln ¼ lim lnðh þ 1Þ! ÿ h ln C
as l ! 1, which, given the hypotheses r ¼ rðlÞ l and C!1 Ch C!1
n ¼ nðlÞ 1, is equivalent to the asymptote as C; n ! 1. ¼ lim h ln h ÿ h ln C ¼ lim hðln h ÿ ln CÞ:
C!1 C!1
Taking the logarithm, we obtain:
38 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2003
0
Since 0 < h C, we conclude that lim P ðISOLAT EDi Þ ¼ eÿc > 0:
l!1
hþ1
lim ÿC ¼ 0;
C!1
h
ACKNOWLEDGMENTS
and the lemma is proved. u
t Preliminary versions of parts of this paper appeared in the
Proof of Lemma 3. Proceeding as in the proof of Theorem 4 Proceedings of the ACM MobiHoc 01 and the Proceedings of
and observing that rn ¼ ð1 ÿ Þl ln l and r ¼ ðl Þ implies the IEEE DSN 2002. D.M. Blough was supported in part by the
n ¼ nðlÞ 1, we obtain: US National Science Foundation under Grant ECS-0225417.
l
ln E½0 ðn; CÞ ln ;
r REFERENCES
hence
E½0 ðn; CÞ lr
. Given the hypothesis r ¼ ðl Þ, we [1] C. Bettstetter, “On the Minimum Node Degree and Connectivity
of a Wireless Multihop Network,” Proc. ACM MobiHoc ’02, pp. 80-
have that liml!1 E½0 ðn; CÞ ¼ c, for some constant c > 0. 91, 2002.
Since rn ¼ ð1 ÿ Þl ln l for some 0 < < 1, we are in the [2] D.M. Blough, M. Leoncini, G. Resta, and P. Santi, “On the
Symmetric Range Assignment Problem in Wireless Ad Hoc
hypothesis of Theorem 2, and the limit distribution of the Networks,” Proc. IFIP Conf. Theoretical Computer Science, pp. 71-
random variable ðn; CÞ is the Poisson distribution of 82, Aug. 2002.
[3] B. Bollobas, Random Graphs. London: Academic Press, 1985.
parameter ¼ liml!1 E½0 ðn; CÞ ¼ c (see Theorem 2). [4] G. Calinescu, I.I. Mandoiu, and A. Zelikovsky, “Symmetric
Hence, Connectivity with Minimum Power Consumption in Radio
Networks,” Proc. Second IFIP Conf. Theoretical Computer Science,
c c 1 pp. 119-130, Aug. 2002.
lim P ððn; CÞ ¼ hÞ ¼ > 0: [5] A.E.F. Clementi, P. Penna, and R. Silvestri, “Hardness Results for
l!1 e c!
the Power Range Assignment Problem in Packet Radio Net-
t
u works,” Proc. Second Int’l Workshop Approximation Algorithms for
Combinatorial Optimization Problems (RANDOM/APPROX ’99),
Proof of Theorem 9. We report the proof for the case d ¼ 2. pp. 197-208, 1999.
The proof for the case d ¼ 3 is similar. [6] A.E.F. Clementi, P. Penna, and R. Silvestri, “The Power Range
Consider the event ISOLAT EDi , corresponding to all Assignment Problem in Radio Networks on the Plane,” Proc. XVII
Symp. Theoretical Aspects of Computer Science (STACS ’00), pp. 651-
the values of the random variables Z1 ; . . . ; Zn such that 660, 2000.
node i is isolated in the communication graph, for [7] A.E.F. Clementi, A. Ferreira, P. Penna, S. Perennes, and R.
1 i n. It is immediate that a necessary condition for Silvestri, “The Minimum Range Assignment Problem on Linear
Radio Networks,” Proc. Eighth European Symp. Algorithms (ESA
connectedness w.h.p. is that liml!1 P ðISOLAT EDi Þ ¼ 0. 2000), pp. 143-154, 2000.
Considering that node i is isolated if none of the [8] J. Diaz, M.D. Penrose, J. Petit, and M. Serna, “Convergence
remaining n ÿ 1 nodes is within its transmitting range, Theorems for Some Layout Measures on Random Lattice and
we have: Random Geometric Graphs,” Combinatorics, Probability, and Com-
puting, no. 6, pp. 489-511, 2000.
nÿ1 nÿ1 [9] O. Dousse, P. Thiran, and M. Hasler, “Connectivity in Ad Hoc and
r2 r2 Hybrid Networks,” Proc. IEEE Infocom ’02, 2002.
1ÿ 2 P ðISOLAT EDi Þ 1 ÿ 2 ;
l 4l [10] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next
Century Challenges: Scalable Coordination in Sensor Networks,”
where the upper and lower bounds account for the fact Proc. MOBICOM ’99, pp. 263-270, 1999.
[11] W. Feller, An Introduction to Probability Theory and Its Applications.
that node i is in the corner or at a distance of at least r New York: John Wiley and Sons, 1950.
from the border of the deployment region, respectively. [12] P. Gupta and P.R. Kumar, “Critical Power for Asymptotic
Connectivity in Wireless Networks,” Stochastic Analysis, Control,
Hence, the asymptotic
behavior
n of P ðISOLAT EDi Þ is Optimization and Applications, Boston: Birkhauser, pp. 547-566,
cr2 1998.
given by liml!1 1 ÿ l2 , for some constant c > 0.
[13] P. Gupta and P.R. Kumar, “The Capacity of Wireless Networks,”
Taking the logarithm we have: IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388-404, 2000.
[14] D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad
n
cr2 cr2 Hoc Wireless Networks,” Mobile Computing, Boston: Kluwer
lim ln 1 ÿ 2 ¼ lim n ln 1 ÿ 2 : Academic, pp. 153-181, 1996.
l!1 l l!1 l [15] L.M. Kirousis, E. Kranakis, D. Krizanc, and A. Pelc, “Power
Consumption in Packet Radio Networks,” Theoretical Computer
Considering that r ¼ rðlÞ l and using the Taylor expa- Science, vol. 243, pp. 289-305, 2000.
2
sion, we can rewrite the last term as liml!1 ÿ crl2 n . Since [16] V.F. Kolchin, B.A. Sevast’yanov, and V.P. Chistyakov, Random
r2 n 2 Oðl2 Þ, we have two cases: Allocations. Washington, D.C.: H. Winston and Sons, 1978.
[17] L. Li, J.H. Halpern, P. Bahl, Y. Wang, and R. Wattenhofer,
2 2 “Analysis of a Cone-Based Distributed Topology Control Algo-
. r n ¼ ðl Þ; in this case, we have rithm for Wireless Multi-Hop Networks,” Proc. ACM ACM Symp.
Principles of Distributed Computing (PODC ’01), 2001.
cr2 n [18] A.W. Marshall and I. Olkin, Inequalities: Theory of Majorization and
lim ÿ ¼ ÿc0 ; Its Applications. New York: Academic Press, 1979.
l!1 l2
[19] R. Meester and R. Roy, Continuum Percolation. Cambridge, Mass.:
for some c0 > 0. It follows that Cambridge Univ. Press, 1996.
SANTI AND BLOUGH: THE CRITICAL TRANSMITTING RANGE FOR CONNECTIVITY IN SPARSE WIRELESS AD HOC NETWORKS 39
[20] E.M. Palmer, Graphical Evolution. New York: John Wiley and Sons, Paolo Santi received the MS and PhD degrees
1985. in computer science from the University of Pisa,
[21] P. Panchapakesan and D. Manjunath, “On the Transmission Italy, in 1994 and 2000, respectively. During
Range in Dense Ad Hoc Radio Networks,” Proc. IEEE SPCOM ’01, 2000, he was a research assistant at the Istituto
2001. di Elaborazione dell’Informazione, Pisa. From
[22] M.D. Penrose, “A Strong Law for the Longest Edge of the Minimal January to June 2001, he visited the School of
Spanning Tree,” The Annals of Probability, vol. 27, no. 1, pp. 246- Electrical and Computer Engineering, Georgia
260, 1999. Institute of Technology, Atlanta. In September
[23] M.D. Penrose, “The Longest Edge of the Random Minimal 2001, Dr. Santi joined the Italian National
Spanning Tree,” The Annals of Applied Probability, vol. 7, no. 2, Research Council, Istituto di Informatica e
pp. 340-361, 1997. Telematica, in Pisa. His research interests include fault diagnosis in
[24] M.D. Penrose, “On k-Connectivity for a Geometric Random multiprocessors and safety-critical systems (during the PhD studies), the
Graph,” Random Structures and Algorithms. vol. 15, no. 2, pp. 145- study of structural properties of wireless ad hoc networks (such as
164, 1999. connectivity, mobility modeling, topology control), and combinatorial
[25] T.K. Philips, S.S. Panwar, and A.N. Tantawi, “Connectivity auctions. Dr. Santi is a member of ACM and SIGMOBILE.
Properties of a Packet Radio Network Model,” IEEE Trans.
Information Theory, vol. 35, no. 5, pp. 1044-1047, 1989. Douglas M. Blough received the BS degree in
[26] P. Piret, “On the Connectivity of Radio Networks,” IEEE Trans. electrical engineering and the MS and PhD
Information Theory, vol. 37, no. 5, pp. 1490-1492, 1991. degrees in computer science from The Johns
[27] G.J. Pottie and W.J. Kaiser, “Wireless Integrated Network Hopkins University, Baltimore, Maryland, in
Sensors,” Comm. ACM, vol. 43, no. 5, pp. 51-58, May 2000. 1984, 1986, and 1988, respectively. Since the
[28] R. Ramanathan and R. Rosales-Hain, “Topology Control of Fall of 1999, he has been a professor of
Multihop Wireless Networks Using Transmit Power Adjustment,” electrical and computer engineering at the
Proc. IEEE Infocom ’00, pp. 404-413, 2000. Georgia Institute of Technology, where he also
[29] V. Rodoplu and T.H. Meng, “Minimum Energy Mobile Wireless holds a joint appointment in the College of
Networks,” IEEE J. Selected Areas in Comm., vol. 17, no. 8, pp. 1333- Computing. From 1988 to 1999, he was a faculty
1344, 1999. member in the Electrical and Computer Engineering Department at the
[30] P. Santi and D.M. Blough, “An Evaluation of Connectivity in University of California, Irvine. Dr. Blough was program co-chair for the
Mobile Wireless Ad Hoc Networks,” Proc. Int’l Conf. Dependable 2000 International Conference on Dependable Systems and Networks
Systems and Networks (DSN ’02), pp. 89-98, 2002. (DSN) and the 1995 Pacific Rim International Symposium on Fault-
[31] P. Santi, D.M. Blough, and F. Vainstein, “A Probabilistic Analysis Tolerant Systems. He has been on the program committees of
for the Range Assignment Problem in Ad Hoc Networks,” Proc. numerous other conferences, was an associate editor for IEEE
ACM MobiHoc ’01, pp. 212-220, 2001. Transactions on Computers from 1995 through 2000 and is currently
[32] L. Schwiebert, S.K.S. Gupta, and J. Weinmann, “Research an associate editor for IEEE Transactions on Parallel and Distributed
Challenges in Wireless Networks of Biomedical Sensors,” Proc. Systems. His research interests include dependability of distributed
ACM Mobicom ’01, pp. 151-165, 2001. systems, evaluation of ad hoc networks, and sensor networks.
[33] A. Sen and M.L. Huson, “A New Model for Scheduling Packet
Radio Networks,” Proc. IEEE Infocom ’96, pp. 1116-1124, 1996.
[34] M.B. Srivastava, R. Muntz, and M. Potkonjak, “Smart Kindergar-
ten: Sensor-Based Wireless Networks for Smart Developmental . For more information on this or any computing topic, please visit
Problem-Solving Environments,” Proc. ACM Mobicom ’01, pp. 132- our Digital Library at http://computer.org/publications/dlib.
138, 2001.
[35] D.C. Steere, A. Baptista, D. McNamee, C. Pu, and J. Walpole,
“Research Challenges in Environmental Observation and Fore-
casting Systems,” Proc. ACM Mobicom ’00, pp. 292-299, 2000.
[36] Y. Xu, J. Heidemann, and D. Estrin, “Geography-Informed Energy
Conservation for Ad Hoc Routing,” Proc. ACM Mobicom ’01,
pp. 70-84, 2001.