Vous êtes sur la page 1sur 12

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO.

4, APRIL 2010 479

An Edge-Constrained Localized Delaunay


Graph for Geographic Routing in
Mobile Ad Hoc and Sensor Networks
Yan Sun, Qiangfeng Jiang, and Mukesh Singhal, Fellow, IEEE

Abstract—In mobile ad hoc and sensor networks, since all nodes are mobile and there is no fixed infrastructure, the design of routing
protocols becomes one of the most challenging issues. In recent years, geographic routing protocols have been widely used. Most of
them, e.g., greedy-face-greedy routing protocols, need nodes to construct planar graphs as the underlying graphs. In this paper, we
propose an Edge Constrained Localized Delaunay graph, denoted by ECLDel, as the underlying graph for geographic routing. We
prove that the ECLDel is a planar t-spanner of the unit-disk graph. Geographic routing on ECLDel is as efficient as on the previous
work of PLDel in terms of path length (hop count). However, the construction of ECLDel graph is far more simple and it converges
faster. This is due to the following two reasons: First, we significantly reduce the number of messages broadcast by each node from
five rounds (each round may contain several messages) to only two messages; second, we define two new types of edges, the
Intersecting Gabriel (IG) edges and the Unaware Intersection (UI) edges, which are constrained in the ECLDel graph. These edges
help significantly reduce the size of messages broadcast by each node. The decrease of both the number and the size of messages
broadcast by each node reduces the communication cost, and saves the network bandwidth and node power, which are desirable for
mobile ad hoc and sensor networks. Our simulation results show that the average number of messages and the average size of
messages broadcast by each node are, respectively, 65 and 42 percent less in the construction of ECLDel than that in PLDel.

Index Terms—Mobile ad hoc and sensor networks, geographic routing, unit-disk graph, planar, t-spanner, Delaunay triangulation.

1 INTRODUCTION

I N recent years, with the


widespread emergence of wireless
devices, such as PDAs and sensors, which need wireless
communication, mobile ad hoc, and sensor networks have
topology-based routing protocols, message flooding in the
network is typically needed for a node to get the routing
information to other nodes. This makes topology-based
been widely used. Mobile ad hoc and sensor networks routing protocols less scalable and undesirable for mobile
consist of mobile nodes, which have the following properties: ad hoc and sensor networks with memory and power-
limited nodes.
1. they are wireless and mobile without any fixed In recent years, a variety of position-based (geographic)
structure, routing protocols have been developed, such as Compass
2. they have limited memory and power,
[11], Most Forward within Radius (MFR) [12], GEDIR [13],
3. each node can communicate directly only with
Face-2 [14], GPSR [15], AFR [16], and GOAFRþ [17]. A
nodes in its transmission range, and
survey of geographic routing protocols can be found in
4. each node acts as both an end system and a router.
[18], [19], [20].
When two nodes are not within each other’s transmis- The Global Position System (GPS) and some other
sion range, the communication between them needs multi- positioning services [21], [22] help a mobile node know its
hop routing, which needs the help of other mobile nodes to own location. If nodes broadcast their locations (e.g., in
route packets between them. Since all nodes are mobile and Hello messages) locally, each node will know the location of
there is no fixed infrastructure, the design of routing all its neighbors. In geographic routing, each mobile node
protocols becomes one of the most challenging issues in does not need to maintain routing information that are
mobile ad hoc and sensor networks. achieved by message flooding. Instead, a node only needs
A variety of topology-based routing protocols have been to maintain the location of its neighbors, which is sufficient
developed, such as DSDV [1], WRP [2], AODV [3], DSR [4], for it to select the next hop node for a packet. The low
and CEDAR [5]. A survey of topology-based routing overhead of geographic routing makes it scalable and
protocols can be found in [6], [7], [8], [9], [10]. In attractive for nodes with limited memory and power in
mobile ad hoc and sensor networks. For example, in
. The authors are with the Department of Computer Science, University of recently proposed data-centric storage [23], [24], [25], [26],
Kentucky, James F. Hardymon Building, 301 Rose Street, Lexington, KY [27] for sensor networks, geographic routing protocols like
40506-0495. E-mail: {ysun2, richardj, singhal}@cs.uky.edu. GPSR [15] are used as the underlying routing protocols.
Manuscript received 15 May 2007; revised 15 July 2008; accepted 25 June Geographic routing protocols can be divided into
2009; published online 29 July 2009. heuristic and delivery-guaranteed routing protocols. In
For information on obtaining reprints of this article, please send e-mail to:
tmc@computer.org, and reference IEEECS Log Number TMC-2007-05-0135. heuristic geographic routing protocols, each node forwards
Digital Object Identifier no. 10.1109/TMC.2009.133. a packet for a destination to a next hop node based on some
1536-1233/10/$26.00 ß 2010 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS
Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
480 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 4, APRIL 2010

neighbor that is closer to the destination than it and all its


other neighbors, face routing is used to recover from this
failure. Greedy routing will be used again when it is
possible. Examples of GFG geographic routing protocols are
GPSR [15], AFR [16], and GOAFRþ [17].
Face routing [11], [14] in GFG routing is based on the right-
hand rule [30] and must be applied on a planar graph
without crossing edges to guarantee its correctness. With a
planar graph that is composed of faces (perimeters), face
routing makes each packet traverse along the faces, which
intersect with the line segment from the source to the
Fig. 1. An illustration of heuristic geographic routing protocols. destination, till it reaches the destination. This requires nodes
in the network to construct a planar spanning subgraph of
heuristics. Typical heuristic geographic routing protocols the original unit-disk graph (UDG)1 as the underlying graph
[11], [12], [13], [28] use different heuristics. Fig. 1 helps us for GFG geographic routing.
illustrate them. Node s is a source node or a forwarding Two planar graphs, the Gabriel graph (GG) [31] and the
node of a packet with node d as the destination. The radius relative neighborhood graph (RNG) [32], extracted from UDG,
of the circle centered at node s is the transmission range of are planar spanning subgraphs of UDG and are commonly
node s, so any node in the circle is a neighbor of s, like used as the underlying graphs for geographic routing,
node p, q, m, g, and c in the figure. m0 is the projection of because they can be constructed distributively and easily by
node m on the dotted line sd. each node. For instance, GG is used by Bose et al. [14] and
RNG is used by Karp and Kung [15]. However, GG and
Most Forward within Radius (MFR): Takagi and
1.
Kleinrock proposed the MFR routing protocol [12], RNG are relatively sparse, which results in long routes for
which is considered as the first geographic routing geographic routing on them.
protocol. In MFR, a source or a forwarding node s To improve the efficiency of geographic routing, which
forwards a packet, with node d as the destination, to means to shorten the routes, some denser graphs, e.g.,
one of its neighbors that makes the most progress in planar t-spanners2 of UDG [33], [34], [35], are proposed as
the direction of d. That is, to one of its neighbors the underlying graphs.
whose projection on the line sd is closest to d. In Li et al. [33] propose a planarized localized Delaunay graph
Fig. 1, node s will forward the packet to node m, (PLDel), which is a planar t-spanner of UDG, as the
because the projection of m on line sd, m0 , is closest underlying graph for geographic routing. Their algorithm
to d than the projection of any other neighbors. to construct the PLDel is very complex and converges
2. Greedy routing: Finn proposed a greedy routing slowly, because each node needs to broadcast several
approach [28], in which node s forwards a packet to messages, which results in high communication cost.
one of its neighbors that is closer to destination node In this paper, we propose an Edge Constrained Localized
d than s and any other neighbors of s, and in Fig. 1, it Delaunay graph, ECLDel, as the underlying graph for
is node g. It is easy to see that this kind of next hop geographic routing. The main contributions of our paper
node may not exist all the time, because node s may are as follows:
be closer to node d than all its neighbors. This is
known as the local minimum phenomenon [29]. 1. We prove that the ECLDel is a planar t-spanner of
3. GEographic DIstance Routing (GEDIR): In GEDIR the original unit-disk graph.
[13], node s forwards a packet to one of its neighbors 2. We develop an algorithm to construct the ECLDel
that is closer to destination node d than any other graph, which can be run by each node distributively
neighbors of s, not necessary closer to d than node s with 1-hop neighborhood information.
itself. 3. Compared to the previous work of constructing a
4. Compass routing: In Compass routing [11], node s PLDel, our algorithm to construct the ECLDel is far
forwards a packet destined to node d to one of its more simple and it converges faster. This is due to
neighbors n such that the angle between sn and sd is the following two reasons:
the smallest. In Fig. 1, node c is the next hop node
selected by node s in this strategy. a. We significantly reduce the number of messages
broadcast by each node from five rounds (each
The above heuristic routing protocols may not converge
round may contain several messages) to only
to find a path even though it exists, especially in sparse two messages.
networks. Delivery-guaranteed geographic routing proto-
cols can always find a path if one exists. 1. If all mobile nodes in the network have the same transmission range,
Most delivery-guaranteed geographic routing protocols they construct a UDG because there is an edge incident on two nodes if and
only if the euclidean distance between them is no more than the
combine the greedy and face routing, which are called transmission range.
Greedy-Face-Greedy (GFG) routing protocols [18]. In GFG 2. A graph G0 is a t-spanner of a graph G, if G0 is a spanning subgraph of
G and the shortest path length between any two nodes in G0 is at most
routing protocols, greedy routing is used first, and when t times the shortest path length between the two nodes in G. t is a positive
greedy routing fails, which means a node cannot find a real constant and is called the length stretch factor.

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
SUN ET AL.: AN EDGE-CONSTRAINED LOCALIZED DELAUNAY GRAPH FOR GEOGRAPHIC ROUTING IN MOBILE AD HOC AND SENSOR... 481

b.We define two new types of edges, the Intersect-


ing Gabriel (IG) edges and the Unaware Intersection
(UI) edges, which are constrained in the ECLDel
graph. These edges help significantly reduce the
size of messages broadcast by each node. The
decrease in both the number and the size of
messages broadcast by each node reduces the
communication cost, and saves the network
bandwidth and node power, which is desirable
in mobile ad hoc and sensor networks.
4. Our simulation results show that the communication
cost decided by the average number of messages and
the average size of messages (the number of
neighbor nodes in messages) broadcast by each
node is, respectively, 65 and 42 percent less in the Fig. 2. Decide whether an edge is in the GG graph.
construction of ECLDel than that in PLDel.
The rest of this paper is organized as follows: Section 2 [33], [34], [35], [36] focus on the construction of denser
presents the research motivation. Section 3 introduces graphs, e.g., planar t-spanners of UDG, as the underlying
preliminaries. Section 4 presents the Edge Constrained graphs, which makes the GFG routing much more efficient
Localized Delaunay graph, ECLDel, and proves that it is a with shorter routes.
planar t-spanner of the unit-disk graph. Section 5 describes an Li et al. [33] propose a planar t-spanner of UDG, called a
algorithm to construct an ECLDel graph. Section 6 presents PLDel as the underlying graph for GFG geographic routing,
the simulation results on the performance of geographic which can be constructed by each node distributively. Their
routing on ECLDel and other underlying graphs, and on the algorithm to construct the PLDel is very complex and is not
cost of constructing PLDel and ECLDel. Section 7 describes efficient because each node needs to broadcast several
the related work. Section 8 concludes the paper. messages, which makes their algorithm converge slowly.
This motivates our work in this paper.
In this paper, we develop a more simple and more
2 RESEARCH MOTIVATIONS efficient algorithm to construct a planar t-spanner of UDG for
2.1 Assumptions GFG geographic routing. In our algorithm, we do not attempt
to decrease the asymptotic communication cost, which is
1. Accurate positioning service: We assume that in near optimal in the algorithm to construct a PLDel. However,
mobile ad hoc and sensor networks, each node has a we do significantly decrease the number of messages and the
GPS or other positioning services [21], [22] that can size of messages broadcast by each node in the construction
provide the accurate position of it. If nodes broad- of ECLDel. This results in much less communication cost and
cast their locations, each node will know the accurate makes our algorithm converge faster, which are desirable for
location of all its neighbors. mobile ad hoc and sensor networks.
2. Unit-disk graph: We also assume that all mobile
nodes in the network have the same transmission
3 PRELIMINARIES
range. No obstacles exist between any two nodes
that are in each other’s transmission range, so that Before presenting ECLDel, we need to develop some
they can communicate with each other directly. In background. Let UDG(N, E) denote the unit-disk graph of
this case, mobile nodes in the network construct a the ad hoc or sensor network, where N is the set of all nodes
UDG, because there is an edge between two nodes if in the network and E is the set of all edges in the graph.
Given two nodes a and b, the euclidean distance between
and only if the euclidean distance between them is
them is denoted by jabj.
no more than the transmission range.
3.1 The Gabriel Graph
2.2 Research Motivations
The Gabriel graph [31],3 denoted by GG, is a planar spanning
As a kind of optimal delivery-guaranteed geographic
subgraph of UDG(N, E). It contains an edge ab if ab 2 E and
routing, GFG routing has been developed and has become if the interior of the circle with ab as diameter does not
the main trend in geographic routing. In GFG routing, face contain any other node (called a witness) in N. As shown in
routing is used when greedy routing fails to recover from the Fig. 2, the shaded area is the circle with ab as diameter, in
failure. As we discussed previously, face routing based on which if there is no witness c, then ab will be kept by both a
the right-hand rule [30] must be applied on a planar graph, in and b as an edge in the Gabriel graph.
which no crossing edges exist, to guarantee its correctness.
Therefore, planar spanning subgraphs of the original net-
3.2 Relative Neighborhood Graph
work graph, UDG, must be constructed for GFG routing. The relative neighborhood graph [32],4 denoted by RNG, is also
The GG [31] and RNG [32] are commonly used as the a planar spanning subgraph of UDG(N, E). It contains an
underlying graphs for GFG routing. However, both GG and
3. In the rest of the paper, all Gabriel graphs are extracted from the UDG.
RNG are relatively sparse, which makes GFG routing 4. In the rest of the paper, all relative neighborhood graphs are extracted
inefficient with long routes. Recently, many researchers from the UDG.

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
482 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 4, APRIL 2010

Fig. 3. Decide whether an edge is in the RNG graph.


Fig. 4. An example of Voronoi diagram and Delaunay triangulation.

edge ab if ab 2 E and there is no node (called a witness)


c 2 N such that jacj < jabj and jbcj < jabj. For example, in when k  2, but its construction needs at least 2-hop
Fig. 3, the shaded area is the intersection area of two circles, neighborhood information of each node, which is undesir-
both of which have jabj as their radius and the centers of able. The construction of LDelð1Þ ðNÞ needs 1-hop neighbor-
which are a and b, respectively. If there is no witness c in the hood information, but they showed that it may not be planar.
shaded area, then edge ab will be kept by both a and b as an Li et al. proposed the planarized localized Delaunay graph,
edge in the RNG graph. denoted by PLDel(N), which is a planar t-spanner of
Theffi length stretch factors of GG and RNG are n  1 and
pffiffiffiffiffiffiffiffiffiffiffi UDG(N, E) and can be constructed with 1-hop neighbor-
n  1, respectively [37], where n is the number of nodes in hood information. The algorithm to construct a PLDel(N)
the network. So, GG and RNG are not t-spanner of the contains two parts as follows:
UDG(N, E).
1. Part I:
3.3 Voronoi Diagram and Delaunay Triangulation
The Voronoi region of a node a is a region in which each a. A node, say a, computes the Delaunay triangula-
node is closer to node a than to any other node in N. The tion, Del(N(a)). NðaÞ denotes node a’s 1-hop
Voronoi regions of all nodes in N construct the Voronoi neighbors including itself.
diagram. Delaunay triangulation is the dual of the Voronoi b. For a triangle from the Del(N(a)), say 4abc, if all
diagram, which contains an edge ab if and only if the the three edges have length at most the
Voronoi regions of a and b share a common boundary [38]. transmission range, and angle ff bac   =3,
The Delaunay triangulation, denoted by Del(N), is a planar node a broadcasts a message Proposal(a, b, c).
t-spanner of the completed euclidean graph [39]. Each c. When receiving a message Proposal(a, b, c), a
triangle in the Delaunay triangulation is called a Delaunay node, say a, checks whether 4abc belongs to
triangle, which has an important property that the interior Del(N(a)). If yes, a broadcasts a message
of its circumcircle does not contain any other node in N. Accept(a, b, c). Otherwise, it rejects the proposal
Fig. 4 shows an example of the Voronoi diagram and by broadcasting message Reject(a, b, c).
Delaunay triangulation, where the dotted lines construct d. Node a keeps edges ab and ac as the incident
the Voronoi diagram and the solid lines construct the edges of it if 4abc is in Del(N(a)), and both b and c
Delaunay triangulation. have sent either Accept(a, b, c) or Proposal(a, b, c).
3.4 Planarized Localized Delaunay Graph (PLDel) The graph constructed by this part is the 1-localized
Delaunay graph, LDelð1Þ ðNÞ. Each triangle in the
3.4.1 k-Hop Neighbors
LDelð1Þ ðNÞ is called a 1-localized Delaunay triangle,
Nodes within the transmission range of a node a are called
LDelð1Þ 4. Part II removes the intersections in
1-hop neighbors of a, which can be reached by a directly.
LDelð1Þ ðNÞ.
Nodes that can be reached by node a within (less than or
2. Part II:
equal to) k hops are called k-hop neighbors of a.
a. A node a broadcasts the Gabriel edges incident on
3.4.2 Planarized localized Delaunay Graph
it and broadcasts the triangles of LDelð1Þ ðNÞ
Li et al. [33] proposed a k-localized Delaunay graph, denoted incident on it.
by LDelðkÞ ðNÞ ðk  1Þ, which contains all Gabriel edges and b. For two intersected triangles 4abc and 4def
all k-localized Delaunay triangles.5 known by node a, node a removes the triangle
Li et al. [33] proved that LDelðkÞ ðNÞ ðk  1Þ is a t-spanner 4abc if its circumcircle contains a node from d,
of UDG(N, E). They illustrated that LDelðkÞ ðNÞ is planar e, and f.
c. Node a removes any triangle of LDelð1Þ ðNÞ
5. A triangle is a k-localized Delaunay triangle if the interior of its
circumcircle does not contain any k-hop neighbors of any of its three incident on it that intersects with any Gabriel
vertices. edge it received from other nodes.

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
SUN ET AL.: AN EDGE-CONSTRAINED LOCALIZED DELAUNAY GRAPH FOR GEOGRAPHIC ROUTING IN MOBILE AD HOC AND SENSOR... 483

Fig. 5. e and b are on the same side of o. Fig. 6. A UI edge (dotted lines are with length more than R).

d. Node a broadcasts all triangles incident on it Proof. Let cd intersects with ab at e. Let o be the center of ab.
which it has not removed in the previous steps. Because ab is a Gabriel edge, both c and d are outside ab.
e. Node a keeps the edge ab as the incident edges Let cd intersects with ab at c0 closer to c and d0 closer to d.
of it in PLDel(N) if it is a Gabriel edge, or if there is There are three cases based on the location of e.
a triangle 4abc such that a, b, and c have all Case 1. e and b are on the same side of o, as shown in
announced they have not removed the triangle Fig. 5. Then ffcbd > ffc0 bd0 >  =2. It implies that jbcj <
4abc in steps b and c. jcdj  R and jbdj < jcdj  R. Therefore, b is a common
The above algorithm constructs a PLDel(N) graph. The neighbor of both c and d.
communication cost in the construction is Oðn lg nÞ, where n Case 2. e and a are on the same side of o. Based on the
is the number of nodes in the network. It is easy to see that reasoning as in Case 1, it is easy to see that a is a common
the construction of PLDel(N) is very complex and each node neighbor of both c and d.
needs to broadcast five rounds of messages (each round Case 3. e is exactly on o. Also based on the reasoning
may contain several messages). This makes the algorithm as in Case 1, it is easy to see that both a and b are common
inefficient and it converges slowly. In the following section, neighbors of c and d. Thus, the lemma follows. u
t
we present a much more efficient algorithm to construct a
planar t-spanner of UDG. Corollary 1. Since a node broadcasts all Gabriel edges incident on
it, each node has the knowledge of all IG edges incident on it.
4 EDGE CONSTRAINED LOCALIZED DELAUNAY This is done by a node’s checking whether an edge
GRAPH incident on it intersects with any Gabriel edge broadcast by
In this section, we define two new kinds of edges as the its neighbors.
Constrained edges, which belong to the UDG and are
constrained in the proposed Edge Constrained Localized 4.1.2 Unaware Intersection (UI) edges
Delaunay graph, ECLDel. We also prove that the ECLDel is We define the other new kind of edges, the UI edges. Let
a planar t-spanner of UDG. NðaÞ denote the set of 1-hop neighbors of node a.
4.1 Edges Constrained in ECLDel Definition 2. For a Non-Gabriel edge cd incident on c, if
We define two new kinds of edges, IG edges and UI edges, 9a 2 NðcÞ, b 2 NðcÞ, which makes ab intersect with cd with
which are constrained in the ECLDel. jadj > R and jbdj > R, as shown in Fig. 6, then ab is called a
Before defining the edges, we introduce some notations. UI edge, because neither a nor b knows about the intersection.
The transmission range of each mobile node is denoted by Node c is called a discoverer of the UI edge ab. cd is called a
R. Given any three nodes p, q, and r, the triangle made by
bridge edge for c to discover the UI edge ab.
them is denoted by 4pqr. The circumcircle made by them is
denoted by pqr. pq denotes the circle with diameter pq,
and p denotes the circle with p as the center and R as the Because both a and b are neighbors of the discoverer c, if
radius. The angle (½0; ) between edges pq and pr is denoted c broadcasts ab as a UI edge, then both a and b know that ab
by ffqpr or ffrpq. is a UI edge. In fact, a node discovers very few UI edges, as
discussed next.
4.1.1 Intersecting Gabriel (IG) Edges
Corollary 2. If a node, say c, broadcasts the UI edge, say ab, it
First, we define new kind of edges, the IG edges. discovers, then both a and b know that ab is a UI edge.
Definition 1. Any edge in UDG that intersects with a Gabriel
edge, is called an IG edge. The following Lemma 2, Corollary 3, and Lemma 3 show
Lemma 1. If cd is an IG edge that intersects with a Gabriel characterizations of UI edges, which help explain that the
edge ab, then at least one of a and b is a common neighbor of number of UI edges each node discovers is very few. This
both c and d. results in minor communication cost for each node to

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
484 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 4, APRIL 2010

neighbor of both c and d. This contradicts that neither a


nor b is the neighbor of d. Hence, the lemma follows. t u

4.1.3 Constrained Edges


With the definitions of IG edges and UI edges, we are ready
to introduce Constrained edges.
Definition 3. If an edge is an IG edge or a UI edge (sometimes
an IG edge may also be a UI edge), then it is called a
Constrained edge.

In the rest of this paper, the set of all Constrained edges


that are constrained in the ECLDel is denoted by CE.

4.2 Edge Constrained Localized Delaunay Graph


Fig. 7. Property of a UI edge. With the knowledge of Constrained edges, in this section,
we define the Edge Constrained Localized Delaunay graph,
broadcast the UI edges, which is required in our algorithm ECLDel(N).
to construct the ECLDel that is introduced later.
Definition 4. For any three nodes a, b, and c of N, if the interior
Lemma 2. If c is a p
discoverer
ffiffiffi of a UI edge ab with a bridge edge of abc does not contain any 1-hop neighbor of a, b, or c, and
cd, then jcdj > ð 3=2ÞR. each edge of 4abc has a length no more than R and is not a
Proof. The proof uses Fig. 7. Let the area inside c be denoted Constrained edge (which means each edge of 4abc belongs to
by A1 , and the area inside d be denoted by A2 . Let A3 E  CE), then 4abc is called an Edge Constrained Localized
denote the area that is in A1 but not in A2 , which means Delaunay triangle, denoted by ECLDel4.
A3 ¼ A1  A1 \ A2 , shown as the shaded area in Fig. 7. Definition 5. The Edge Constrained Localized Delaunay graph,
Based on Definition 2, we know jacj  R, jbcj  R, denoted by ECLDel(N), contains all Gabriel edges and all
jadj > R, and jbdj > R, which means both a and b are in edges of ECLDel4.
the area A3 .
Let dotted line l incident on c be the perpendicular to 4.3 ECLDel is a t-Spanner
cd. It intersects with d at f and g. In this section, we prove that the ECLDel is a t-spanner of
Both a and b are in A3 and intersect with cd, so the UDG. Recall that the 2-localized Delaunay graph,
jfgj < jabj  R. This implies pffiffiffi that jcgj ¼ jfgj =2 < R=2. LDelð2Þ ðNÞ, is a planar t-spanner of UDG(N, E) [33]. It
Since jdgj ¼ R, then jcdj > ð 3=2ÞR. u
t contains all Gabriel edges and all 2-localized Delaunay
Corollary 3. If c is a discoverer of a UI edge ab with a bridge edge triangles.6 By proving that it is a subgraph of ECLDel(N),
cd, and as in Fig. 7, line l separates the area A3 to three we prove that ECLDel(N) is a t-spanner of UDG(N, E).
subareas, A4 , A5 , and A6 , which means A3 ¼ A4 [ A5 [ A6 , Lemma 5. Each edge of a 2-localized Delaunay triangle is not an
then at least one of a and b is in the area A5 [ A6 . IG edge.
Proof. ab intersects with cd, so a and b cannot be both in A4 . Proof. LDelð2Þ ðNÞ contains all Gabriel edges and is planar, so
Since both a and b are in A3 , and A3 ¼ A4 [ A5 [ A6 , the it does not contain any IG edge. The lemma follows. t u
corollary follows. u
t
Lemma 6. Each edge of a 2-localized Delaunay triangle is not a
Lemma 3. If c is a discoverer of a UI edge ab with a bridge edge UI edge.
cd, then ffacb > 2 =3.
Proof. Suppose there is a 2-localized Delaunay triangle 4abc
Proof. Based on Definition 2, we know that jbcj  R, with a UI edge ab. Assume that node e is a discoverer of
jbdj > R, and jcdj  R, as shown in Fig. 6, so jbdj > jbcj UI edge ab by a bridge edge ed. Based on Definition 2,
and jbdj > jcdj. This implies that ffbcd >  =3. For the both a and b are 1-hop neighbors of e and ab intersects
same reason, ffacd >  =3. Therefore, ffacb ¼ ffacd þ with edge ed with jadj > R and jbdj > R. This implies d is
ffbcd > 2 =3. u
t a 2-hop neighbor of a and b. Note that e is a 1-hop
neighbor and also a 2-hop neighbor of a and b.7 Since
Lemma 2, Corollary 3, and Lemma 3 imply that the 4abc satisfies that abc does not contain any 2-hop
number of UI edges each node can discover is very few. Our
neighbor of a, b, or c, both e and d are outside abc. Let
simulations show that the UI edges each node discovers is
ed intersects with abc at e0 closer to e and d0 closer to d.
0.12 on the average, which generates very small commu-
Let o be the center of abc. There are two cases based on
nication cost for the broadcast of UI edges.
the location of ed.
Lemma 4. If an edge ab is a UI edge, it is not a Gabriel edge.
6. A 2-localized Delaunay triangle, say 4abc, satisfies that the interior of
Proof. Let c be a discoverer of UI edge ab by a bridge edge abc does not contain any 2-hop neighbor of a, b, or c, and each edge of
cd. Then, ab intersects with cd and neither a nor b is the 4abc has length no more than R (which means each edge of 4abc
neighbor of d, based on Definition 2. belongs to E).
7. Nodes that can be reached by node a within (less than or equal to)
Suppose ab is a Gabriel edge and cd is an IG edge. Based k hops are called k-hop neighbors of a. This implies that all k-hop neighbors
on Lemma 1, at least one of a and b is the common of a node are also ðk þ 1Þ-hop neighbors of the node.

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
SUN ET AL.: AN EDGE-CONSTRAINED LOCALIZED DELAUNAY GRAPH FOR GEOGRAPHIC ROUTING IN MOBILE AD HOC AND SENSOR... 485

Fig. 8. ed and b are on the same side of o. Fig. 9. In the case that two Edge Constrained Localized Delaunay
triangles intersect.
Case 1. ed and b are on the same side of o, as shown in
Fig. 8. It is easy to see that ffebd > ffe0 bd0 >  =2. There- By showing that each ECLDel4 belongs to the set of all
fore, jbdj < jedj  R, which contradicts the assumption 1-localized Delaunay triangles, we know that each ECLDel4
jbdj > R. satisfies the properties of the 1-localized Delaunay triangles,
Case 2. ed and a are on the same side of o, or o sits and thus, we prove that ECLDel is planar.
exactly on ed. Based on the same reason as in Case 1, it is Lemma 9. Each ECLDel4 belongs to the set of all 1-localized
easy to see that jadj < jedj  R, which contradicts the
Delaunay triangles.
assumption jadj > R. Thus, the lemma follows. u
t
Proof. Definition 4 describes that an ECLDel4, say 4abc,
Lemma 7. Each edge of a 2-localized Delaunay triangle belongs
satisfies that the interior of abc does not contain any
to E  CE.
1-hop neighbor of a, b, or c, and each edge of 4abc
Proof. Based on Lemmas 5 and 6, each edge of a 2-localized belongs to E  CE  E. Therefore, an ECLDel4 must
Delaunay triangle is not a Constrained edge (does not be a 1-localized Delaunay triangle. The lemma follows.tu
belong to CE). Since each edge of a 2-localized Delaunay
triangle belongs to E, the lemma follows. u
t Theorem 2. Any two ECLDel4s do not intersect.

Lemma 8. Each 2-localized Delaunay triangle is an ECLDel4. Proof. Suppose two ECLDel4s, 4abc and 4def intersect.
Lemma 9 implies that the ECLDel4s satisfy the properties
Proof. A 2-localized Delaunay triangle, say 4abc, satisfies that of the 1-localized Delaunay triangles. Therefore, the only way
the interior of its circumcircle does not contain any 2-hop
this can happen is that exactly one edge of each triangle is
neighbor of a, b, or c. Based on the definition of k-hop
not intersected by the edges of the other triangle [33].
neighbors of a node described in Section 3.4, it is easy to
Suppose ac and ef are not intersected by 4def and
see that the set of ðk þ 1Þ-hop neighbors of a node
contains all the k-hop neighbors of the node. This implies 4abc, respectively, which means ab and bc intersect with
that the set of 2-hop neighbors of a node contains all the both de and df, as shown in Fig. 9. Either abc contains
1-hop neighbors of the node. Therefore, the interior of at least one node of d, e, and f, or def contains at least
the circumcircle of 4abc does not contain any 1-hop one node of a, b, and c [33]. Let’s suppose that abc
neighbor of a, b, or c. contains d as shown in Fig. 9.
Since each edge of 4abc belongs to E  CE, 4abc Since abc does not contain any 1-hop neighbor of a,
satisfies the definition of an ECLDel4. Thus, the lemma.t u b, or c, ad > R, db > R, and cd > R. For the intersecting
edges ab and de, at least one node of a, b, d, and e is the
Theorem 1. LDelð2Þ ðNÞ is a subgraph of ECLDel(N).
1-hop neighbor of the other three [34]. Therefore, only e
Proof. We have known that ECLDel(N) contains all Gabriel is the 1-hop neighbor of the other three nodes, which
edges and all ECLDel4. LDelð2Þ ðNÞ contains all Gabriel means that ae  R and eb  R.
edges and all 2-localized Delaunay triangles. The theorem In case de is not a Gabriel edge, then ab is a UI edge from
follows from Lemma 8. u
t Definition 2. In case de is a Gabriel edge, ab is an IG edge
Since LDelð2Þ ðNÞ is a t-spanner of UDG(N, E) and is a from Definition 1. Either case implies that ab is a
subgraph of ECLDel(N), ECLDel(N) is a t-spanner of Constrained edge, which contradicts that each edge of an
UDG(N, E). ECLDel4 is not a Constrained edge (belongs to
CE ¼ E  CE). Hence, the theorem. u
t
4.4 ECLDel is Planar
Theorem 3. ECLDel(N) is planar.
In this section, we prove that the ECLDel is a planar graph.
Recall that the 1-localized Delaunay graph, LDelð1Þ ðNÞ, contains Proof. ECLDel(N) contains all Gabriel edges and all
all Gabriel edges and all 1-localized Delaunay triangles [33]. A ECLDel4. Gabriel edges do not intersect with each other.
1-localized Delaunay triangle, say 4abc, satisfies that the ECLDel4 do not intersect with each other either based
interior of abc does not contain any 1-hop neighbor of a, b, on Theorem 2. Each edge of an ECLDel4 is not an IG
or c, and each edge of 4abc has a length no more than R edge, so any Gabriel edge and any ECLDel4 do not
(belongs to E). intersect. Hence, the theorem. u
t

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
486 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 4, APRIL 2010

5.1 Algorithm AlgEcldel


The details of the algorithm AlgEcldel are as follows:

1. Each node gets the location information of its


1-hop neighbors from a node’s periodic broad-
casting of a Hello message.
2. A node, say a, computes the Delaunay triangulation,
Del(N(a)), which can be computed in a variety of
methods [40], [41], [42].
3. Node a finds all UI edges it can discover and
inserts them to set UI of Unaware Intersection edges.
Node a finds all Gabriel edges incident on it, marks
them as edges in the ECLDel, and inserts them to
set GE of Gabriel edges. Node a broadcasts a
Fig. 10. An example of intersection of two 1-localized Delaunay message edges(UI, GE).
triangles. 4. On receiving the messages edges(UI, GE) from NðaÞ,
a combines the edges in sets UI it receives with its
4.5 A Comparison of Graphs ECLDel and PLDel own set UI, and combines the edges in sets GE it
A common feature of ECLDel and PLDel is that both of them receives with its own set GE.
are planar t-spanners of UDG. However, they are not the 5. Node a selects all triangles from Del(N(a)), which are
incident on it and each edge of which has a length no
same. ECLDel is a subgraph of PLDel. We present a proof of
more than R, does not belong to set UI, and does not
it below.
intersect with any edge in set GE (not an IG edge).
Lemma 10. ECLDel is a subgraph of LDelð1Þ ðNÞ. The triangles are candidates for the ECLDel4s.
Proof. Based on Definition 4, an ECLDel4 satisfies that the Node a puts all the candidate triangles in the
interior of it does not contain any 1-hop neighbor of any message candidates, e.g., candidates((a, b, c), (a, e, f)),
and broadcasts the message.
of its three vertices, and each edge of it belongs to the
6. Node a will keep a candidate triangle 4abc as an
edge set E  CE  E. This means that each ECLDel4 is
ECLDel4 if it receives candidates((a, b, c)) from both b
a 1-localized Delaunay triangle, LDelð1Þ 4. Based on the
and c. Node a marks ab and ac as edges in the ECLDel.
definition of LDelð1Þ ðNÞ [33] and Definition 5, the lemma
By locally applying the algorithm AlgEcldel, each node
follows. u
t
computes all Gabriel edges and all ECLDel4 incident on it
Theorem 4. ECLDel is a subgraph of PLDel. distributively, to construct the ECLDel graph.
Proof. To construct a PLDel, the intersections in LDelð1Þ ðNÞ
5.2 Correctness Proof of Algorithm AlgEcldel
should be removed. Because the Gabriel edges do not
In this section, we prove the correctness of the algorithm
intersect with each other, the intersections in LDelð1Þ ðNÞ
AlgEcldel.
have two cases. First, an LDelð1Þ 4 intersects with a
Gabriel edge, which must contain an IG edge. In this Theorem 5. Algorithm AlgEcldel constructs a graph of ECLDel.
case, the LDelð1Þ 4 will be removed. Second, two Proof. Suppose the algorithm AlgEcldel constructs a graph
LDelð1Þ 4, say 4abc and 4xyz, intersect. Then, exact G. From step 2 of AlgEcldel, a node, say a, computes all
two edges of them intersect, and either abc contains at the Delaunay triangles incident on it, whose circumcircles
least one node of x, y, and z or xyz contains at least one do not contain any 1-hop neighbor of node a. From
node of a, b, and c [33]. Suppose the intersection is as in steps 3 and 4, node a knows all the UI edges incident on
Fig. 10, where ab and bc intersect with xy and xz, and x is it and all the Gabriel edges incident on its 1-hop
inside abc. In this case, 4abc will be removed. Because neighbors based on Corollary 2. From step 5, node a
jaxj > R, jbxj > R, jazj  R, and jbzj  R [33], ab is a UI knows all the IG edges incident on it in the Delaunay
edge. Therefore, to construct a PLDel, each LDelð1Þ 4 that triangles it computes based on Corollary 1. With the
is removed from the LDelð1Þ ðNÞ contains either an IG or knowledge of UI and IG edges, node a selects the
a UI edge, which is not contained in the ECLDel. Based candidate ECLDel4. For example, if 4abc is a candidate
on the definition of LDelð1Þ ðNÞ [33], Definition 5, and ECLDel4 selected by node a, then it satisfies that
Lemma 10, the theorem follows. u
t ab  R, bc  R, and each edge of ab and ac is neither a UI
nor an IG edge. Therefore, if 4abc is selected as a
On the contrary, PLDel is not a subgraph of ECLDel, candidate ECLDel4 by all nodes of a, b, and c, then it
because some triangles kept in it may contain UI edges that satisfies the following:
are not contained in ECLDel.
1.n, p, and q are not inside abc, 8n 2 NðaÞ,
8p 2 NðbÞ, 8q 2 NðcÞ.
5 AN ALGORITHM TO CONSTRUCT AN ECLDEL 2. ab  R, ac  R, and bc  R.
In this section, we give an algorithm AlgEcldel, with which 3. Each edge of ab, bc, and ac is neither a UI nor an
each node constructs the ECLDel distributively with IG edge.
1-hop neighborhood information. NðaÞ denotes the set of Based on Definition 4, 4abc is an ECLDel4. Node a
node a’s 1-hop neighbors including a. keeps each edge of all such ECLDel4 incident on it in

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
SUN ET AL.: AN EDGE-CONSTRAINED LOCALIZED DELAUNAY GRAPH FOR GEOGRAPHIC ROUTING IN MOBILE AD HOC AND SENSOR... 487

graph G from step 6. Node a also keeps all the Gabriel


edges incident on it in graph G as done in step 3. Based
on Definition 5, graph G is an ECLDel graph. Hence, the
theorem. u
t

5.3 Communication Complexity of Algorithm


AlgEcldel
Let n denote the number of nodes in the network. Then,
each node’s identity needs log n bits to be expressed.
Therefore, for each node, the communication cost of
broadcast of messages is Oðlog nÞ bits. As a result, the total
communication cost in the network is Oðn log nÞ bits.
5.4 A Comparison of the Algorithms to Construct an
ECLDel and a PLDel
Fig. 11. Success rate of greedy routing on UDG.
For simplicity, the algorithm to construct a PLDel is denoted
by AlgPldel. A common feature of AlgEcldel and AlgPldel is should perform better with shorter routes than that on RNG
that both of them can be run by each node distributively with
and GG. Our following simulation results confirm this.
1-hop neighborhood information. In addition, they have the
We use GPSR [15] as the GFG geographic routing
same asymptotic communication complexities, Oðn log nÞ.
protocol, in which each source node takes greedy routing
However, the upper bounds of the communication
first, face routing when the greedy routing fails, and then
complexities of both algorithms are within different constant
factors. Let fECLDel ðnÞ and fP LDel ðnÞ denote the communica- greedy routing again if possible to its destination. Greedy
tion complexities of AlgEcldel and AlgPldel, respectively. routing is applied on the original UDG. We randomly select
Then, fECLDel ðnÞ  e n log n and fP LDel ðnÞ  p n log n, 10 percent nodes as source nodes and for each of them we
where e and p are two positive constant factors. The randomly select 10 percent nodes as destination nodes. We
difference is that e is much smaller than p. This is due to depict the success rate of greedy routing on UDG in Fig. 11.
the following two reasons: First, the IG edges and the UI edges, Each value in the graph is an average value of 20 different
which are constrained in the ECLDel graph. These edges network topologies (20 seeds).
help significantly reduce the number of candidate triangles, Fig. 11 illustrates when the number of nodes in the
and as a result, reduce the size of messages broadcast by network is 140, the success rate of greedy routing on UDG is
each node. Second, we significantly reduce the number of 99.64 percent, which is close to 100 percent. However, when
messages broadcast by each node from five rounds (each the number of nodes is less than 140, the success rate of
round may contain several messages) to two messages. greedy routing on UDG is less than 100 percent. This
A decrease in both the number and the size of messages implies that greedy routing may fail and face routing is
broadcast by each node reduces the communication cost, required. In GPSR, greedy routing is applied on the original
and saves the network bandwidth and node power, which UDG, and face routing is applied on RNG. To prevent from
is desirable for mobile ad hoc and sensor networks. Our keeping two graphs in our simulations, each node keeps
simulation results show that the average number of
only one planar graph as the underlying graph for both
messages and the average size of messages broadcast by
greedy and face routing, which is the same as several other
each node is, respectively, 65 and 42 percent less in the
construction of ECLDel than that in PLDel, which collabo- simulation studies [33], [34], [35].
rates the above analysis. Fig. 12 shows an example of network graphs of UDG,
Del, RNG, GG, PLDel, and ECLDel, where 80 nodes are
distributed randomly in the network. Del graph is not
6 SIMULATION STUDY AND ANALYSIS suitable for mobile ad hoc networks, because it needs global
In our simulations, the network is a square area of information and may have edges with length more than the
1;000
1;000 m2 . Nodes are distributed randomly in the transmission range of mobile nodes. RNG, GG, PLDel, and
area and have a transmission range 200 meters. The number ECLDel are planar graphs, among which PLDel and ECLDel
of nodes in the network is changed from 20 to 240. By are t-spanners of UDG.
changing the number of nodes in the network, we change We evaluate the performance of GPSR on four planar
the network density or the average node degree (the number underlying graphs, RNG, GG, PLDel, and ECLDel. We
of neighbors of a node). We do not simulate the network randomly select 10 percent nodes as source nodes, and for
with less than 20 nodes, in which case the node degree is less each of them we randomly select 10 percent nodes as
than 2.5, because the network in this case is highly likely to destination nodes. We show the average path length (hop
be partitioned. count) for GPSR on the four graphs in Fig. 13. Each value in
6.1 Performance of GFG Geographic Routing on the graph is an average value of 20 different network
Different Underlying Graphs topologies (20 seeds).
Fig. 13 implies that GPSR applied on ECLDel and PLDel
In this section, we evaluate the performance of GFG
geographic routing on four underlying graphs, which are outperforms that on GG and RNG in path length (hop
RNG, GG, PLDel, and ECLDel. ECLDel and PLDel are planar count). This is because ECLDel and PLDel are planar
t-spanners of UDG, which are denser than RNG and GG. t-spanners of UDG, which are denser than RNG and GG.
Therefore, the geographic routing on ECLDel and PLDel Note that neither GG nor RNG is a t-spanner of UDG.

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
488 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 4, APRIL 2010

Fig. 15. Average number of neighbor nodes in messages broadcast by


each node.

Fig. 12. Examples of network topologies.

Fig. 16. Average number of UI edges broadcast by each node.

message in our algorithm, instead of in different broadcast


Fig. 13. Hop counts of GPSR on different underlying graphs. messages as in the algorithm to construct PLDel.

6.2.2 The Average Size of Messages Broadcast by


Each Node
For a fair comparison, we depict the average size of
messages, which is the number of neighbor nodes in the
messages, to broadcast by each node in Fig. 15. The average
number of neighbor nodes for each node to broadcast is
42 percent less in construction of ECLDel than that in PLDel.
This is due to the fact that by constraining the IG edges and
the UI edges in the construction of ECLDel, each node gets
much fewer candidate triangles, which results in much
smaller size of messages, to broadcast.
In the construction of ECLDel, besides the candidate
triangles, each node also needs to broadcast the UI edges
Fig. 14. Average number of messages broadcast by each node.
discovered by it. However, Fig. 16 shows that the average
number of UI edges broadcast by each node is very few,
6.2 Evaluation of the Cost of Construction of an which is 0.12 on average. Each value in the graph is an
ECLDel and a PLDel
average value of 20 different network topologies (20 seeds).
In this section, we evaluate the communication cost of
construction of PLDel and ECLDel using the following two
metrics: the average number of messages and the average 7 RELATED WORK
size of messages broadcast by each node. GG [31] and RNG [32] are commonly used as the underlying
graphs for face routing. For instance, GG is used by Bose
6.2.1 The Average Number of Messages Broadcast by et al. [14] and RNG is used by Karp et al. [15]. However,
Each Node both GG and RNG are relatively sparse, and neither of them
Fig. 14 shows the average number of messages to broadcast is a t-spanner of UDG, which results in long routes in face
by each node, which is 65 percent less in construction of routing on them.
ECLDel than that of PLDel. This is due to the fact that each Boone et al. [43] try to construct a planar spanning
node puts all the candidate triangles in one broadcast subgraph of UDG that is denser than GG by doing some extra

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
SUN ET AL.: AN EDGE-CONSTRAINED LOCALIZED DELAUNAY GRAPH FOR GEOGRAPHIC ROUTING IN MOBILE AD HOC AND SENSOR... 489

tests, which may decrease the path length in face routing. geographic routing in mobile ad hoc and sensor networks.
However, their improvements are minor in dense networks We proved that the ECLDel is a planar t-spanner of the
and the graph they construct is not a t-spanner either. original unit-disk graph. We developed an algorithm
Hu [44] constructs a planar graph as the network AlgEcldel to construct the ECLDel, which can be run by
topology that has a bounded node degree. To decide each node distributively with 1-hop neighborhood informa-
whether an edge ab belongs to the graph, it requires to tion. Compared to the algorithm to construct the PLDel, our
check whether there is a circle passing through a and b algorithm to construct the ECLDel is much more simple and
without any other node in its interior. This makes his it converges faster. This is due to the reason that we
method not converge in the worst case. Furthermore, the significantly decrease the number of messages and the size
network topology graph may not be a t-spanner. of messages broadcast by each node in the construction,
Both Yao graph [45] and -graph [46] have been proved which results in far less communication cost and is more
to be t-spanners, but they may not be planar graphs. desirable for mobile ad hoc and sensor networks.
Several methods [47], [48], [49] to construct wireless Our simulation results confirm this, and the average
network topologies that are t-spanners are proposed. number of messages and the average size of messages
However, none of them is guaranteed to be a planar graph. broadcast by each node is, respectively, 65 and 42 percent
Delaunay triangulation [38] is a planar t-spanner of the less in our algorithm than in the algorithm to construct
completed euclidean graph, which is almost as good as the the PLDel.
complete graph [39]. However, it is hard to construct because
it needs global information and is not suitable for mobile ad ACKNOWLEDGMENTS
hoc or sensor networks because some edges in it may have The authors are greatly indebted to two anonymous
length more than the transmission range of mobile nodes. reviewers for their comments on an earlier version of the
Gao et al. [34] propose a restricted Delaunay graph, RDG, paper.
as the underlying graph for geographic routing protocols,
which is a planar t-spanner of the original UDG. In their
method, the network is divided to clusters, each of which REFERENCES
has a clusterhead. Clusters are connected by gateway nodes [1] C. Perkins and P. Bhagwat, “Highly Dynamic Destination-
(gateways). Their graph contains all edges between each Sequenced Distance-Vector Routing,” Proc. ACM SIGCOMM,
node and its clusterhead, and a planar graph among Oct. 1994.
[2] S. Murthy and J. Garcia-Luna-Aceves, “An Efficient Routing
clusterheads and gateways. The communication cost of Protocol for Wireless Networks,” ACM Mobile Networks and
their method may be ðn2 Þ, and the computation cost may Applications J., special issue on routing in mobile communication
be ðn3 Þ, where n is the number of nodes in the network. networks, vol. 1, pp. 183-197, Oct. 1996.
Li et al. [33] propose a PLDel as the underlying graph for [3] C. Perkins, “Ad-Hoc On-Demand Distance Vector Routing,” Proc.
IEEE Military Comm. Conf. (MILCOM ’97), Nov. 1997.
geographic routing, which is a planar t-spanner of UDG and [4] D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad Hoc
can be constructed by each node distributively. The com- Wireless Networks,” Mobile Computing, vol. 353, Springer, 1996.
munication cost in construction of PLDel is Oðn lg nÞ and the [5] P. Sinha, R. Sivakumar, and V. Bharghavan, “CEDAR: A Core-
computation cost in construction of PLDel is Oðd lg dÞ, where Extraction Distributed Ad Hoc Routing Algorithm,” Proc. IEEE
INFOCOM, vol. 1, pp. 202-209, 1999.
d is the average node degree in the network, which is near [6] E. Royer and C. Toh, “A Review of Current Routing Protocols for
optimal. However, the construction of PLDel is not efficient Ad-Hoc Mobile Wireless Networks,” IEEE Personal Comm., vol. 6,
enough because each node needs to broadcast several no. 2, pp. 46-54, Apr. 1999.
[7] J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva, “A
messages, which makes their algorithm converge slowly. Performance Comparison of Multi-Hop Wireless Ad Hoc Net-
Another algorithm [36] to construct the PLDel is work Routing Protocols,” Proc. ACM MobiCom, pp. 85-97, 1998.
proposed, which tries to decrease the number of broadcast [8] S. Ramanathan and M. Steenstrup, “A Survey of Routing
messages needed in the construction. However, inconsistent Techniques for Mobile Communication Networks,” ACM/Baltzer
Mobile Networks and Applications, vol. 1, pp. 89-104, 1996.
Delaunay triangles may exist among nodes. [9] K. Akkaya and M. Younis, “A Survey of Routing Protocols for
Wang and Li [35] propose a bounded degree planar Wireless Sensor Networks,” Ad Hoc Networks, vol. 3, no. 3, pp. 325-
t-spanner of UDG, which plugs in the work of Li et al. [33] 349, 2005.
[10] J. AL-Karaki and A. Kamal, “Routing Techniques in Wireless
and whose construction needs 2-hop neighborhood infor- Sensor Networks: A Survey,” IEEE Wireless Comm., vol. 11, no. 6,
mation of nodes. pp. 6-28, Dec. 2004.
[11] E. Kranakis, H. Singh, and J. Urrutia, “Compass Routing on
Geometric Networks,” Proc. 11th Canadian Conf. Computational
8 CONCLUSION Geometry: An Introduction, pp. 51-54, 1999.
[12] H. Takagi and L. Kleinrock, “Optimal Transmission Ranges for
In mobile ad hoc and sensor networks, most geographic Randomly Distributed Packet Radio Terminals,” IEEE Trans.
routing protocols, e.g., Greedy-Face-Greedy routing proto- Comm., vol. 32, no. 3, pp. 246-257, Mar. 1984.
cols, need nodes to construct planar graphs as the under- [13] I. Stojmenovic and X. Lin, “Loop-Free Hybrid Single-Path/
lying graph for face routing. Li et al. [33] proposed a planar Flooding Routing Algorithms with Guaranteed Delivery for
Wireless Networks,” IEEE Trans. Parallel and Distributed Systems,
t-spanner of UDG, called PLDel for geographic routing. vol. 12, no. 10, pp. 1023-1032, Oct. 2001.
However, their algorithm to construct the PLDel is highly [14] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with
complex and it converges slowly, because each node needs Guaranteed Delivery in Ad Hoc Wireless Networks,” Proc. Third
to broadcast too many messages, which results in high Int’l Workshop Discrete Algorithms and Methods for Mobile Computing
and Comm., 1999.
communication cost. [15] B. Karp and H.T. Kung, “GPSR: Greedy Perimeter Stateless
In this paper, we proposed an Edge Constrained Localized Routing for Wireless Networks,” Proc. ACM/IEEE Int’l Conf. Mobile
Delaunay graph, ECLDel, as the underlying graph for Computing and Networking, 2000.

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.
490 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 4, APRIL 2010

[16] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Asymptotically [43] P. Boone, E. Chavez, L. Gleitzky, E. Kranakis, J. Opatrny, G.
Optimal Geometric Mobile Ad-Hoc Routing,” Proc. Sixth Int’l Salazar, and J. Urrutia, “Morelia Test: Improving the Efficiency of
Workshop Discrete Algorithms and Methods for Mobile Computing and the Gabriel Test and Face Routing in Ad-Hoc Networks,” Proc.
Comm. (DIALM ’02), 2002. Silencing RNAs: Organisers and Coordinators of Complexity in
[17] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger, “Geometric Eukaryotic Organisms (SIROCCO), pp. 23-34, 2004.
Ad-Hoc Routing: Of Theory and Practice,” Proc. ACM Symp. [44] L. Hu, “Topology Control for Multihop Packet Radio Networks,”
Principles of Distributed Computing (PODC ’03), July 2003. IEEE Trans. Comm., vol. 41, no. 10, pp. 1474-1481, Oct. 1993.
[18] I. Stojmenovic, “Position-Based Routing in Ad Hoc Networks,” [45] A.-C. Yao, “On Constructing Minimum Spanning Trees in
IEEE Comm. Magazine, vol. 40, no. 7, pp. 128-134, July 2002. k-Dimensional Spaces and Related Problems,” SIAM J. Computing,
[19] S. Giordano, I. Stojmenovic, and L. Blazevic, “Position Based vol. 11, pp. 721-736, 1982.
Routing Algorithms for Ad Hoc Networks: A Taxonomy,” Ad Hoc [46] J. Mark Keil and C.A. Gutwin, “Classes of Graphs which
Wireless Networking, Kluwer Academic Publishers, 2003. Approximate the Complete Euclidean Graph,” Discrete Computa-
[20] M. Mauve and J. Widmer, “A Survey on Position-Based Routing tional Geometry, vol. 7, pp. 13-28, 1992.
in Mobile Ad Hoc Networks,” IEEE Network, vol. 15, no. 6, pp. 30- [47] R. Wattenhofer, L. Li, P. Bahl, and Y.-M. Wang, “Distributed
39, Nov. 2001. Topology Control for Wireless Multihop Ad-Hoc Networks,” Proc.
[21] S. Capkun, M. Hamdi, and J. Hubaux, “Gps-Free Positioning in IEEE INFOCOM, 2001.
Mobile Ad Hoc Networks,” Proc. Hawaii Int’l Conf. System Science [48] X.-Y. Li, P.-J. Wan, and Y. Wang, “Power Efficient and Sparse
(HICSS), Jan. 2001. Spanner for Wireless Ad Hoc Networks,” IEEE Proc. Int’l Conf.
[22] J. Hightower and G. Borriello, “Location Systems for Ubiquitous Computer Comm. and Networks (ICCCN ’01), pp. 564-567, 2001.
Computing,” Computer, vol. 34, no. 8, pp. 57-66, Aug. 2001. [49] X.-Y. Li, P.-J. Wan, Y. Wang, and O. Frieder, “Sparse Power
[23] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, Efficient Topology for Wireless Networks,” Proc. IEEE Ann. Hawaii
and F. Yu, “Data-Centric Storage in Sensornets with GHT, a Int’l Conf. System Sciences (HICSS), 2002.
Geographic Hash Table,” Mobile Networks and Applications, vol. 8,
pp. 427-442, 2003. Yan Sun received the BS degree in the
[24] S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin, Computer Science Department from Tongji
“Data-Centric Storage in Sensornets,” Proc. ACM SIGCOMM University, Shanghai, China, in 1997. She is
HotNets, 2002. a PhD candidate in the Department of Com-
[25] M. Li, W. Lee, and A. Sivasubramaniam, “Efficient Peer-to-Peer puter Science at the University of Kentucky.
Information Sharing over Mobile Ad Hoc Networks,” Proc. Second Her current research focuses on the areas of
Workshop Emerging Applications for Wireless and Mobile Access, 2004. geographic routing in mobile ad hoc and
[26] X. Li, Y.J. Kim, R. Govindan, and W. Hong, “Multi-Dimensional sensor networks.
Range Queries in Sensor Networks,” Proc. ACM Conf. Embedded
Networked Sensor Systems (SenSys ’03), Nov. 2003.
[27] R. Sarkar, X. Zhu, and J. Gao, “Double Rulings for Information
Brokerage in Sensor Networks,” Proc. ACM MobiCom, Sept. 2006.
[28] G. Finn, “Routing and Addressing Problems in Large Metropo- Qiangfeng Jiang received the BS and MS
litan-Scale Internetworks,” ISI Research Report ISU/RR-87-180, degrees in the Computer Science Department
Mar. 1987. from Tongji University, Shanghai, China, in
[29] L. Zou, M. Lu, and Z. Xiong, “A Distributed Algorithm for the 1998, and East-China Institute of Computer
Dead End Problem of Location Based Routing in Sensor Net- Technology, Shanghai, China, in 2001, re-
works,” IEEE Trans. Vehicular Technology, vol. 54, no. 4, pp. 1509- spectively. He is a PhD candidate in the
1522, July 2005. Department of Computer Science at the
[30] J. Bondy and U. Murty, Graph Theory with Applications. Elsevier University of Kentucky. His current research
Science Ltd., 1976. interests lie in the areas of wireless networks,
[31] K. Gabriel and R. Sokal, “A New Statistical Approach to channel allocation, and checkpointing and
Geographic Variation Analysis,” Systematic Zoology, vol. 18, recovery in distributed systems.
pp. 259-278, 1969.
[32] G. Toussaint, “The Relative Neighborhood Graph of Finite Planar Mukesh Singhal received the bachelor of
Set,” Pattern Recognition, vol. 4, no. 12, pp. 261-268, 1980. engineering degree in electronics and commu-
[33] X.-Y. Li, G. Calinescu, and P.-J. Wan, “Distributed Construction of nication engineering with high distinction from the
a Planar Spanner and Routing for Ad Hoc Wireless Networks,” Indian Institute of Technology, Roorkee, India, in
Proc. IEEE INFOCOM, 2002. 1980, and the PhD degree in computer science
[34] J. Gao, L.J. Guibas, J. Hershberger, L. Zhang, and A. Zhu, from the University of Maryland, College Park, in
“Geometric Spanners for Routing in Mobile Networks,” IEEE May 1986. He is a full professor and Gartener
J. Selected Areas in Comm., vol. 23, no. 1, pp. 174-185, Jan. 2005. group endowed chair in network engineering in
the Department of Computer Science at the
[35] Y. Wang and X.-Y. Li, “Localized Construction of Bounded Degree
University of Kentucky, Lexington. From 1986 to
and Planar Spanner for Wireless Ad Hoc Networks,” Mobile
2001, he was a faculty member in computer and information science at
Networks and Applications, vol. 11, pp. 161-175, 2006.
the Ohio State University. His current research interests include
[36] F. Araujo and L. Rodrigues, “Fast Localized Delaunay Triangula-
distributed systems, wireless and mobile computing systems, computer
tion,” Proc. Int’l Conf. Principle of Distributed Systems (OPODIS ’04),
networks, computer security, and performance evaluation. He has
Dec. 2004.
published more than 200 refereed articles in these areas. He has
[37] W. Wang, X.-Y. Li, K. Moaveninejad, Y. Wang, and W.-Z. Song,
coauthored books titled Advanced Concepts in Operating Systems
“The Spanning Ratios of Beta-Skeleton,” Proc. Canadian Conf.
(McGraw-Hill, 1994), Distributed Computing Systems (Cambridge Uni-
Computational Geometry (CCCG ’03), 2003.
versity Press, 2007), Data and Computer Communications: Networking
[38] F.P. Preparata and M.I. Shamos, Computational Geometry: An and Internetworking (CRC Press, 2001), and Readings in Distributed
Introduction. Springer-Verlag, 1985. Computing Systems (IEEE Computer Society Press, 1993). He is a fellow
[39] D. Dobkin, S. Fredman, and K. Supowit, “Delaunay Graphs are of the IEEE. He was a recipient of the 2003 IEEE Technical Achievement
Almost as Good as Complete Graphs,” Discrete and Computational Award. He is currently serving in the editorial board of the IEEE
Geometry, vol. 5, pp. 399-407, 1990. Transactions on Parallel and Distributed Systems. From 1998 to 2001, he
[40] S. Fortune, “A Sweepline Algorithm for Voronoi Diagrams,” served as the program director of the Operating Systems and Compilers
Algorithmica, vol. 2, pp. 153-174, 1987. program at the US National Science Foundation.
[41] R. Dwyer, “A Faster Divide-and-Conquer Algorithm for Con-
structing Delaunay Triangulations,” Algorithmica, vol. 2, pp. 137-
151, 1987.
[42] L. Guibas and J. Stolfi, “Primitives for the Manipulation of General
Subdivisions and the Computation of Voronoi Diagrams,” ACM
Trans. Graphics, vol. 4, pp. 75-123, 1985.

Authorized licensed use limited to: Scad College of Engineering and Technology. Downloaded on July 15,2010 at 05:42:36 UTC from IEEE Xplore. Restrictions apply.

Vous aimerez peut-être aussi