期刊文献+

近似2-连通k-支配容错虚拟主干网

Approximating 2-Connected k-Dominating Fault-Tolerant Virtual Backbone
下载PDF
导出
摘要 由于无线网络存在节点失效、链路断裂等特性,虚拟主干网需要具备一定的容错性。利用2-连通k-支配集作为容错虚拟主干网的模型。通过分析单位圆盘图中极大独立集的性质和连通图的块-割点树结构,首次设计出在无线自组织网络中构造2-连通k-支配虚拟主干网的近似算法。从理论上分析了该算法的时间复杂度,并证明了该算法的近似比为常数。 Because of the inherent node (link) failures in wireless networks, virtual backbones should be fault-tolerant. Fault- tolerant virtual backbones were modeled as 2-connected k-dominating sets. An approximation algorithm was designed to find a 2- connected k-dominating virtual backbone in wireless ad-hoc networks by analyzing the properties of maximal independent sets in unit disk graphs and the block-cutvertex tree structure of connected graphs. The time complexity and the performance ratio of the algorithm were analyzed and proved to be a constant, respectively.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第3期421-425,共5页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 国家高技术研究发展计划专项经费(2006AA01Z456) 国家重点基础研究发展计划项目(2009CB320505)资助
关键词 2-连通k-支配集 近似算法 无线自组织网络 虚拟主干网 2-connected k-dominating set approximation algorithm wireless ad-hoc network virtual backbone
  • 相关文献

参考文献11

  • 1许力,林志伟.基于图着色的无线自组网极小连通支配集算法[J].通信学报,2007,28(3):108-114. 被引量:17
  • 2Clark B N, Colbourn C J, Johnson D S. Unit disk graphs. Discrete Mathematics, 1990, 86:165-177
  • 3Liehtenstein D. Planar formulae and their uses. SIAM Journal on Computing, 1982, 11(2): 329-343
  • 4Marathe M V, Breu H, Hunt Ⅲ H B, et al. Simple heuristics for unit disk graphs. Networks, 1995, 25 : 59-68
  • 5Hunt Ⅲ H B, Marathe M V, Radhakrishnan V, et al. NC-approximation schemes for NP- and PSPACE-hard problems for geometric graphs. Journal of Algorithms, 1998, 26(2) : 238-274
  • 6Cheng X, Huang X, Li D, et al. A polynomial time approximation scheme for the minimum connected dominating set in ad hoc wireless networks. Networks, 2003, 42(2): 202-208
  • 7Dai F, Wu J. On constructing k-connected k-dominating set in wireless networks // Proceeding of 19^th IEEE International Parallel and Distributed Processing Symposium (IPDPS). Denver Colorado: IEEE Computer Society, 2005: 81a
  • 8Wang F, Thai M T, Du D Z. 2-connected virtual backbone in wireless networks. IEEE Transactions on wireless Communications (in Press)
  • 9Bollobas B. Modern graph theory. New York: Springer, 1998 : 74-75
  • 10Min M, Wang F, Du D Z, et al. A reliable virtual backbone scheme in mobile ad hoc networks//Proceeding of 1^st IEEE International Conference on Mobile Ad-hoc and Sensor Systems ( MASS), Fort Lauderdale, Florida : IEEE Computer Society, 2004 : 60-69

二级参考文献18

  • 1许力,张继东,郑宝玉,杨震.移动自组网能量保护策略研究进展[J].通信学报,2004,25(9):93-103. 被引量:16
  • 2殷剑宏 吴开亚.图论及其算法[M].合肥:中国科学技术大学出版社,2004.152.
  • 3RAM R,JASON R.A brief overview of mobile ad hoc networks:challenges and directions[J].IEEE Communications Magazines.2002,40(5):20-23.
  • 4GUPTA P,KUMAR P R.The capacity of wireless networks[J].IEEE Transactions on Information Theory,2000,IT-46(2):388-404.
  • 5CORSON S,MACKER J.Mobile ad hoc networking (MANET):routing protocol performance issues and evaluation considerations[EB/OL].RFC 2501,http://www.ietf.org/rfc/rfc2501.txt,1999.
  • 6ALZOUBI K M.Virtual Backbone in Wireless Ad hoc Networks[D].Illinois Institute of Technology,Chicago,USA.2004.
  • 7XU K X,GERLA M.A heterogeneous routing protocol based on a new stable clustering scheme[A].MILCOM-IEEE Military Communications Conference[C].Anaheim,2002.838-843.
  • 8BAKER D,EPHREMIDES A,FLYNN J A.The design and simulation of a mobile radio network with distributed control[J].IEEE Journal on Selected Areas in Communications,1984,SAC-2(1):226-237.
  • 9GUHA S,KHULLER S.Approximation algorithms for connected dominating sets[A].Proceedings of the Fourth Annual European Symposium on Algorithms[C].Barcelona,Spain,1996.179-193.
  • 10DAS B,BHARGHAVAN V.Routing in ad-hoc networks using minimum connected dominating sets[A].IEEE International Conference on Communications (ICC'97)[C].Monréal,Québec,Canada,1997.1-20.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部