This paper investigates the topology control problem in the planetary surface network (PSN) of Interplanetary Internet (IPN) using an autonomous system (AS) approach. We propose a delay minimization topology control (DMTC) algorithm to achieve low time delay and strong connectivity in the planetary surface network. Compared with the most existing approaches where either the purely centralized or the purely distributed control method is adopted, the proposed algorithm is a hybrid control method. In order to reduce the cost of control, the control message exchange is constrained among neighboring AS networks. We prove that the proposed algorithm could achieve logical k-connectivity on the condition that the original physical topology is k-connectivity. Simulation results validate the theoretic analysis and effectiveness of the DMTC algorithm.
1. Introduction
The Interplanetary Internet (IPN) was proposed to satisfy the demands of deep space communications early in this century. As proposed in [1, 2], the IPN includes a backbone network, external networks, and planetary networks (PNs). A PN is composed of an orbiter network (ON) and a planetary surface network (PSN). The former is composed of orbiters circling the planets and provides a relay service between the surface network and the backbone network [3, 4]. The latter is composed of landers, rovers, astronauts, and sensors from different countries or space missions [5, 6]. Nodes in the planetary surface network autonomously connect to each other in order to perform collaborative tasks. Unlike wireless sensor network (WSN) on the earth, the PSN has distinguishing characteristics [7]. The scale of the PSN is large. Communication abilities of nodes in the PSN are usually stronger. Nodes in the PSN have a wide and uneven distribution. Some links among them are short and some are extremely long. Excessive use of these long-distance links data not only brings additional delay but also reduces operation efficiency. What is more, long links usually mean more energy will be consumed. Consequently, how to make an efficient and reliable topology control is challenging.
Existing works about network topology control mainly focus on maintaining a specified topology and achieve a set of network-wide objectives such as reducing energy consumption, guaranteeing the robustness, increasing the network capacity, and reducing end-to-end delay, for example, [8–16]. But, in most studies, either the purely centralized or the purely distributed control method is adopted. Centralized algorithms rely on a central entity which knows the conditions of all the nodes in order to calculate the optimal topology [17–19]. However, these algorithms are not suitable for large scale network such as PSN where excessive amounts of control messages need to be collected by one central entity. Control information in the PSN is costly for long distance and too many hops. On the other hand, in distributed algorithms, each node collects the information from its neighboring nodes and autonomously computes which link should be preserved [19–21]. Consider that the information each node obtains is limited; the final topology usually cannot achieve global optimization for large scale networks. Thus, it is important to develop a special topology control algorithm for the PSN.
Instead of using long links, nodes in the PSN should collaboratively determine which links will be used and define the network topology though forming proper neighbor relations. That is, topology control algorithms of the PSN actually remove unnecessary long links. As a result, the network topology is susceptible to unpredictable events such as hardware failures in such a harsh environment. Therefore, to design robust topology control algorithms, k-connectivity of the network is considered, where a k-connected network is fault-tolerant; that is, the failure of less than nodes will not disconnect the whole network.
In this paper, we study the topology control problem in the PSN using an autonomous system (AS) approach. An AS network is a collection of nodes with similar properties, for example, nodes distributed in the same region. The reasons for using the AS approach are twofold. Firstly, the complex PSN is decoupled into a series of small AS networks, and centralized method can be used in each AS to ensure strong connectivity. Secondly, distributed method is used among AS networks; thus the topology control message exchange can be constrained among neighboring AS networks. We propose a delay minimization topology control (DMTC) algorithm using such a hybrid approach. DMTC preserves k-connectivity and is min-max delay optimal. The min-max criterion tries to minimize the maximum end-to-end delay between any pair of nodes in the network [22]. Briefly, the DMTC algorithm consists of three phases: (i) nodes in the PSN autonomously form AS networks and elect AS cores; (ii) with the topology information gathered from the members of its AS network, each AS core minimizes the maximum link delay used by all the nodes and guarantees strong connectivity using a centralized method; (iii) each AS core selects a set of border nodes, shares topology information with neighboring AS cores, and computes low time delay links between neighboring AS networks using a distributed method. The main contributions of this paper are summarized as follows:
An AS network model of PSN is proposed. The large scale and complex PSN is decoupled into small AS networks with similar nodes to achieve strong connectivity with low cost control messages.
A delay minimization topology control (DMTC) algorithm is proposed to achieve low time delay. It is a hybrid algorithm within an AS network and among neighboring AS networks.
The strong connectivity of DMTC algorithm proved that the algorithm could achieve logical k-connectivity on the condition that the original physical topology is k-connectivity.
The rest of this paper is organized as follows. In Section 2, we define the network model and provide some definitions. In Section 3, we propose an AS based algorithm DMTC to achieve low time delay and strong connectivity. Then, the validity of DMTC is proved in Section 4, and the message complexity of our algorithm is analyzed in Section 5. In Section 6, simulation results and discussion are presented. Finally, we make conclusion in Section 7.
2. Network Model
In this section, the network model of AS network is defined. As presented above, the PSN is a self-organizing system constituted by various nodes. For example, as demonstrated in Figure 1, the Mars PSN is a part of the IPN. Nodes in the PSN have a wide and uneven distribution. They work in different areas with either mobile (e.g., rovers) or static (e.g., sensors) statuses. If we apply a unified strategy to manage the whole PSN, it will induce low efficiency and even cannot maintain the normal operation of the network with too much control information. So, as shown in Figure 2, we divide the PSN into a series of AS networks according to the property of the nodes. Each AS network can adopt independent topology control strategy to achieve strong connectivity. And the control message exchange is constrained among neighboring AS networks to reduce the cost of control.
The PSN is a part of the IPN and is a self-organizing system constituted by various nodes.
The whole PSN is divided into a series of AS networks according to the property of the nodes.
Considering that the properties of nodes in the PSN are similar except few nodes, we assume that all the nodes are homogeneous. They have the same maximal transmission range . Let the PSN network topology be represented by undirected simple graph , where is the set of nodes (or, equivalently, vertices) and is the set of links (edges). is the distance between nodes and . Each node is assigned a unique identifier (ID) according to its property, such as MAC address.
We assume that G is a general graph; that is, if , u and v can exchange information with each other. We also assume that the link is symmetric and obstacle-free, and each node is able to obtain its location by some means (e.g., celestial navigation [23], initial navigation [24], and vision navigation [25]). We then define several graphs related terms in the following, which will be used in both algorithms and proofs. For all definitions, we refer to graph and subgraphs and .
Definition 1 (weight function).
For edge , the weight function is , where is the time delay between u and v when exchanging information. Given , the relationship between and is given as
It is obvious that edges with the same vertices have equivalent weights. However, edges with different end-vertices have different weights.
Definition 2 (k-connected).
In graph (topology) G, node u is said to be connected to node v, if there exists path , where and . And, for any , if there exist at least k disjoint paths between them. Graph G is k-connected and denoted by . If G is k-connected, it follows that there does not exist a set of vertices, whose removal will partition G into two or more connected components.
Definition 3 (neighboring k-connected subgraphs).
For two disjoint subgraphs and of G, if , and , and are neighboring subgraphs, denoted by . If and , where and , and are neighboring k-connected subgraphs, denoted by .
Definition 4 (multihop k-connected subgraphs).
Let be partitioning of G. If subject to , and are multihop k-connected subgraphs, denoted by .
3. Algorithms for Topology Control
Recall from Introduction that the design aims of the DMTC algorithm are twofold, (1) to provide min-max delay optimal through an AS approach and (2) to achieve strong connectivity in the resulting network. The DMTC algorithm does not require the global topology of the PSN network to be known by any entity. On the contrary, DMTC relies on AS networks where nodes autonomously form groups and select a core for each AS network. It is a hybrid of centralized algorithm and distributed algorithm. A centralized topology control algorithm is applied to each AS network to achieve the desired connectivity within the AS, while the desired connectivity between adjacent AS networks is achieved via localized information sharing between adjacent AS cores. The following subsections detail the three phases of the DMTC algorithm.
3.1. Phase 1: AS Network Formation
The main function of Phase 1 is to select a minimal number of nodes as cores that dominate the AS networks by using only 1-hop transmission. And these cores will take the main responsibility for the subsequent two phases.
Step 1 (broadcasting hello messages).
When starting up, each node broadcasts hello messages periodically in order to let them discover each other in the surrounding area. A hello message is of the form . The explanation of each field is as follows: : the unique ID of each node; : the location of each node; : the ID of the core with which the sending node is currently associated; if the sending node does not associate with any core, it is zero; note that a core node uses its own ID for this field; : the degree of connectivity (the number of neighbors); : time delay to each neighbor when exchanging information. It may contain processing, transmission, and propagation delay in practice. In order to facilitate the analysis, we only consider propagation delay in this paper.
Step 2 (core selection process).
The core selection process of each node begins after it has broadcasted hello messages for a certain waiting time. The waiting time should be long enough to allow this node to receive at least one hello message from every immediate neighbor. In this process, every node will decide whether it is suitable as a core of an AS or become a member of an AS by checking for its local optimality. Each node computes its own height from its current states. The height metric should be chosen to suit the design goals of the PSN topology control algorithm. As a result, we use as the height metric. is included in the metric calculation to break ties. The height function is . In order to balance the factor of and , we formulate as
where denotes the balance function and α is the balance factor. The relationship between and is given by
Then, if a node has the highest height among its neighbors, it is considered as a local optimal node and should serve as a core. After this process, the first batch of cores is selected, and all consequent hello messages will be changed accordingly.
Step 3 (supplement of cores).
After Step 2, each node checks if there are cores in the range . If cores exist, it will regard the core that has the least between them as its parent. That is, this node will be the member of the AS dominated by its parent core. Then nodes update the in their hello messages with their parent cores' ID. Note that a core node uses its own ID for this field. After that, nodes whose are zero without parent calculate their height functions. And the node that has the highest height among its neighbors without parent in the range should serve as a core.
Step 4 (optimization and maintenance process).
Considering nodes' mobility, and in order to keep the number of cores as low as possible, if a core detects there are other cores in the range (from the hello process), it will check whether it has the highest height among these cores. If not, it will turn into a member of the highest height core, and its member nodes will turn into nodes without parent. If there exist nodes without parent in the PSN, process will turn to Step 3. Finally, there are only two kinds of nodes: cores and members. And this optimization and maintenance process will keep monitoring the PSN. For instance, if a new node is added to the PSN, the process will take this node as a node without parent and turn to Step 3.
3.2. Phase 2: Intra-AS Topology Control
In this phase, we present a centralized algorithm for intra-AS network. Each core will calculate the links for all of the members of its AS such that the resulting topology of the AS meets the given topology constraint (min-max delay and k-connectivity). The intra-AS topology control algorithm is described in Algorithm 1, where G represents the PSN, and let (AS) be partitioning of G.
Algorithm 1: Intra-AS topology control.
Input: (at AS )
k (required connectivity)
Output:
Begin:
,
Sort all edges in in ascending order of weight (as defined in Definition 1)
for all edge in the order do
if is not k-connected to then
end if
end for
for all edge of in the descending order do
if is still k-connected to with the disconnection of edge then
end if
end for
Return
For each AS, Algorithm 1 ensures that preserve the k-connectivity of ; that is, . And the maximum end-to-end delay among all edges in the AS network is minimized by Algorithm 1; that is, let be the maximum delay of all edges in the AS minimized by Algorithm 1, and let be the set of all kinds of k-connected subgraphs of with the same vertices ; then we have . The correctness of Algorithm 1 is provided in Section 4.
3.3. Phase 3: Inter-AS Topology Control
In this phase, connectivity between adjacent AS networks is considered. In order to allow adjacent AS networks to discover each other, every node continues broadcasting hello message as in Phase 1 periodically. When node u receives a hello message from node v that belongs to a different AS (e.g., they have different ), u will place v's information in its border list. Then this border list is reported to the node's parent core. With these border lists, we present a distributed algorithm for inter-AS. This algorithm is described in Algorithm 2, where G represents the PSN, and let (AS) be partitioning of G.
Algorithm 2: Inter-AS topology control.
Input: (at AS )
k (required connectivity)
Output:
Links for all nodes in 's border list.
Begin:
, ,
for all subject to do
← sort all edges in in ascending order of weight (as defined in Definition 1)
% is the number of edges in
ifthen
for all edges in the order do
Find the smallest t, subject to , where , and is the number of
edges in M,
end for
, where is the weight of
else
for all edges in the order do
Find the smallest t, subject to , and
end for
end if
Send to neighbor AS
end for
Collect from neighboring AS
for all subject to do
if there does not exist subject to
then
end if
end for
Return
In this algorithm, the core of AS A checks whether there exist k disjoint links from this AS to each adjacent AS B. That is accomplished by applying an algorithm () [26] that computes a matching of maximum cardinality in a bipartite graph defined by the nodes in respective AS networks and the edges with one vertex in each AS. If k does not exceed the size of maximum cardinality matching, the core of AS A selects k disjoint links that meet the min-max delay optimal. When there do not exist k disjoint links between A and B (only disjoint links), the core preserves the -connectivity between these two AS networks and minimizes the maximum delay between them. Note that this connectivity preservation (-connectivity) cannot guarantee k-connectivity between AS A and B. However, global k-connectivity can be guaranteed after Phase 3 is completed when connectivity with other neighboring AS networks is already established. This will be proved in Section 4.
Parameter in Algorithm 2 is used to perform an optimization which removes unnecessary links between certain adjacent AS networks, while preserving the connectivity of the resulting topology. is the maximum delay of the selected k links. However, when the number of disjoint links between two adjacent AS networks is less than k, is ∞. Then, AS A will not connect to neighboring AS B directly if it observes that there exists another AS C, where C is also a neighbor of B, and both and are less than .
After Phase 3 is completed, each node is assigned a link list, and nodes connect to each other according to these lists. This topology will be maintained by every node with hello message periodically and always preserve the objective connectivity of the network.
4. Proof of Strong Connectivity
In this section, we prove the strong connectivity of Algorithms 1 and 2 [27]. The results are given as the following theorems.
Algorithm 1 can preserve k-connectivity of AS ; that is, . And the maximum delay among all nodes in the network is minimized by Algorithm 1.
Before proving the correctness of Theorem 5, two lemmas are first provided. Let be the path from node u to v (as defined in Definition 2). Let the maximal set of disjoint paths from node u to v in graph be represented by ; that is, , . If edge , let be the resulting graph by removing the edge from .
Lemma 6.
Let u and v be two vertices in the k-connected graph ; if u and v are still k-connected after the removal of edge , then .
In order to prove , we prove that is connected with the removal of any vertices from . We already know that u and v are k-connected in . Thus, considering any two vertices , we assume that . We only need to prove that is still connected to after the removal of set vertices , where . If is an edge in , that is obviously true. Hence, we only consider the case that there is no direct edge from to .
Since , we have , where is the number of paths in the set . Let be the number of paths in that are broken after the removal of vertices in the set of X; that is, . We know that paths in are disjoint, so the removal of any one vertex in X can only break at most one path in . Given , we have .
Let be the resulting graph by removing X from . If , we have ; that is, is still connected to in . Otherwise, ; it occurs only if the removal of edge breaks one path . Without loss of generality, let the order of vertices in the path be . Since the paths in are disjoint, the removal of edge breaks at most one path; that is, . So we have .
If , it is obvious that . Hence . That is, is still connected to in . Otherwise, if , every vertex in the set X belongs to the paths in . We know that is disjoint with the paths in , so we have . Hence, no vertex in is removed with the removal of X. So, with the removal of , is still connected to u, and v is still connected to in . With the assumption that u and v are still k-connected after the removal of edge in Lemma 6. it is obvious that u is still connected to v in . So is still connected to in .
We have proved that, for any two vertices , is connected to with the removal of any vertices from . Hence, .
Lemma 7.
Let and be two graphs, where and . If every edge subject to satisfies that u is still k-connected to v in graph , then .
Without loss of generality, let be a set of edges subject to . We define a series of subgraphs of : , and , where . Then . Here we prove Lemma 7 by induction.
Base. Obviously, we have and .
Induction. If , we prove that , where . Since , and from the assumption of Lemma 7 ( is k-connected to in graph ), we obtain that is k-connected to in graph . Applying Lemma 6 to , it is obvious that . That is, .
By induction, we have . Since , hence .
Finally, we prove the correctness of Theorem 5 as follows.
In Algorithm 1, we place all edges into in the ascending order. Whether should be placed into depends on the connection of u and v and edges of smaller weights. That is, every edge should satisfy that u is k-connected to v in . Applying Lemma 7 here, then we can prove that .
Recall that is the maximum delay of all edges in the AS minimized by Algorithm 1, and is the set of all kinds of k-connected subgraphs of with the same vertices . The maximum delay among all edges in the network is minimized by Algorithm 1 which can be described as .
Let be the last edge that is placed into . It is obvious that cannot be removed from in the process of Algorithm 1; that is, . Let ; then we obtain that . Now, we assume that there is graph , where and . If we can prove that is not true, we will obtain that any should have at least one edge equal to or heavier than . That is, . We prove that is not true by contradiction in the following.
Assume that ; hence, . We have . Since all edges are placed into in the ascending order, should satisfy that u is k-connected to v in . Applying Lemma 7 here, we obtain that . That is, , which is a contradiction.
In order to prove , we prove is connected with the removal of any vertices from it. Since , we have and ; that is, consider any or ; u is k-connected to v. Then we only need to consider the case .
Since , , is connected to with the removal of any vertices from . With and , we know that u is connected to , and v is connected to . Hence u is connected to v. That is, is connected with the removal of any vertices from it.
Corollary 10.
Let subgraphs be partitioning of G. Let be the maximal set of subgraphs subject to the following: , . Then, is k-connected.
Lemma 11.
Let be a subgraph of G, and let be edges reduction of . Let . If , then .
In order to prove , we prove that, is connected with the removal of any vertices from . Without loss of generality, three cases are considered in the following:
: it is obviously true because of .
and : since , u is connected to v in path p with the removal of any vertices in G. If , p also exists in ; u is connected to v by removing those vertices. Otherwise, and a is connected to v in . Since , u is connected to a by removing those vertices. Then u is connected to v with the removal of any vertices in .
: similarly, since , u is connected to v in path p with the removal of any vertices in G. If , u is k-connected to v in . Otherwise, , u is connected to , and is connected to v in . Since , is connected to by removing those vertices. Then u is connected to v with the removal of any vertices in .
Corollary 12.
Let be k-connected subgraphs of k-connected graph G. Let be edges reduction of , and are k-connected. Then,
is k-connected.
Lemma 13.
Let be the initial topology of the PSN. Let be the topology after Algorithm 2 is completed. Let be the AS networks resulting from Phase 1 in the topology control, where and . Let , where . Then, subject to , we have that .
Since nodes of any intra-AS are k-connected, we take an AS as a node here. Formally, we represent graph G as , where and . Actually, edge contains at least k disjoint paths between and . Let be the AS level representation of , where . We use to represent the set of AS networks in , because we do not need to consider the topology of intra-AS (both and are k-connected). We take all of them as nodes, so we consider and as the same edge. Recall that, in Algorithm 2, each edge has weight .
In order to prove Lemma 13, it suffices to show that, , is connected to in . We order all edges in in the ascending sequence of weights and then judge whether an edge should be placed into . Without loss of generality, let the ordering be , where . Then we prove Lemma 13 by induction.
Base. Obviously, the pair of AS networks corresponding to edge should always be placed into ; that is, .
Induction. , if for all , the pair of AS networks corresponding to are connected in (either directly or indirectly). And suppose . From Algorithm 2, the only reason why ( is not directly connected to in ) is that there exists another AS , where both and are less than . However, edges and come before in the ascending order. From path , is connected to in .
By induction, we prove that is connected to in , and then .
Finally, we prove the correctness of Theorem 8. In the proof, and have the same definition in Lemma 13.
For every AS , we know that is true after Algorithm 1. Then we partition those AS networks into sets , where each set contains AS networks which are multihop k-connected in G; that is, , then . Then we define sets , where, . Applying Lemma 13 here, for every , , we have . Take as a subgraph of ; , where and . Since only contains multihop k-connected subgraphs, applying Corollary 10 here, we have that is k-connected. Then, applying Corollary 12 here, we have that
is k-connected. Then .
5. Control Message Complexity Analysis
We study the control message complexity here by computing the total number of control messages exchanged during the three phases of the DMTC algorithm. The following terms are used in the complexity analysis.
Let N be the total number of nodes in the PSN. Let S be the number of AS networks, and let be the average number of nodes per AS; that is, . Let be the average probability of nodes that are border nodes in an AS, where . Let be the average number of neighboring AS networks for each AS; that is, .
Table 1 shows the average control messages utilized in each phase to complete the topology algorithm for each AS. We partition each phase into major steps. Hence, from Table 1, the total number of control messages required in the PSN is . It can be simplified as , which is in the worst case.
Average message complexity in each phase of an AS.
Steps in each phase
Number of control messages
Phase 1:
Each node announces its existence
Core of the AS is selected with λ cycles
Each node announces its current role
Phase 2:
Core node computes the intra-AS topology
0
Phase 3:
All border nodes report their border lists to the parent core
Core node distributes vector to its border nodes
1
Border nodes send vector to border nodes of other AS networks
Border nodes of other AS networks report vector to their parent core
Core node sends the link list to the AS members
1
6. Simulation Results and Discussions
In this section, we present several sets of simulation results to evaluate the effectiveness of the proposed DMTC algorithm. Recall that the proposed algorithm is a hybrid of centralized algorithm and distributed algorithm. We compare it with typical centralized algorithm [19] and distributed algorithm [19]. We chose these two algorithms because they are also min-max optimal as our algorithm. These simulations were carried out using the NS2 simulator.
In this simulation study, the wireless channel is symmetric (i.e., both the sender and the receiver should observe the same channel fading) and obstacle-free, and each node has an equal maximal transmission range km. Nodes are randomly distributed in a region. In order to study the effect of AS size on the resulting topologies, we vary the number of nodes in the region among 125, 150, 175, 200, 225, and 250.
For each network, we consider
k-connectivity: and ;
algorithms: the proposed hybrid algorithm DMTC, centralized algorithm , and distributed algorithm ;
1000 Monte Carlo simulations.
Relative to DMTC, recall that, in Phase 1 of AS network formation, we configure that each node is at most one hop away from its parent core. In our simulations, algorithm in Phase 1 generates AS networks where the average number of nodes per AS is 6.39, 7.48, 8.51, 9.69, and 10.69 (results of 1000 simulations), respectively. Note that, by varying the number of nodes in the network while maintaining other parameters such as the region size and maximal transmission range of nodes, we implicitly adjust the node degree of these topology control algorithms.
Before providing the experimental results regarding time delay, we first observe the actual topologies for one simulated network using DMTC algorithm. Four figures are given here:
Figure 3(a) shows the original physical topology without topology control. All nodes communicate with the maximal transmission range .
Figure 3(b) shows the topology after applying algorithm of Phase 1. Nodes of the PSN are divided into 17 AS networks, where the average number of nodes per AS is 7.35.
Figure 3(c) is the topology resulting from the intra-AS topology control algorithm of Phase 2, when .
Figure 3(d) shows the topology after applying inter-AS topology control algorithm of Phase 3, when . The inter-AS links are represented by black color.
Network topologies of 125 nodes with different topology control settings. (a) Without topology control. (b) After applying algorithm of Phase 1. (c) , after applying algorithm of Phase 2. (d) , after applying algorithm of Phase 3.
In Figure 4, we show average and maximum delay between two nodes which are obtained from three topology control algorithms (the proposed hybrid algorithm DMTC, centralized algorithm [19], and distributed algorithm [19]). Note that we only consider link propagation delay in this simulation. It is evident from those results that DMTC is very effective in reducing the delay between nodes. Recall that the maximal transmission range of one node is 450 km. The corresponding delay is 1.501 ms. When (Figure 4(a)), DMTC reduces the maximum delay to 1.106 ms when there are 125 nodes in the PSN and as low as 0.703 ms when there are 225 nodes. The maximum delay is approximately 13.6% to 20.1% lower than distributed algorithm and 6.1% to 18.6% higher than centralized algorithm. For the average delay, DMTC reduces the delay to 0.656 ms when there are 125 nodes in the PSN and as low as 0.451 ms when there are 225 nodes, which is approximately 5.2% to 10.3% lower than distributed algorithm and 8.5% to 10.9% higher than centralized algorithm.
Results from three topology control algorithms (DMTC, , and showing average and maximum link delay when (a) and (b) and (c) average node degree).
When (Figure 4(b)), both the maximum and average delay resulting from DMTC, , and are all higher than those when . That is expected because 2-connected connectivity is a stronger property than 1-connected connectivity. What is more, the difference among the three algorithms when is in a greater range than when . This is the consequence of having to maintain another higher delay link between adjacent AS networks and one more additional disjoint path from each node to other nodes within all AS networks. The maximum delay is approximately 18.5% to 20.9% lower than distributed algorithm and 10.3% to 17.8% higher than centralized algorithm. The average delay is approximately 12.5% to 18.6% lower than distributed algorithm and 8.2% to 15.6% higher than centralized algorithm.
The delay performance of the proposed algorithm DMTC falls in between and . This is expected because DMTC is a hybrid of centralized algorithm and distributed algorithm. Even though centralized algorithm has better delay performance (less than 20%), they are not suitable for large scale networks. Because excessive amounts of control messages need to be collected by one central entity, and long delay makes the control messages exchanged with remote nodes costly. However, the control message exchange in DMTC is constrained among neighboring AS networks, and the delay performance is better than distributed algorithm in the simulation result. Thus, the proposed DMTC algorithm is better than centralized algorithm and distributed algorithm for PSN.
Figure 4(c) shows the average node degrees produced by DMTC versus a network without topology control. It is obvious that the node degree of a network with DMTC does not depend on the size or density of the network.
Figure 5 illustrates the number of messages exchanges required per node to complete DMTC in our simulation environment. Recall that the message complexity of the DMTC algorithm is . For each node, the average number of messages required is . The result validates the analysis. When the number of nodes in the PSN increases from 125 to 225, the average number of messages required per node in DMTC does not increase. This shows that the DMTC algorithm has little extra overhead.
Number of messages exchanges per node in DMTC when the number of nodes in the PSN increases.
7. Conclusion
We studied the topology control problem in the PSN using an AS approach. The motivation was that the AS network model decouples the complex PSN into simple AS networks. Then we proposed the DMTC algorithm to minimize time delay in the PSN. Compared with most existing approaches where either the purely centralized or the purely distributed control method is adopted, DMTC utilizes a hybrid method. In this way, not only is the control message exchange constrained among local neighboring AS networks, but also the strong connectivity of the network is preserved. Our simulation results validated the theoretic analysis and effectiveness of the DMTC algorithm.
Although the assumptions stated in Sections 2 and 6 are widely used in existing topology algorithms, some of them may not be practical. Our future work will focus on how to relax these constraints (e.g., nodes in the PSN are homogeneous, obstacle-free channel and equal ) for DMTC algorithm so as to improve its practicality in real applications. In addition, we find that the proposed “hybrid approach” is a general method. It can be extended to solve the control problem of many other large scale networks, for example, machine-to-machine (M2M) network and space information network (SIN). Different topology control algorithms can be applied within AS network and between adjacent AS networks, depending on the optimization objective. And each AS network can be further separated into sub-AS networks. We will study these issues in the near future.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This work was supported by NSF of China under Grants nos. 91338201 and 91438109.
References
1.
AkyildizI. F.AkanÖ. B.ChenC.FangJ.SuW.The state of the art in interplanetary internetIEEE Communications Magazine200442710811810.1109/MCOM.2004.13165412-s2.0-3242796653
2.
MukherjeeJ.RamamurthyB.Communication technologies and architectures for space network and interplanetary internetIEEE Communications Surveys and Tutorials201315288189710.1109/SURV.2012.062612.001342-s2.0-84877584162
3.
AranitiG.BisioI.De SanctisM.Interplanetary networks: architectural analysis, technical challenges and solutions overviewProceedings of the IEEE International Conference on Communications201015
4.
GouL.ZhangG.-X.BianD.-M.XueF.HuJ.Efficient broadcast retransmission based on network coding for interplanetary internetChina Communication2013108111124
5.
AlenaR.GilbaughB.GlassB.BrahamS. P.Communication system architecture for planetary explorationIEEE Aerospace and Electronic Systems Magazine2001161141110.1109/62.9650052-s2.0-0035509229
6.
ZhaiX.-J.JingH.-Y.VladimirovaT.Multi-sensor data fusion in Wireless Sensor Networks for Planetary ExplorationProceedings of the NASA/ESA Conference on Adaptive Hardware and Systems (AHS ′14)July 201418819510.1109/ahs.2014.68801762-s2.0-84906675933
7.
RodriguesP.OliveiraA.AlvarezF.OddiG.LiberatiF.CabasR.VladimirovaT.ZhaiX.JingH.CrosnierM.Space wireless sensor networks for planetary exploration: node and network architecturesProceedings of the NASA/ESA Conference on Adaptive Hardware and Systems (AHS ′14)July 201418018710.1109/ahs.2014.68801752-s2.0-84906709220
8.
GuoB.-Y.GuanQ.-S.YuF. R.JiangS.-M.LeungV. C. M.Energy-efficient topology control with selective diversity in cooperative wireless ad hoc networks: a game-theoretic approachIEEE Transactions on Wireless Communications201413116484649510.1109/twc.2014.23258642-s2.0-84910144658
9.
AoX.YuF. R.JiangS.GuanQ.-S.LeungV. C. M.Distributed cooperative topology control for WANETs with opportunistic interference cancelationIEEE Transactions on Vehicular Technology201463278980110.1109/tvt.2013.22781012-s2.0-84896818642
10.
LiuL.LiuY.ZhangN.A complex network approach to topology control problem in underwater acoustic sensor networksIEEE Transactions on Parallel and Distributed Systems201425123046305510.1109/tpds.2013.22957932-s2.0-84911899478
11.
ShangD.ZhangB.YaoZ.LiC.An energy efficient localized topology control algorithm for wireless multihop networksJournal of Communications and Networks201416437137710.1109/JCN.2014.0000662-s2.0-84907194201
12.
HuangM.ChenS.ZhuY.WangY.Topology control for time-evolving and predictable delay-tolerant networksIEEE Transactions on Computers201362112308232110.1109/tc.2012.2202-s2.0-84884891990
13.
LiM.LiZ.VasilakosA. V.A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issuesProceedings of the IEEE2013101122538255710.1109/jproc.2013.22576312-s2.0-84889567969
14.
SardellittiS.BarbarossaS.SwamiA.Optimal topology control and power allocation for minimum energy consumption in consensus networksIEEE Transactions on Signal Processing201260138339910.1109/TSP.2011.21716832-s2.0-84555191901
15.
AwwadO.Al-FuqahaA.KhanB.BrahimG. B.Topology control schema for better QoS in hybrid RF/FSO mesh networksIEEE Transactions on Communications20126051398140610.1109/tcomm.2012.12.1100692-s2.0-84861149847
16.
AzizA. A.ŞekercioǧluY. A.FitzpatrickP.IvanovichM.A survey on distributed topology control techniques for extending the lifetime of battery powered wireless sensor networksIEEE Communications Surveys and Tutorials201315112114410.1109/surv.2012.031612.001242-s2.0-84873710092
17.
RamanathanR.Rosales-HainR.Topology control of multihop wireless networks using transmit power adjustment2Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ′00)2000Tel Aviv, IsraelIEEE40441310.1109/INFCOM.2000.832213
18.
YuJ.RohH.LeeW.PackS.DuD.-Z.Topology control in cooperative wireless ad-hoc networksIEEE Journal on Selected Areas in Communications20123091771177910.1109/jsac.2012.1210222-s2.0-84866926636
19.
LiN.HouJ. C.Localized fault-tolerant topology control in wireless ad hoc networksIEEE Transactions on Parallel and Distributed Systems200617430732010.1109/tpds.2006.512-s2.0-33644903750
20.
WattenhoferR.LiL.BahlP.WangY.-M.Distributed topology control for power efficient operation in multihop wireless ad hoc networksProceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications SocietiesApril 2001138813972-s2.0-0035009294
21.
ChiweweT. M.HanckeG. P.A distributed topology control technique for low interference and energy efficiency in wireless sensor networksIEEE Transactions on Industrial Informatics201281111910.1109/TII.2011.21667782-s2.0-84856352376
22.
DjukicP.ValaeeS.Delay aware link scheduling for multi-hop TDMA wireless networksIEEE Transactions on Industrial Informatics2012811119
23.
CaoM.-L.Algorithms research of autonomous navigation and control of planetary exploration roverProceedings of the Control and Decision ConferenceMay 2010Xuzhou, China43594364
24.
NingX.-N.LiuL.-L.A two-mode INS/CNS navigation method for lunar roversIEEE Transactions on Instrumentation and Measurement20146392170217910.1109/tim.2014.23079722-s2.0-84906324212
25.
GoldbergS. B.MaimoneM. W.MatthiesL.Stereo vision and rover navigation software for planetary explorationProceedings of the IEEE Aerospace Conference2002IEEE2025203610.1109/aero.2002.10353702-s2.0-84879375888
26.
AzadA.HalappanavarM.RajamanickamS.BomanE. G.KhanA.PothenA.Multithreaded algorithms for maximum matching in bipartite graphsProceedings of the 26th IEEE International Parallel & Distributed Processing Symposium (IPDPS ′12)May 2012Shanghai, ChinaIEEE86087210.1109/IPDPS.2012.82