22

tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

Power Assignment For Symmetri Communi ation InWireless Sensor Networks �Joongseok Park Sartaj SahniComputer & Information S ien e & EngineeringUniversity of Floridafjpark, sahnig� ise.u .eduFebruary 12, 2007Abstra tWe show that two in remental power heuristi s for power assignment in a wireless sen-sor network have approximation ratio 2. Enhan ements to these heuristi s are proposed.It is shown that these enhan ements do not redu e the approximation ratio of the onsid-ered in remental power heuristi s. However, experiments ondu ted by us indi ate that theproposed enhan ements, redu e the power ost of the assignment on average. Further, thetwo-edge swit h enhan ement yields a power- ost redu tion (relative to using minimum ostspanning trees) that is, on average, twi e as mu h as obtainable from any of the heuristi sproposed earlier.Keywords: Power assignment, symmetri onne tivity, wireless sensor networks, ap-proximation algorithm.1 Introdu tionWe onsider the problem of assigning power levels to the sensors in a wireless sensor network sothat the total power assigned is minimum and the ommuni ation graph of the sensor network hasa path omposed solely of bidire tional edges1. between every pair of sensors. We assume thatthe sensors are battery operated and are deployed in an environment in whi h it is impra ti al (orat least undesirable) to re harge/repla e the battery of a sensor (e.g., in a battle �eld or at the�This resear h was supported, in part, by the National S ien e Foundation under grant ITR-03261551When a dire ted graph ontains the dire ted edges (u; v) and (v; u), we say that (u; v) is bidire tional. Abidire tional edge may be modeled as an undire ted edge. Hen e, we use the terms bidire tional and undire tedinter hangeably. 1

Page 2: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

bottom of an o ean). Hen e, energy onservation is paramount. Although sensors use energy tosense as well as to ommuni ate among themselves, our fo us here is on the onservation of energyspent in ommuni ation a tivities. Depending on the appli ation, inter sensor ommuni ation maybe modeled as a uni ast, multi ast or broad ast.We assume the omnidire tional antenna model in whi h the n-sensor wireless network is rep-resented as a omplete weighted dire ted graph G that has n verti es/nodes (we use the termssensor, vertex and node inter hangeably). Ea h node of G represents a sensor of the wirelessnetwork. The weight w(i; j) of the dire ted edge (i; j) is the minimum power level at whi h sensori must transmit if its message is to be re eived by sensor j. Using an omnidire tional antenna,sensor i an transmit to sensors j1; j2; � � � ; jk, by setting its power level tomaxfw(i; jq)j1 � q � kgIn the most ommon model used for power attenuation in wireless broad ast, signal powerattenuates at the rate a=rd, where a is a media dependent onstant, r is the distan e from thesignal sour e, and d is another onstant between 2 and 4 [22℄. So, for this model, w(i; j) = w(j; i) = � r(i; j)d, where r(i; j) is the Eu lidean distan e between nodes i and j and is a onstant. Inpra ti e, however, this ni e relationship between w(i; j) and r(i; j) may not apply. This may, forexample, be due to obstru tions between the nodes that may ause the attenuation to be largerthan predi ted. Also, the transmission properties of the media may be asymmetri resulting inw(i; j) 6= w(j; i). When w(i; j) 6= w(j; i) for some (i; j), we say that the power requirements areasymmetri . When w(i; j) = w(j; i) for all i and j, the power requirements are symmetri .In an e�ort to onserve energy, ea h sensor u adjusts its power level to a value p(u) su hthat the power ost p(G) =Pu p(u) is minimum and the subgraph H of G formed by (dire ted)edges (u; v) su h that w(u; v) � p(u) is strongly onne ted. The resultant subgraph is alled aminimum power strongly onne ted topology. Note that with the set power levels, sensor u an doa single-hop transmission to every sensor v for whi h (u; v) is an edge of H. Sin e H is strongly onne ted, every sensor an ommuni ate with every other sensor using a multi-hop transmission.Figure 1(a) shows a network with 5 sensors A through E. Ea h ir le represents the transmissionrange of the sensor at its enter given this sensor's urrent power level. The example 5-sensornetwork may be represented by a 5-vertex omplete digraph with w(i; j) being the minimum p(i)2

Page 3: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

needed to transmit from i to j. Figure 1(b) shows the subgraph H of this omplete digraphwith the property that for every edge (u; v) in H, p(u) � w(u; v). Noti e that while sensor E an do a single-hop transmission to sensor D, sensor D annot do a similar transmission to E.This is be ause p(E) � w(E;D) = w(D;E) > p(D). Although H is strongly onne ted, it isasymmetri ((E;D) is an edge of H but (D;E) is not). This asymmetry in the onne tivity of Hposes a problem in appli ations where the single-hop transmission proto ol requires the re eiverto send an a knowledgment to its one-hop neighbor who sent the message. So, while D an re eivefrom E, in Figure 1(b), D annot send a one-hop a knowledgment of this re eipt ba k to E. Toover ome this problem, we require thatH ontain a spanning onne ted subgraph omprised solelyof bidire tional edges. By using only the edges in this spanning onne ted subgraph, all single-hop transmissions an be a knowledged by the re eiver. Figure 1( ) shows a onne ted spanningsubgraph of Figure 1(b) that is omprised solely of bidire tional edges. The bidire tional edgesare shown as undire ted edges in this �gure.

(a)

(b)

(c)

C

A

B

D

E

C

A

B

D

E

C

A

B

D

E

Figure 1: The onne tivity model (ea h node has the di�erent transmission power level): (a) Sen-sors and their transmission rages (b) An asymmetri ommuni ation graph and ( ) A symmetri subgraph of (b)A formal statement of the problem we study in this paper is given below.Minimum Power Symmetri Conne tivity Problem (MPSC)Input: A omplete weighted undire ted graph G.3

Page 4: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

Output: A power assignment p() to the verti es of G so that the power ost p(G) = Pu p(u)is minimum and the subgraph of G omprised of bidire tional (undire ted) edges (u; v)su h that p(u) � w(u; v) and p(v) � w(u; v) (equivalently, minfp(u); p(v)g � w(u; v)) is a onne ted spanning subgraph of G.In Se tion 2, we review prior resear h related to the MPSC problem. In Se tion 3, we provethat the in remental power heuristi s of [17, 4℄ have an approximation ratio of 2 mat hing theapproximation ratio of the MST (minimum spanning tree) heuristi of [3, 19, 4, 10℄. Enhan ementsof these heuristi s as well as to the MST heuristi are presented in Se tion 4. In Se tion 5, wepresent experimental results that show that our re�nements result in improved performan e.2 Related WorkThe minimum energy broad ast tree problem (MEBT) is related to MPSC. In MEBT, we areto assign power levels to the nodes of G so that Pu p(u) is minimum and the graph omprisedof dire ted edges (u; v) su h that p(u) � w(u; v) ontains a dire ted tree, whi h is rooted at aspe i�ed sour e node s and whi h in ludes all verti es of G. MEBT is NP-hard, be ause it is ageneralization of the onne ted dominating set problem, whi h is known to be NP-hard [8℄. In fa t,MEBT annot be approximated in polynomial time within a fa tor (1� �)�, where � is any smallpositive onstant and � is the maximal degree of a vertex, unless NP � DTIME[nO(log log n)℄ [9℄.Clementi et al. [6℄ show that MEBT is NP-hard when edge weights equal the Eu lidean distan ebetween the nodes (sensors). Wieselthier et al. [15, 16℄ onsider the ase when w(i; j) = �rd. Theydevelop a fast MEBT algorithm for the ase of networks that have 3 nodes (a sour e broad astingto 2 other nodes). For larger networks, they propose a re ursive algorithm that \makes morethan 51,000 alls" when there are 10 destination nodes. Sin e the proposed re ursive algorithmis impra ti al for large networks, several heuristi s are proposed. Four of the proposed heuristi sare greedy heuristi s that s ale well as the network size in reases. Wan et al. [14℄ provide atheoreti al analysis of the performan e of three of the greedy heuristi s proposed in [15, 16℄.They show that two of the proposed heuristi s (link-based minimum spanning tree and broad astin remental power) have onstant approximation ratios and a third (shortest path spanning tree)has an approximation ratio that is at least n=2 (these approximation ratios are for the ase4

Page 5: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

w(i; j) = � rd).Let MPAC be the MPSC problem with the relaxation that the subgraph of G de�ned by theassigned power levels ontain a strongly onne ted spanning subgraph. So it is possible that (u; v)is in the subgraph (p(u) � w(u; v)) and (v; u) is not in the subgraph (p(v) < w(v; u) = w(u; v)).Chen and Huang [3℄ have shown that MPAC is NP-hard for general graphs. The proof of [3℄applies also to MPSC. An approximation algorithm that is based on minimum ost spanningtrees and that has approximation ratio 2 also is developed in [3℄. This approximation algorithmappears to have been redis overed many times by several resear hers [19, 4, 10℄. Kirousis et al. [10℄show that MPAC is NP-hard when the edge weights are equal to distan es in 3-dimensional spa e(E3) and Clementi et al. [7℄ prove this for distan es in 2-dimensional spa e (E2).Calines u et al. [19℄ show that for a given G, the total power in the optimal solution for MPAC an be half that for the optimal solution for MPSC when the distan es are in E2. They developalso two approximation algorithms for MPSC. One is a fully polynomial time approximations heme whose approximation ratio is 1 + ln 2 + � and the other is a greedy algorithm whoseapproximation ratio is 15/8. Althaus et al. [17℄ establish lower approximation ratios of 5=3+� and11/6, respe tively, for the two approximation algorithms of [19℄. An integer linear programmingformulation for MPSC is developed in [17℄. Using this formulation, MPSC instan es with upto 40 sensors an be solved in about 1 hour of time on a 600MHz PC. [17℄ asserts that the5=3 + � algorithm isn't pra ti al and that the 11/6 algorithm, whi h is known as the greedy fork ontra tion algorithm, doesn't perform as well on real data as an extended minimum spanningtree algorithm EFS (edge and fork swit hing) that begins with a minimum ost spanning tree anditeratively redu es the power ost of this spanning tree. In ea h iteration, EFS �nds the maximumredu tion in power possible by swit hing a tree edge and a non-tree edge as well as by swit hinga fork (two non-tree edges that share a vertex) and two tree edges. The swit h must leave behinda spanning tree. If the maximum redu tion is positive, the swit h is made and we pro eed to thenext iteration. Otherwise, EFS terminates. [17℄ also shows that approximation of MPSC withasymmetri power requirements, is NP-hard for any approximation ratio (1 � �) lnn, where n isthe number of nodes and � > 0 is any onstant. Cheng et al. [4℄ show that MPSC is NP-hardwith edge weights equal to distan es in E2. They propose an in remental power greedy heuristi 5

Page 6: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

for MPSC and demonstrate experimentally that this greedy heuristi performs better than theMST-based heuristi whose approximation ratio is 2.3 Analysis of In remental Power Heuristi sTwo in remental power heuristi s have been proposed to onstru t minimal energy/power broad- ast trees [17, 4, 5, 15, 16℄. Both heuristi s are suitable for the MEBT and MPSC problems.We des ribe these two heuristi s in the ontext of the MPSC problem. Con eptually, the twoheuristi s are identi al to the well known Kruskal and Prim algorithms to onstru t minimum ost spanning trees [12℄. In both heuristi s we onstru t a spanning tree of the given graph Gby starting with TE = ; and adding edges to TE, one at a time, until TE be omes a spanningtree of G. At any time in the tree onstru tion, the urrent power level for ea h vertex u ismaxfw(u; v)j(u; v) 2 TEg. The next edge for in lusion into TE is the one that in reases the sumof power levels the least and that reates no y le in TE. When the spanning tree onstru tion is omplete, the p(u)s are su h that the onstru ted spanning tree is a subgraph of the ommuni a-tion graph of G de�ned by the power levels p(�). Hen e, these power levels give us a solution toMPSC. Let IPK be the heuristi that results when edge sele tion is done using Kruskal's strategyand IPP be the one that results when Prim's strategy is used.Figures 2 and 3 spe ify the IPK and IPP heuristi s. Let p(TE) be the sum of the p(u)s. Foredges eligible for sele tion in ea h iteration of the for loop, (u; v) gives the in remental ost ofadding (u; v) to TE. All referen es to ost in these heuristi s is to (�; �). It is easy to see thatfollowing ea h iteration of the for loop, p(u) = maxfw(u; v)j(u; v) 2 TEg. The resemblan e toKruskal's and Prim's minimum ost spanning tree algorithms is evident.Figure 4 shows an example for IPP . Figure 4(a) shows the sensor network with edge weightsequal to the transmission power needed. The number outside a vertex is its urrent p() value.The weight for ea h missing edge is 1. Figure 4(b) shows the initial edge osts (twi e the edgeweights) and the initial TV (shaded vertex). This is the on�guration at the start of the �rstiteration of the for loop. Ea h Gi, i < 8 gives the edge osts, p(), TV (shaded verti es) and TE(solid edges) at the start of the ith iteration of the for loop. G8 gives the �nal values.Theorem 1 IPK and IPP have approximation ratio 2 for MPSC.6

Page 7: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

Heuristi IPK(G) fStep 1: [Initialize℄TE = ;;p(u) = 0; 1 � u � n; (u; v) = 2 � w(u; v); for all (u; v) in G;Step 2: [Constru t spanning tree℄for i = 1 to n� 1 do fLet (u; v) 62 TE be a least ost edge su h that TE [ f(u; v)g is a y li .TE = TE [ f(u; v)g;p(v) = maxfp(v); w(u; v)g;p(u) = maxfp(u); w(u; v)g; (x; y) = maxf0; w(x; y)� p(x)g +maxf0; w(x; y)� p(y)g for x 2 fu; vg;gg Figure 2: IPK heuristi for MPSCHeuristi IPP (G) fStep 1: [Initialize℄TV = f1g;TE = ;;p(u) = 0; 1 � u � n; (u; v) = 2 � w(u; v); for all (u; v) in G;Step 2: [Constru t spanning tree℄for i = 1 to n� 1 do fLet (u; v) be a least- ost edge su h that u 2 TV and v 62 TV .TV = TV [ fvg;TE = TE [ f(u; v)g;p(v) = w(u; v);p(u) = maxfp(u); w(u; v)g; (x; y) = w(x; y) + maxf0; w(x; y)� p(x)g for all x 2 fu; vg and y 62 TV ;gg Figure 3: IPP heuristi for MPSC7

Page 8: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

(0)

4

13

15

12

2

10

2

2 (0)

(0)

(0)

(0) (0)

(0)

(0)

(a) G (0)

8

26

30

24

4

20

4

4

(0)

(0)

(0)

(0) (0)

(0)

(0)

(b) G1 (0)

26

30

24

2

16

4

4

(4)

(4)

(0)

(0) (0)

(0)

(0)

( ) G2(0)

26

30

22

16

4

2

(4)

(4)

(2)

(0) (0)

(0)

(0)

(d) G3 (0)

26

30

22

16

4

(4)

(4)

(2)

(2) (0)

(0)

(0)

(e) G4 (0)

16

30

22

2

(4)

(10)

(2)

(2) (0)

(0)

(10)

(f) G5(0)

16

30

22

(4)

(10)

(2)

(2) (0)

(2)

(10)

(g) G6 (13)

17

22

(4)

(10)

(2)

(2) (0)

(2)

(13)

(h) G7 (15)

17

22

(4)

(10)

(2)

(2) (15)

(2)

(13)

(i) G8Figure 4: Example for IPPProof Consider either IPK or IPP (the proof is identi al for both). Let Gi be an undire ted omplete n-vertex graph in whi h the edge osts are the (�; �) values at the start of the ithiteration of the for loop. Let Gn be this graph at the end of the last iteration of the for loop andlet TEi be TE at the start of the ith iteration of the for loop. Note thatG1 has (u; v) = 2�w(u; v),where w(u; v) is the power need to transmit from u to v (equivalently, from v to u) and TE1 = ;.Let (Gi) be the ost of the minimum ost spanning tree for Gi subje t to the onstraint that thespanning tree ontain all edges in TEi. In omputing (Gi), the ost of an edge (u; v) 2 TEi is8

Page 9: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

its ost at the time it was sele ted for in lusion in TE and the ost of an edge (u; v) 62 TEi is its urrent (u; v) value. Note that (Gn) is the sum of p(�) values when the heuristi terminates.This is so as, TEn is a spanning tree and the sum of edge osts, where the ost of an edge is its (�; �) value at the time it was added to TE is the sum of the in remental power osts, whi h isthe sum of the �nal p(�) values.From the orre tness proof of Kruskal's and Prim's algorithms (see [12℄, for example), it followsthat the edge sele ted for in lusion in TE in iteration i of the for loop is in the ( onstrained)minimum spanning tree of Gi. This together with the observation that the ost of edges eligiblefor sele tion in remaining iterations is no more in Gi+1 than in Gi implies that (Gi+1) � (Gi).Hen e, (Gn) � (G1).Note that (G1) = 2w(MST ), where MST is the minimum ost spanning tree for G1 andw(MST ) is the sum of weights (w(�; �), not (�; �) values) of the edges in MST . In [3, 19, 10℄,it is shown that w(MST ) < p(OPT ), where OPT is an optimal power assignment and p(OPT )is the sum of the power levels in OPT . So, we have (Gn) � (G1) = 2w(MST ) < 2p(OPT )Sin e (Gn) is the sum of the power levels when the heuristi terminates, the heuristi hasapproximation ratio 2.Theorem 2 The bound of Theorem 1 is tight.Proof Figure 5(a) shows a sensor network. The edges show the permissible one-hop transmis-sions together with the required transmission power. Note that the weight assignments do not orrespond to ideal E2 distan es. As noted in Se tion 1, the ideal situation almost never arises inpra ti e be ause of media heterogeneity. Using the symmetri ommuni ation graph (whi h is aspanning tree of Figure 5(a)) of Figure 5(b) results in an optimal power assignment. In this powerassignment, the power level of ea h node on the top row is set to � and that for ea h node on thebottom row is set to 1. If the total number of nodes is 2n (n in ea h row of nodes), the ost of theoptimal power assignment is n(1 + �). Using a suitable tie breaker, both IPK and IPP onstru tthe spanning tree shown in Figure 5( ). This spanning tree orresponds to a power assignment9

Page 10: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

of � to ea h node on the lower row; the assignment for the top row (left to right) is 1, 1:5� �=2,1:75� 3�=4, 1:875� 7�=8, � � �. The ost of this power assignment is1 + (n� 1)(2� �)� (1� �) n�1Xi=1 1=2i � (1� �)=2n�1= 2n� 1 + �� (1� �)[1=2n�1 + n�1Xi=1 1=2i℄As n gets large, the ratio of the ost of the IPK and IPP power assignment to the optimal oneapproa hes 2=(1 + �), whi h approa hes 2 as � be omes small.1 1.5−ε/2 1.75−3ε/4 1.875−7ε/8

1 1 1 1

ε ε ε ε ε(a) The sensor network 1 1 1 1

ε ε ε ε ε(b) Optimal power assignment1 1.5−ε/2 1.75−3ε/4 1.875−7ε/8

ε ε ε ε ε( ) Assignment by IPK and IPPFigure 5: Example for Theorem 2Theorem 3 Let p(IPK) and p(IPP ), respe tively, be the sum of the power assignments obtainedby IPK and IPP . Let p(MST ) be this quantity for the minimum ost spanning tree. 0:5 �p(X)=p(MST ) � 2 for X 2 fIPK; IPPg. Also, these bounds are tight.Proof [3, 4, 10℄ show that p(MST ) � 2p(OPT ), where OPT is the optimal power assignment.From this and Theorem 1, it follows thatp(OPT ) � p(MST ) � 2p(OPT )p(OPT ) � p(X) � 2p(OPT )So, 0:5 � p(X)=p(MST ) � 2.To see that these bounds are tight, onsider the sensor network of Figure 5(a). Using a suitabletie breaker, the minimum ost spanning tree produ ed by Kruskal's and Prim's algorithm is that10

Page 11: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

shown in Figure 6(a). It's power ost is n(1 + �) + 1� �, where n is the number of verti es in thetop row. The spanning tree generated by X is shown in Figure 5( ). Its power ost approa hes2(n+ 1)� 2 as n!1. So, as n gets large, p(X)=p(MST ) approa hes 2.Now onsider the network of Figure 6(b). Figure 6( ) shows a possible minimum ost spanningtree obtained by Kruskal's and Prim's algorithm. This results in assigning a power level of 2 to allverti es ex ept 2. So, p(MST ) is 4n� 4 + 2�. Heuristi X, with a suitable tie breaker, produ esthe spanning tree shown in Figure 6(d). This results in a power assignment of � to ea h top-rowvertex and 2 to ea h bottom-row vertex. So, p(X) = n(2+ �). By hoosing n and � appropriately,p(X)=p(MST ) an be made as lose to 0.5 as desired.(a) MST for Figure 5(a) (b) A network( ) MST for Figure 6(b) (d) Spanning tree by IPK and IPPFigure 6: Example for Theorem 3

4 Enhan ementsIn this se tion, we des ribe three strategies to redu e the ost p(T ) of the spanning tree T .Although these strategies do not redu e the approximation ratio of the MST , IPK and IPPheuristi s, they result in spanning trees that have lower p(T ) value on average.4.1 Sweep MethodPerforming a sweep to improve the quality of a spanning tree has been done in the past in the ontext of the MEBT problem [15, 16, 11℄. We propose an adaptation of this method to theMPSC problem. The sweep method of [15, 16, 11℄ isn't dire tly appli able to MPSC be ausein MEBT we are dealing with asymmetri ommuni ation while in MPSC, we have symmetri 11

Page 12: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

Step 1: Let v be the nearest not yet tried non- hild des endent of u that an be rea hed usingu's urrent power level p(u) (i.e., p(u) � w(u; v)).Step 2: If there is no su h v, the visit terminates.Step 3: Move v together with its subtrees so that v is a hild of u. Let T 0 be the new tree.Step 4: Set p(v) = maxfw(v; x)jx is a parent or hild of vg.Step 5: Let y be the former parent of v.Set p(y) = maxfw(y; x)jx is a parent or hild of yg.Step 6: If p(T 0) < p(T ) then set T = T 0.Step 7: Go to Step 1. Figure 7: Visiting a node u during a sweep ommuni ation. In a sweep, we start by sele ting a vertex v of the spanning tree T as the treeroot. Following this sele tion, hild-parent relationships are uniquely determined. We performa level-order traversal [12℄ of T beginning at the root v. When a node u is visited during thistraversal, we perform the steps shown in Figure 7.As an example, onsider the tree T of Figure 8(a). Let u be the root, A, of this tree. Supposethat p(A) � w(A;D). So, D is sele ted as vertex v in Step 1. To get T 0, we move D togetherwith its subtrees so that D be omes a hild of A. This gives us T 0 as shown in Figure 8(b).When the power levels are adjusted as in Steps 4 and 5, symmetri ommuni ation using T 0 ispossible. If p(T 0) < p(T ), we ontinue with T 0 as the working tree. Otherwise, we ontinue withT . Regardless, during the urrent visit, D annot again be sele ted as the v vertex in Step 1. Foran n-vertex spanning tree, the omplexity of the visit operation is O(n). In a sweep, ea h vertexis visited on e. So, the omplexity of a sweep is O(n2).4.2 Single Edge Swit h (ES1a and ES1b)Figures 9 and 10 give the edge swit hing heuristi s ES1a and ES1b. In heuristi ES1a, the edgef is an edge on the unique y le in T [ (u; v). In parti ular, f may be (u; v). To determine thepower of T � ffg we need to �rst adjust the power level of the nodes u, v and the end points off so that these nodes have the minimum power needed to do a single-hop transmission to their12

Page 13: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

A

D

C B

(a) T , u = A, v = D

A

B C D

(b) T 0Figure 8: The sweep methodtree neighbors. Note that sin e (u; v) is a andidate for f , the minimum power of T � ffg is nomore than that of the tree at the start of the for loop iteration. In ES1b, f is an edge that joinsthe two onne ted omponents of T � f(u; v)g. In parti ular, f ould be (u; v). On e again to ompute the power of T [ ffg, the power level of the nodes u, v and the end points of f need tobe adjusted as in the ase of ES1a.F = edges not in T ;for ea h edge (u; v) 2 F doT = T [ f(u; v)g;Let f be su h that T � ffg is a spanning treewith minimum total power;T = T � ffg; Figure 9: Heuristi ES1aFigure 11 shows an example for one iteration of the for loop of ES1a. Figure 11(a) shows thetree T at the start of the iteration. The numbers outside a node (e.g., (58) outside v1) give thepower level of the node. The power ost of this tree is 336. Numbers outside edges are edgeweights. (u; v) = (v4; v7) is added to T . This results in the y le v4; v7; v1; v6; v4. The hoi es for13

Page 14: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

F = edges in T ;for ea h edge (u; v) 2 F doT = T � f(u; v)g;Let f be su h that T [ ffg is a spanning treewith minimum total power;T = T [ ffg; Figure 10: Heuristi ES1bV1 V6 V4 V3

V2

V7

1 1 100

10

58

V5

(58) (1) (100) (100)

(10)

(58) (9)

9

edge weight

V4->V6 1 V4->V1 4 V4->V2 18 V4->V7 74 V4->V3 100 V4->V5 103

Neighbor information of node V4

(a) Initial treeV1 V6 V4 V3

V2

V7

1 1 100

10

58

V5

(58) (1) (100) (100)

(10)

(58) ->(74) (9)

9

(58)->(10)

74

(b) (v4; v7) addedV1 V6 V4 V3

V2

V7

1 1 100

10

V5

(10) (1) (100) (100)

(10)

(74) (9)

9

74

( ) (v1; v7) removedFigure 11: One iteration of the for loop of ES1af are (v4; v7), (v7; v1), (v1; v6) and (v6; v4). f = (v1; v7) results in p(v1) redu ing from 58 to 10and p(v7) in reasing from 58 to 74. The remaining power levels are un hanged. The net redu tionin tree power is 32. No other hoi e of f gives a larger redu tion. So, we hoose f = (v1; v7)and the new T is as shown in Figure 11( ). This ompletes one iteration of the for loop. In thisiteration, p(T ) was redu ed from 336 to 304.Figure 12 shows a single iteration of the for loop of ES1b. (u; v) = (v1; v7) 2 T for thisiteration. The edge f that re onne ts T �f(u; v)g and results in minimum total power is (v4; v7).The result of swit hing edges (v1; v7) and (v4; v7) is a redu tion of 32 in tree power.14

Page 15: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

V1 V6 V4 V3

V2

V7

1 1 100

10

58

V5

(58) (1) (100) (100)

(10)

(58) (9)

9 (a) Initial treeV1 V6 V4 V3

V2

V7

1 1 100

10

V5

(1) (100) (100)

(10)

(58) ->(9) (9)

9

(58)->(10)

(b) (v4; v7) addedV1 V6 V4 V3

V2

V7

1 1 100

10

V5

(10) (1) (100) (100)

(10)

(74) (9)

9

74

( ) (v1; v7) removedFigure 12: One iteration of the for loop of ES1bES1b, whi h is the edge swit hing heuristi of [20℄, is simpler than the ES heuristi of [17℄.Let (e1; e2) be a pair of edges su h that e1 is in the tree and e2 is not. This edge pair de�nes alegal swap i� deleting e1 from the tree and adding e2 results in a spanning tree. In ea h iterationof ES, an edge pair that de�nes a legal swap that results in a min power ost spanning tree isdetermined. If the edge swap redu es power ost, the swap is made and we pro eed to the nextiteration. Otherwise, the algorithm terminates.Let e be the total number of edges. The omplexity of both ES1a and ES1b is O(n2e).4.3 Double Edge Swit h (ES2)Double edge swit hing is like ES. However, in ea h iteration we �nd 4 edges (e1; e2; e3; e4) su hthat the �rst 2 are in the tree and the last 2 are not. The 4 edges de�ne a legal swap i� repla ingthe �rst two by the last two results in a spanning tree. As before, a legal swap that results inthe minimum power ost spanning tree is determined. The swap is done i� it results in a powerredu tion. The pro ess ontinues until no further redu tion in power ost is obtainable by a legal15

Page 16: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

swap. We note that ES2 generalizes the two-edge swit hing used in the EFS heuristi of [17℄. InEFS, the edges e3 and e4 are required to form a fork (i.e., the two edges must share a vertex).The omplexity of ES2 is O(n3e2).We on lude this se tion by proving our earlier laim that none of the proposed enhan ementmethods redu es the approximation ratio of either IPK or IPP .Theorem 4 The approximation ratios of IPK and IPP remain 2 when these heuristi s areenhan ed by any or all of the methods sweep, single edge swit h and double edge swit h.Proof Follows from Theorem 2 and the observation that none of the stated methods is able toredu e power ost when started with the IPK and IPP spanning tree of Figure 5( ).5 Experimental ResultsTheMST , IPK and IPP heuristi s together with their enhan ements were programmed in C++and their relative performan e ompared using random graphs. MST was used as the ben hmarkheuristi for omparison purposes. Our random graphs were generated in a manner similar to thatused in [17℄ to generate test graphs. We experimented with networks that have n 2 f10; 50; 100gnodes. For ea h n, we generated 50 random graphs. Ea h random graph was generated byrandomly assigning the n nodes to points in a 10000�10000 grid. We omputed w(i; j) = r(i; j)d,where r(i; j) is the Eu lidean distan e between nodes i and j, and d was set to 2.Figure 13(a) gives the average per ent redu tion in power ost realized using either IPK orIPP over the power ost resulting from MST . This average redu tion in power ost is between2% and 3%. Also, IPP results in better power assignments than obtained by IPK.Figure 13(b) gives the average per ent redu tion in power ost realized by the sweep enhan e-ment of MST (MSTSW ), IPK (IPKSW ) and IPP (IPPSW ) over the power ost resultingfrom MST and Figures 13( ){(e), respe tively, do this for the ES1a, ES1b and ES2 enhan ementsof MST , IPK and IPP . Figures 15 and 16 give this average power- ost redu tion data togetherwith the minimum and maximum power- ost redu tions and the standard deviations for the asesn = 50 and 100, respe tively. Figure 14 shows the average power ost of the generated power16

Page 17: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

assignments. This �gure has separate bar harts for ea h of MST , IPK and IPP together withtheir enhan ements.As an be seen from the provided data, the sweep enhan ements of MST , IPK and IPP ,on average, result in a redu tion in power ost between 3.9% and 5% relative to the power ostfrom MST . The ES1a and ES1b enhan ements are about equally e�e tive and both are superiorto the sweep enhan ement. These enhan ements improve upon the MST power ost by between5.2% and 5.7%. However, the greatest power- ost redu tions relative to MST ome when ES2is employed. Now, the average redu tion ranges from 12.5% to 14.2%. The maximum redu tionobserved on our test data was 24.5%. Note that sin e the approximation ratio for MST is 2, aredu tion more than 50% isn't possible.Our experimental results are onsistent with those reported in [17℄; single-edge swit h redu esthe power- ost of MST by between 5% and 6%. Although the best heuristi s of [17℄ are ableto improve upon MST by at most about 6.5% (on average), our ES2 enhan ement provides animprovement that is twi e as mu h! Also, with the ES2 enhan ement, IPK generally did betterthan MST and IPP .6 Con lusionWe have shown that the approximation ratio for both IPP and IPK is 2. Further, none of theenhan ements{sweep, ES1a, ES1b, ES2{redu e this approximation ratio. Our experiments showthat the ES2 enhan ement, on average, yields a power- ost redu tion (relative to MST) by abouttwi e as mu h as obtained by the best heuristi s proposed in [17℄.Referen es[1℄ Arindam K. Das and Robert J. Marks and Mohammed El-Sharkawi, \Minimum power broad- ast trees for wireless networks," IEEE International Symposium on Cir uits and Systems,May 2002.[2℄ O. Ege ioglu and T. Gonzalez, \Minimum-energy broad ast in simple graph with limitednode power," IASTED International Conferen e on Parallel and Distributed Computing and17

Page 18: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

1

1.5

2

2.5

3

3.5

10 50 100

number of sensors

per

cen

t im

pro

vem

ent

ove

r M

ST

IPP

IPK

(a) Basi heuristi 2

2.5

3

3.5

4

4.5

5

5.5

10 50 100

number of sensors

per

cen

t im

pro

vem

ent

ove

r M

ST

MST_SW

IPK_SW

IPP_SW

(b) With sweep3.5

4

4.5

5

5.5

6

10 50 100

number of sensors

per

cen

t im

pro

vem

ent

ove

r M

ST

MST_ES1a

IPK_ES1a

IPP_ES1a

( ) With ES1a 4

4.2

4.4

4.6

4.8

5

5.2

5.4

5.6

10 50 100

number of sensors

per

cen

t im

pro

vem

ent

ove

r M

ST

MST_ES1b

IPK_ES1b

IPP_ES1b

(d) With ES1b4.0

6.0

8.0

10.0

12.0

14.0

16.0

10 50 100

number of sensors

per

cen

t im

pro

vem

ent

ove

r M

ST

MST_ES2

IPK_ES2

IPP_ES2

(e) With ES2Figure 13: Average per ent improvement over MST18

Page 19: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

50

55

60

65

70

75

80

85

90

95

100

10 50 100

number of sensors

aver

age

ener

gy

exp

end

itu

re(1

0e+6

) MST

MST_SW

MST_ES1a

MST_ES1b

MST_ES2

(a) MST 60

65

70

75

80

85

90

95

10 50 100

number of sensors

aver

age

ener

gy

exp

end

itu

re(1

0e+6

) IPK

IPK_SW

IPK_ES1a

IPK_ES1b

IPK_ES2

(b) IPK60

65

70

75

80

85

90

95

10 50 100

number of sensors

aver

age

ener

gy

exp

end

itu

re(1

0e+6

) IPP

IPP_SW

IPP_ES1a

IPP_ES1b

IPP_ES2

( ) IPPFigure 14: Average power ostSystems, vol. 30, no. 4, pp. 334{338, August 2001.[3℄ W. Chen and N. Huang, The strongly onne ting problem on multihop pa ket radio networks,IEEE Trans. on Comm., 3, 293{295, 1989.[4℄ X. Cheng, B. Narahari, R. Simha, M. Cheng, and D. Liu, Strong minimum energy topol-ogy in wireless sensor networks: NP- ompleteness and heuristi s, IEEE Trans. on MobileComputing, 2, 3, 2003, 248{256.[5℄ T. Chu and I. Nikolaidas, Energy eÆ ient broad ast in mobile ad ho networks, AD-Ho Networks and Wireless, 2002. 19

Page 20: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

MST SW MST ES1a MST ES1b MST ES2Avg Imp(%) 4.01 5.20 5.24 12.56Min Imp(%) 0.39 0.03 1.79 2.55Max Imp(%) 8.26 8.26 9.35 20.78Std Dev(%) 2.04 2.93 2.27 5.20IPK SW IPK ES1a IPK ES1b IPK ES2Avg Imp(%) 4.86 5.44 5.55 13.80Min Imp(%) -1.02 1.73 1.79 2.90Max Imp(%) 10.06 12.32 12.42 21.63Std Dev(%) 2.51 3.23 2.44 5.41IPP SW IPP ES1a IPP ES1b IPP ES2Avg Imp(%) 4.94 5.54 5.46 12.71Min Imp(%) -0.18 1.75 1.79 2.82Max Imp(%) 10.57 12.16 12.16 23.27Std Dev Imp(%) 3.36 2.47 2.39 5.60Figure 15: Per ent power- ost redu tion over MST for n = 50MST SW MST ES1a MST ES1b MST ES2Avg Imp(%) 3.92 5.16 5.19 14.20Min Imp(%) 0.54 2.44 1.31 3.24Max Imp(%) 8.26 8.26 9.35 23.89Std Dev(%) 1.32 1.63 1.83 4.43IPK SW IPK ES1a IPK ES1b IPK ES2Avg Imp(%) 4.86 5.68 5.51 14.23Min Imp(%) 1.85 2.84 1.31 3.75Max Imp(%) 7.44 10.88 10.87 24.52Std Dev Imp(%) 1.87 1.95 1.78 4.75IPP SW IPP ES1a IPP ES1b IPP ES2Avg Imp(%) 5.01 5.69 5.43 14.21Min Imp(%) -0.10 2.14 2.77 2.38Max Imp(%) 7.64 10.57 12.16 23.27Std Dev Imp(%) 1.88 1.80 1.86 4.41Figure 16: Per ent power- ost redu tion over MST for n = 10020

Page 21: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

[6℄ A. Clementi, P. Cres enzi, P. Penna, G. Rossi, and P. Vo a, On the omplexity of omputingminimum energy onsumption broad ast subgraphs. Symp. on Theo. Aspe ts of Comp. S i.,2001, 121{131.[7℄ A. Clementi, P. Penna, and R. Silvestri, On the power assignment problem in radio networks.Ele troni Colloquium on Computational Complexity, 054, 2000.[8℄ M. Garey and D. Johnson, Computers and intra tability: A guide to the theory of NP- ompleteness, W. H. Freeman and Co., 1979.[9℄ Sudipto Guha and Samir Khuller, Approximation algorithms for onne ted dominating sets,Fourth Annual European Symposium on Algorithms, 1996.[10℄ L. Kirousis, E. Kranakis, D. Krizan , and A. Pel , Power onsumption in pa ket radio net-works. Theo. Comp. S i., 243, 289{305, 2000.[11℄ J. Park and S. Sahni, Maximum lifetime broad asting in wireless networks, IEEE Trans. onComputers, 2005.[12℄ S. Sahni, Data stru tures, algorithms, and appli ations in Java, Se ond Edition, Sili on Press,NJ, 2005.[13℄ S. Singh and C. Raghavendra and J. Stepanek, \Power-aware broad asting in mobile ad ho networks," IEEE PIMRC'99, Sep. 1999, Japan.[14℄ P. Wan and G. Calines u and X. Li and O. Frieder, \Minimum energy broad ast routing instati ad ho wireless networks," IEEE INFOCOM, 2001.[15℄ J. Wieselthier and G. Nguyen and A. Ephremides, \On the onstru tion of energy-eÆ ientbroad asting and multi ast trees in wireless networks," IEEE INFOCOM, 2000.[16℄ J. Wieselthier, G. Nguyen, Algorithm for energy-eÆ ient multi asting in stati ad ho wirelessnetworks, Mobile Networks and Appli ations, 2001, 251-261.[17℄ E. Althaus and G. Calinesu and I.I. Mandoiu and S. Prasad and N. T hervenski and A. Ze-likovsky, \Power eÆ ient range assignment in ad-ho wireless networks," In pro eedings21

Page 22: tosahni/papers/symmetric.pdfMEBT cannot b e appro ximated in p olynomial time within a factor (1 ), where is an y small p ositiv e constan t and is the maximal degree of a v ertex,

of IEEE Wireless Communi ations and Networking Conferen e (WCNC'03), pp. 1889{1894,2003.[18℄ D.M. Bolugh and M. Leon ini and G. Resta and P. Santi, \On symmetri range assignmentproblem in wireless ad ho networks," TCS 2002, pp. 71{82, 2002.[19℄ G. Calines u and I.I. Mandoiu and A.Z. Zelikovsky, \Symmetri onne tivity with minimumpower onsumption in radio networks," TCS 2002, pp. 119{130, 2002.[20℄ G. Calines u and I.I. Mandoiu and A.Z. Zelikovsky, Powerpoint presentation.\Symmetri onne tivity with minimum power onsumption in radio networks," TCS 2002,pp. 119{130, 2002.[21℄ R. Ramanathan and R. Rosales, \Topology ontrol of multihop wireless networks usingtransmit power adjustment," IEEE INFOCOM, 2000.[22℄ T. Rappaport, Wireless ommuni ations: Prin iples and pra ti es, Prenti e Hall, 1996.[23℄ X. Cheng and B. Narahari and R. Simha and D. Liu, \Strong minimum energy topology inwireless sensor networks: NP- ompleteness and heuristi s," IEEE Transa tions on MobileComputing, vol. 2, no. 3, 2003.

22