• No results found

On clustering in ad hoc networks

N/A
N/A
Protected

Academic year: 2022

Share "On clustering in ad hoc networks"

Copied!
4
0
0

Loading.... (view fulltext now)

Full text

(1)

On Clustering in Ad Hoc Networks

Tomas Johansson and Lenka Carr-Motyˇ ckov´ a Division of Computer Science and Networking

Lule˚ a University of Technology August 17, 2003

Abstract

This paper presents the reasons for clustering al- gorithms in ad hoc networks, as well as a short survey of the basic ideas and priorities of existing clustering algorithms. A new algorithm is pre- sented. It makes it possible to define a limit for the maximum size of the clusters as well as the maximum number of hops between a node and its clusterhead.

1 Introduction

A wireless ad hoc network consists of nodes that move freely and communicate with each other us- ing wireless links. Ad-hoc networks do not use spe- cialized routers for path discovery and traffic rout- ing. One way to support efficient communication between nodes is to develop a wireless backbone architecture; this means that certain nodes must be selected to form the backbone. Over time, the backbone must change to reflect the changes in the network topology as nodes move around. The al- gorithm that selects the members of the backbone should naturally be fast, but also should require as little communication between nodes as possible, since mobile nodes are often powered by batter- ies. One way to solve this problem is to group the nodes into clusters, where one node in each cluster functions as clusterhead, responsible for routing.

The paper is organized as follows. Section 2 covers some related work on clustering algorithms.

Section 3 presents the new clustering algorithm.

Finally, section 4 concludes with some directions for possible future work.

2 Related Work

Recent work in clustering for wireless networks be- gan with the work of Gerla and Tzu-Chieh Tsai [4]. In the algorithms, all nodes start out as clus- terheads. In the first version of the algorithm, if a node hears from a clusterhead with a lower ID than itself, it resigns and uses that node as a clus- terhead instead. The other version is exactly the same, except that the degree of the nodes (the number of neighbors each node has) is used in- stead of ID. Since the degree of a node changes with movements in the network, the clusterheads are not likely to stay clusterheads for very long.

On the other hand, using the Lowest-ID algo- rithm, the nodes with a low ID stay clusterheads most of the time. This is an unfair distribution, that could lead to some nodes losing power pre- maturely. Alan D. Amis and Ravi Prakash [5]

present additions to these clustering mechanisms that helps avoid cluster head exhaustion by pro- viding ”virtual IDs” to the nodes.

When all clusters have a radius of size one, all nodes are directly connected to their cluster- head. The advantage with this approach is that the nodes that are neither clusterheads nor gate- ways can sleep, and fetch messages stored in the clusterhead at any time, since they have a direct connection to the clusterhead. The disadvantage is that the clusters are limited in size. An algo- rithm that makes it possible to choose a radius larger than 1 is presented in [2].

In [7], the priority is to create clusters of size be- tween k and 2k−1. The distributed algorithm first creates a rooted spanning tree covering the entire network. The cluster formation is run bottom-up, where subtrees are made into clusters that fit the size requirements. There is no real limit on the ra- dius of the clusters, in theory the diameter is O(k).

1

(2)

Unlimited radius can result in problems depend- ing on the application. But if the highest priority is constant cluster sizes, this algorithm is the only one that guarantees the property.

In [6], another algorithm presents a cluster structure that is, with high probability, a con- stant approximation of the optimal solution. In this case, optimal cluster structure is the one that uses the lowest number of clusters to cover the net- work at this time. A. Bruce McDonald and Taieb Znati present an algorithm that forms clusters of nodes that have sufficient probability to stay con- nected during a specific time interval [8].

3 New Algorithm

3.1 Objectives

The objectives when designing the clustering al- gorithm were the following:

1. The algorithm must be distributed, since ev- ery node in the network only has local knowl- edge.

2. The algorithm should scale well as the size of the network increases. Existing cluster- ing algorithms that construct clusters where a node always is directly connected to the clusterhead normally have a time complexity of O(1). The Max-Min D-cluster algorithm [2] have a time complexity of O(d), where no node is more than d hops away from the clus- terhead. The algorithm presented in [7], how- ever, has a time complexity of O(|E| + |V |).

The algorithm presented here has a time com- plexity of O(d

2

), where no node is more than d hops away from the clusterhead. Since d is likely to be very small (probably no more than 3), this is an acceptable complexity.

3. The created clusters should be reasonably effi- cient, that is, the selected clusterheads should cover a large number of nodes. If the cluster- ing structure becomes too complex (too many clusters), the number of messages needed to maintain the routing structure would cause congestion in the network. Since the algo- rithm presented in this paper makes it pos- sible to create clusters with a radius larger than 1, it is possible to create relatively large clusters. At the same time, there should be a mechanism to prevent the clusters from grow- ing too large. If the clusters grow too large,

the load on the clusterhead, that is responsi- ble for the routing inside the cluster, becomes too large. The Max-Min D-cluster algorithm [2] creates clusters with a given radius, but there is no way to limit the maximum cluster size. On the other hand, using the algorithm presented in [7], it is not possible to limit the radius for the clusters.

4. A maintenance function should be used to split large clusters and direct new nodes to join existing clusters. Most existing cluster- ing algorithms creates new clustering struc- tures from scratch after a specified time in- terval. The algorithm presented in [7] per- forms maintenance until the clustering struc- ture has degraded, that is, until the number of clusters has grown too large. The goal for the work presented in this paper is to present a clustering algorithm that does not have to rely on reclustering at all. This is because the maintenance part of the clustering algorithm should require less communication overhead.

3.2 Description of Algorithm

• Each node declares itself a clusterhead.

• Each node broadcasts the list of nodes that it can hear, that is, the set of nodes that are within the communication range of the orig- inal node. If a node A hears from a node B with a higher number of neighbors than it- self, node A sends a message to B requesting to join B’s cluster. If B already has resigned as a clusterhead itself, B returns a rejection, otherwise B returns a confirmation. When A receives the confirmation, A resigns as a clus- terhead. Another possibility is that the clus- ter with node B as clusterhead has already reached maximum size. In this case, all re- quests are automatically met with rejection.

If the cluster would be allowed to grow too large, the clusterhead’s power supply would soon be depleted since the routing would take too much resources.

• When the previous step is completed, the en-

tire network is divided into a number of clus-

ters. Each node belongs to exactly one clus-

ter, and a node is either a clusterhead or di-

rectly connected to one. The next step is that

every cluster broadcasts its size to all neigh-

boring nodes. If a node receives a message

2

(3)

from a cluster that has a larger size than the cluster it currently belongs to, it joins the new cluster instead. It sends notifications to both the new and the old cluster to update them about its new status. This assumes that the larger cluster has not reached the maximum size yet. The notifications first go to the clus- terheads, and are then propagated to the en- tire cluster. This process can be repeated sev- eral times, depending on what the maximum cluster diameter is considered to be in this case. Each node keeps track of the id of its clusterhead, the first step in the path to its clusterhead, the distance to the clusterhead, the time the node has been a member of its current cluster, as well as the number of nodes in the cluster. A clusterhead also keeps track of the time each node in its cluster has been a member of that cluster.

• It is possible for a cluster to grow too large.

Consider a situation when a cluster is just below the maximum allowed size, and sev- eral nodes join simultaneously. Eventually, the clusterhead will be notified of all the new nodes. Since the size of the cluster ex- ceeds the maximum allowed size, one or sev- eral nodes need to be disconnected from the cluster. Based on the assumption that some nodes move in groups, the nodes that have been members of the cluster for a long time are the nodes that are most likely to stay in the vicinity of the clusterhead. This means that the nodes that have been with the clus- ter for the shortest amount of time should be the first to leave the cluster when it grows too large.

• A node can leave a cluster, either because the situation described above, or because it is moving away from the cluster. Even if it loses contact with the node that is the first step to the clusterhead, it might still be able to con- nect to another node in the cluster. However, if the node is more than d hops away from the clusterhead, it must leave that cluster. When a node leaves a cluster, it tries to find another cluster to connect to. That cluster must be smaller than the maximum allowed size, and the node cannot be more than d hops away from the clusterhead. If several such clusters are found, the node joins the largest one. If no

such cluster is found, the node forms a cluster with itself as clusterhead and only member.

3.3 Correctness of algorithm 3.3.1 Each node belongs to a cluster In the first step of the algorithm, all nodes de- clare themselves clusterhead, and they belong to their own cluster. A node may leave its cluster for two reasons. If it receives a message from a larger cluster, in which case it will belong to the larger cluster instead. The second case is when a node is removed from a cluster because of size restric- tions. In that case it tries to find another cluster to connect to, and if no such cluster is found it creates a new cluster.

3.3.2 The time complexity of the algo- rithm is Θ(d

2

)

The first steps of the algorithm, up to the point where a node is either a clusterhead or directly connected to a clusterhead, takes constant time.

In the following steps, when a node joins a clus- ter, the message needs 2c (where c is the current cluster diameter) hops to propagate through the entire cluster (first to the clusterhead, then to all nodes). When the message has propagated, it is possible to move on to the next step. The total number of jumps performed is 2∗2+2∗3+· · ·+2∗d, which is a geometric series with the value Θ(d

2

).

4 Future work

In order to get more accurate comparison of exist- ing clustering algorithms we intend to implement them in the ns-2 simulator [1]. The simulations will be run for different topologies, sizes of net- work, and various limitations of the cluster struc- ture properties. We plan to use one or several group mobility models described in [3] to get more realistic picture of algorithms’ performance. Prop- erties of our new algorithm will be tested on the simulator and compared with other algorithms de- scribed in this paper. Future work includes analy- sis of routing algorithms for ad hoc networks and a design of a logical (cluster) structure that is opti- mal for the particular routing. Matching routing protocols and optimal topologies under different mobility scenarios for ad hoc networks would be the next step.

3

(4)

References

[1] The network simulator - ns-2. http://www.

isi.edu/nsnam/ns/, 2003.

[2] Amis, A.D, Prakash, R, Vuong, T.H.P., Huynh, D.T. Max-Min D-Cluster Formation in Wireless Ad Hoc Networks Proceedings of IEEE March 2000, pages 32—41

[3] T.Camp, J.Boleng, V.Davies. A Survey of Mo- bility Models for Ad Hoc Network Research.

Wireless Communications and Mobile Com- puting (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Appli- cations 2(5):483—502, 2002

[4] Mario Gerla, Jack Tzu-Chieh Tsai. Multi- cluster, mobile, multimedia radio network.

ACM Baltzer Journal of Wireless Networks 1(3):255—265, October 1995.

[5] A.Amis, R.Prakash. Load-Balancing Clusters in Wireless Ad Hoc Networks. In Proceedings 3rd IEEE Symposium on Application-Specific Systems and Software Engineering Technology, pages 25—32 Mar. 24—25 2000

[6] J.Gao, L.J.Guibas, J.Hershberger, L.Zhang, A.Zhu. Discrete Mobile Centers. In Proc. 17th annual symposium on Computational geome- try (SCG), pages 188—196 ACM Press, 2001.

[7] S.Banerjee, S.Khuller. A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks. Technical Report CS-TR-4103, Uni- versity of Maryland, College Park, February 2000.

[8] A.B.McDonald, T.Znati. A Mobility Based Framework for Adaptive Clustering in Wire- less Ad-Hoc Networks. IEEE Journal in Se- lected Areas in Communications (JSAC), 17 (8):1466—1487, August 1999.

4

References

Related documents

Some fields with a potential to unleash innovation through cluster policies are described in the section “policy gap”, answering the sub research question (chapter 1.4.2.)

Need for better informed policies – number of cluster programs and cluster initiatives growing rapidly - European Cluster Memorandum 4x5 Principles New call in 2008 under CIP:

c) strengthen cluster programs and initiatives d) and forming European-wide programs for transnational cluster interaction. • Many EU initiatives have

Business services promotion Joint purchasing, joint investment.

Specifi c recommendations are made on how cluster policy can improve cluster dynamics, on how fundamentals can be changed to make the emergence of strong clusters more likely, and

measurements is enlarged in figure 6a. The resistance of the device is changing rapidly at this time leading to changing values of V H and V Channel at zero field. At the

Privata aktörer ska finnas på marknaden för att kunna ge människor möjlighet till att kunna göra ett aktivt val, detta för att individen handlingsfrihet och valfrihet är

There are some main contributing factors so far, such as design, brand, technological innovation, resources ( fabric, labor including skilled workers), through the analysis of