skip to main content
10.1145/1080810.1080816acmconferencesArticle/Chapter ViewAbstractPublication PagesdialmConference Proceedingsconference-collections
Article

Minimizing interference in ad hoc and sensor networks

Published:02 September 2005Publication History

ABSTRACT

Reducing interference is one of the main challenges in wireless communication, and particularly in ad hoc networks. The amount of interference experienced by a node v corresponds to the number of other nodes whose transmission range covers v. At the cost of communication links being dropped, interference can be reduced by decreasing the node's transmission power. In this paper, we study the problem of minimizing the average interference while still maintaining desired network properties, such as connectivity, point-to-point connections, or multicast trees. In particular, we present a greedy algorithm that computes an O(log n) approximation to the interference problem with connectivity requirement, where n is the number of nodes in the network. We then show the algorithm to be asymptotically optimal by proving a corresponding Ω(log n) lower bound that holds even in a more restricted interference model. Finally, we show how the algorithm can be generalized towards solving the interference problem for network properties that can be formulated as a 0-1 proper function.

References

  1. P. Bose, P. Morin, I. Stojmenovic and J. Urrutia. Routing with Guaranteed Delivery in Ad Hoc Wireless Networks. In Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM), pages 48--55, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Burkhart, P. von Rickenbach, R. Wattenhofer, and A. Zollinger. Does Topology Control Reduce Interference. In Proc. of the 5th ACM Int. Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Calinescu, S. Kapoor, A. Olshevsky, and A. Zelikovsky. Network Lifetime and Power Assignment in Ad Hoc Wireless Networks. In Proceedings of 11th European Symposium on Algorithms (ESA), pages 114--126, 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  4. I. Caragiannis, C. Kaklamanis, and P. Kanellopolous. Energy-Efficient Wireless Network Design. To appear in Theory of Computing Systems, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Chlebåk and J. Chlebåková. Approximation Hardness of Dominating Set Problems. In Proceedings of 12th European Symposium on Algorithms (ESA), pages 192--203, 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  6. U. Feige. A Threshold of ln n for Approximating Set Cover. Journal of the ACM, 45(4):634--652, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Fussen, R. Wattenhofer, and A. Zollinger. Interference Arises at the Receiver. In Proceedings of Int. Conference on Wireless Networks, Communications, and Mobile Computing (WIRELESSCOM), 2005.]]Google ScholarGoogle ScholarCross RefCross Ref
  8. M. X. Goemans and D. P. Williamson. A General Approximation Technique for Constrained Forest Problems. SIAM Journal of Computing, 24(2):296--317, 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Jia, R. Rajaraman, and C. Scheideler. On Local Algorithms for Topology Control and Routing in Ad Hoc Networks. In Proc. 15th Symposium on Parallel Algorithms and Architectures (SPAA), pages 220--229, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Klein and R. Ravi. A Nearly Best-Possible Approximation Algorithm for Node-Weighted Steiner Trees. Journal of Algorithms, 19(1):104--115, 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. T. Leighton and S. Rao. An Approximate Max-Flow Min-Cut Theorem for Uniform Multicommodity Flow Problems with Applications to Approximation Algorithms. In Proceedings of the 29th IEEE Symposium on the Foundations of Computer Science (FOCS), pages 422--431, 1988.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Li, J. Y. Halpern, P. Bahl, Y.-M. Wang, and R. Wattenhofer. Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-Hop Networks. In Proc. 20th Symp. on Principles of Distributed Computing (PODC), pages 264--273, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Li, J. Hou, and L. Sha. Design and Analysis of an MST-based Topology Control Algorithm. In Proceedings of INFOCOM, pages 1702--1712, 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  14. X.-Y. Li, G. Calinescu, and P.-J. Wan. Distributed Construction of Planar Spanner and Routing for Ad Hoc Networks. In Proceedings of INFOCOM, 2002.]]Google ScholarGoogle Scholar
  15. C. Lund and M. Yannakakis. On the Hardness of Approximating Minimization Problems. Journal of the ACM, 41(5).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Moaveni-Nejad and X. Y. Li. Low-Interference Topology Control for Wireless Ad Hoc Networks. In Proceedings of the 2nd IEEE Conference on Sensor and Ad Hoc Communications and Networks (SECON), 2005.]]Google ScholarGoogle Scholar
  17. R. Ramanathan and R. Hain. Topology Control of Multihop Wireless Networks using Transmit Power Adjustment. In Proceedings of INFOCOM, pages 404--413, 2000.]]Google ScholarGoogle ScholarCross RefCross Ref
  18. P. von Rickenbach, S. Schmid, R. Wattenhofer, and A. Zollinger. A Robust Interference Model for Wireless Ad Hoc Networks. In Proc. 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad-Hoc and Sensor Networks (WMAN), 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Minimizing interference in ad hoc and sensor networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            DIALM-POMC '05: Proceedings of the 2005 joint workshop on Foundations of mobile computing
            September 2005
            120 pages
            ISBN:1595930922
            DOI:10.1145/1080810

            Copyright © 2005 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 September 2005

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate21of68submissions,31%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader