requirements of complexity, running time, stability,
and overhead have been proposed. Notice that
finding a minimum-sized dominating set is NP-hard.
Wu et al’s work (Wu, 2002) proposes a
completely localized algorithm to construct CDS in
general graphs. A node having two unconnected
neighbours is chosen as a dominating node. They
also present two pruning rules to minimize the
number of dominating nodes.
In a weakly CDS (WCDS), the vertex set is
partitioned into a set of cluster-heads and cluster
members, such that each cluster member is within
radio range of at least one cluster-head. Chen et al
(Chen, 2002) propose approximation algorithms for
computing a small WCDS. Blum et el (Blum, 2004)
gives performance comparison for distributed CDS
construction algorithms in lately proposed methods.
A CARCODS
(Cho, 2005)
tries to minimize
reconstruction
of CDS by delaying neighbour set
advertisement message broadcast in proportion to
residual energy, mobility and the number of
neighbour nodes.
3 A PARTIAL TOPOLOGY
RECONSTRUCTION
3.1 CDS Maintenance Algorithm
An ad-hoc network can be modeled as a graph G =
(V, E), where V is the set of vertices (nodes) and E
the set of edges (links) which represents the
available communication. If a node v is a physical
neighbor of a node u, then there exists an edge (u, v).
That means v is within the communication range R
of a u and thus receives its messages.
}),(|),{(
2
RvudVvuE
(1)
),( vud
is the Euclidean distance between nodes u
and v. We define the neighbor set N (u) of a node u
as:
}),(|{)( EvuuvVvuN
(2)
Then, we will explain our proposed algorithm in a
stepwise execution style by taking an illustrative
example as shown in Figure 2. Let
c
n be the faulty
node. In Figure 2, there are four dominating nodes
{2, 5, 7, 9}. Assume that the current battery level of
the node 5 is under a given threshold. Notice that
without loss of generality we assume that an initial
CDS construction is built. Thus our proposed
method is applied after initial CDS construction.
STEP 1: Check the Coverage of a Faulty Node.
Node 5 is
c
n and it informs its neighbor dominating
nodes {2, 7}. Since
)5(N
were covered with {2, 7},
there are no more nodes to be covered by them
(Figure 2 (b)).
(5, )
(5) (2) (5) (7) (5)
{2,3,4,7,8}{3,4}{8}{2,7}
jEd
NN NN N j
(3)
Where,
d
E is the set of edges which belong to the
CDS.
STEP 2: Find an Alternative Node to maintain
the Connectivity among the Existing Dominating
Nodes. For the one-hop neighbor dominating nodes
{2, 7} for
c
n , search process begins to see whether
there is an alternative node or not to find a possible
routing path to connect them. There is no alternative
path.
}9,8{}4,3,1{)7()2( NN
(4)
Then by extending to the 2-hop neighbors of
c
n ,
search process continues to find an alternative node.
The set of neighbor nodes of node 2 represent the 2-
hop neighbors of
c
n . Notice that one of them can be
connected to the dominating node 9 (Figure. 2 (c)).
Ej
NjN
),2(
}9{}9,8{}9,6,4,2{)7()(
(5)
We can do perform the search process for the set of
neighbor nodes of node 7, instead of node 2,
(7, )
(2) ( ) {1, 3, 4} {4, 7, 8, 9,10,11} {4}
kE
NNk
(6)
If the process fails for the above cases, search
process continues for the set of neighbor nodes of
)2(N
and
)7(N
.
EkEj
kNjN
),7(),2(
)()(
(7)
STEP 3: Select the Alternative Node. If there is
more than one node to choose, the priority of node i
can be calculated by the following equation.
iii
NDELP
(8)
where,
i
EL
and
i
ND
is the current energy level and
the node degree of node i, respectively. In addition,
both
and
indicates the weighting factors.
WINSYS 2011 - International Conference on Wireless Information Networks and Systems
66