30
1 3 A centrality-based topology control protocol for wireless mesh 4 networks 5 6 7 Andrés Vázquez-Rodas Q1 , Luis J. de la Cruz Llopis 8 Department Q2 of Telematics Engineering, Universitat Politècnica de Catalunya (UPC), C. Jordi Girona 1-3, 08034 Barcelona, Spain 9 11 article info 12 Article history: 13 Received 28 February 2014 14 Received in revised form 30 June 2014 15 Accepted 28 July 2014 16 Available online xxxx 17 Keywords: 18 Topology control 19 Wireless mesh networks 20 Social network analysis 21 Centrality metrics 22 Connected dominating set 23 24 abstract 25 Nodes in wireless multi-hop networks establish links with their neighbors, which are used 26 for data transmission. In general, in this kind of networks every node has the possibility of 27 acting as a router, forwarding the received packets when they are not the final destination 28 of the carried data. Due to the routing protocol procedures, when the network is quite 29 dense the overload added by the routing management packets can be very high. To reduce 30 the effects of this overload a topology control mechanism can be used, which can be imple- 31 mented using different techniques. One of these techniques consists of enabling or 32 disabling the routing functionality in every node. Many advantages result from selecting 33 just a subset of nodes for routing tasks: reduction of collisions, protocol overhead, interfer- 34 ence and energy consumption, better network organization and scalability. In this paper, a 35 new protocol for topology control in wireless mesh networks is proposed. The protocol is 36 based on the centrality metrics developed by social network analysts. Our target network is 37 a wireless mesh network created by user hand-held devices. For this kind of networks, we 38 aim to construct a connected dominating set that includes the most central nodes. The 39 resulting performance using the three most common centrality measures (degree, close- 40 ness and betweenness) is evaluated. As we are working with dynamic and decentralized 41 networks, a distributed implementation is also proposed and evaluated. Some simulations 42 have been carried out to analyze the benefits of the proposed mechanism when reactive or 43 proactive routing protocols are used. The results confirm that the use of the topology 44 control contributes to a better network performance. 45 Ó 2014 Published by Elsevier B.V. 46 47 48 49 1. Introduction 50 Smart environments, smart devices, smart interaction, 51 computing anytime and anywhere, ..., the accelerated 52 development of information technologies and mobile 53 devices results in people and/or ‘‘things’’ increasingly 54 dependent on the online services offered through the Inter- 55 net. In such scenario, Wireless Mesh Networks (WMNs) 56 have evolved as a cost effective possible solution for user 57 uninterrupted access to networking facilities. Valued fea- 58 tures like robustness, reliability, easy deployment and 59 maintenance, self-forming and self-configuration, make 60 WMNs an important alternative to achieve an always-on 61 connectivity. Among the three typical architectures of 62 WMNs [1], the present work focus on the client meshing 63 one. In this case, the end-user devices are able to simulta- 64 neously provide application interface, routing and network 65 configuration capabilities. Nowadays, the most common 66 hand-held device used by an increasing number of people 67 is the smart phone. The evolution of such mobile devices 68 with their variety of embedded sensors results now in a 69 not only communication equipment, but a complete http://dx.doi.org/10.1016/j.adhoc.2014.07.026 1570-8705/Ó 2014 Published by Elsevier B.V. Corresponding author. Tel.: +34 93 401 7027. E-mail addresses: [email protected] (A. Vázquez-Rodas Q1 ), [email protected] (L.J. de la Cruz Llopis). Ad Hoc Networks xxx (2014) xxx–xxx Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc ADHOC 1083 No. of Pages 30, Model 3G 8 August 2014 Please cite this article in press as: A. Vázquez-Rodas Q1 , L.J. de la Cruz Llopis, A centrality-based topology control protocol for wireless mesh networks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014.07.026

A centrality-based topology control protocol for wireless mesh networks

  • Upload
    luis-j

  • View
    215

  • Download
    3

Embed Size (px)

Citation preview

1

3

4

5

6

7 Q1

8 Q2

9

1 1

1213141516

17181920212223

2 4

48

49

50

51

52

53

54

55

56

Q1

Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

Contents lists available at ScienceDirect

Ad Hoc Networks

journal homepage: www.elsevier .com/locate /adhoc

A centrality-based topology control protocol for wireless meshnetworks

http://dx.doi.org/10.1016/j.adhoc.2014.07.0261570-8705/� 2014 Published by Elsevier B.V.

⇑ Corresponding author. Tel.: +34 93 401 7027.E-mail addresses: [email protected] (A. Vázquez-Rodas),

[email protected] (L.J. de la Cruz Llopis).

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopis, A centrality-based topology control protocol for wirelesnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014.07.026

Andrés Vázquez-Rodas ⇑, Luis J. de la Cruz LlopisDepartment of Telematics Engineering, Universitat Politècnica de Catalunya (UPC), C. Jordi Girona 1-3, 08034 Barcelona, Spain

252627282930313233343536

a r t i c l e i n f o

Article history:Received 28 February 2014Received in revised form 30 June 2014Accepted 28 July 2014Available online xxxx

Keywords:Topology controlWireless mesh networksSocial network analysisCentrality metricsConnected dominating set

37383940414243444546

a b s t r a c t

Nodes in wireless multi-hop networks establish links with their neighbors, which are usedfor data transmission. In general, in this kind of networks every node has the possibility ofacting as a router, forwarding the received packets when they are not the final destinationof the carried data. Due to the routing protocol procedures, when the network is quitedense the overload added by the routing management packets can be very high. To reducethe effects of this overload a topology control mechanism can be used, which can be imple-mented using different techniques. One of these techniques consists of enabling ordisabling the routing functionality in every node. Many advantages result from selectingjust a subset of nodes for routing tasks: reduction of collisions, protocol overhead, interfer-ence and energy consumption, better network organization and scalability. In this paper, anew protocol for topology control in wireless mesh networks is proposed. The protocol isbased on the centrality metrics developed by social network analysts. Our target network isa wireless mesh network created by user hand-held devices. For this kind of networks, weaim to construct a connected dominating set that includes the most central nodes. Theresulting performance using the three most common centrality measures (degree, close-ness and betweenness) is evaluated. As we are working with dynamic and decentralizednetworks, a distributed implementation is also proposed and evaluated. Some simulationshave been carried out to analyze the benefits of the proposed mechanism when reactive orproactive routing protocols are used. The results confirm that the use of the topologycontrol contributes to a better network performance.

� 2014 Published by Elsevier B.V.

47

57

58

59

60

61

62

63

64

65

1. Introduction

Smart environments, smart devices, smart interaction,computing anytime and anywhere, . . ., the accelerateddevelopment of information technologies and mobiledevices results in people and/or ‘‘things’’ increasinglydependent on the online services offered through the Inter-net. In such scenario, Wireless Mesh Networks (WMNs)have evolved as a cost effective possible solution for user

66

67

68

69

uninterrupted access to networking facilities. Valued fea-tures like robustness, reliability, easy deployment andmaintenance, self-forming and self-configuration, makeWMNs an important alternative to achieve an always-onconnectivity. Among the three typical architectures ofWMNs [1], the present work focus on the client meshingone. In this case, the end-user devices are able to simulta-neously provide application interface, routing and networkconfiguration capabilities. Nowadays, the most commonhand-held device used by an increasing number of peopleis the smart phone. The evolution of such mobile deviceswith their variety of embedded sensors results now in anot only communication equipment, but a complete

s mesh

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

2 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

sensing system [2]. Numerous applications are emerging inmany fields like health, traffic, human behavior, environ-ment monitoring, social networking and commerce [2].With this perspective it is entirely feasible to consider aWMN composed by mobile phone users moving around acity as a cost-effective complement to commercial cellularnetworks. One of the major concerns in this kind of devicesis related to their energy consumption. Therefore, optimi-zation techniques that aim to reduce it are always required[3].

Topology control techniques have been developed toimprove the energy efficiency and the battery lifetime ofa variety of networks. It also aims to reduce collisions,protocol overhead, and interference by means of a bettercontrol over the network connections and redundancy[4]. In general, there are three main types of topology con-trol approaches [4]. First, power control techniques [5,6],adjust the communication range of the wireless nodes bymeans of the transmission power of their transceivers. Thisway, nodes are able to better manage their neighborhoodsize, interference level, power consumption and connectiv-ity. Secondly, power mode mechanisms [7,8] control theactive or sleep operation modes of the nodes to dispensewith redundant stations and still achieve the desiredconnectivity. Finally, hierarchical clustering approaches[9–11] aim to construct an efficient virtual backbone fordata forwarding by the selection of a connected dominat-ing set (CDS). From graph theory, a CDS of a graph is a con-nected subset in which all the nodes that does not pertainat that subset have at least one adjacent neighbor insidethe subset. Due to the reduced number of nodes develop-ing routing task, the main advantages of this CDS-basedtopology control are: collisions, protocol overhead andenergy consumption reduction, efficient network organiza-tion and scalability improvement. In this work we evaluatean alternative method for this last category of topologycontrol based on social network analysis metrics.

In this context, thanks to the increasing availability ofnetwork maps which depicts the behavior of complex sys-tems and the universality of their characteristics [12], net-work science appears as the renewed study of the structureand the dynamic behavior of a variety of networked sys-tems [13]. Accordingly, social network analysts have devel-oped an important set of measures and metrics whichallow understanding the behavior and quantify the topol-ogy features of a diversity of networks [14]. Specifically,in this work we focus on centrality metrics developed toidentify the most important actors (nodes) in a networkby means of graph theory definitions and concepts.

In summary, the purpose of this work is to present andevaluate an alternative topology control mechanism basedon centrality measures borrowed from social networkanalysis. This topology optimization has been applied toa client wireless mesh network formed with user hand-held devices.

The rest of the paper is organized as follows. In Section2 we report and analyze the related work. Section 3 pro-vides a background on centrality metrics. Section 4 pre-sents and evaluates the proposed topology controlmechanism. A performance evaluation has been carriedout by means of simulations, taking into account both

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

reactive and proactive routing protocols. The results arepresented in Section 5. Finally, the conclusions and futureworks are summarized in Section 6.

2. Related work

Nowadays, the application of complex networks tech-niques and social network analysis concepts to improvethe performance of wireless ad hoc networks is growingas a fertile research area [15]. Some recent works are sum-marized in the following. [16–18] apply the small worldphenomena, re-popularized by [19], to reduce the averagepath length of the network. The basic idea of these propos-als is to modify the physical topology of the network basedon the social features of the underlying graph. The smallworld property (or low average path length) could beachieved either by the aggregation of long-ranged links[17] or by a combination of rewiring, deletion and/or addi-tion of links/nodes [16]. Authors in [18] combine centralitymeasures with directional beamforming to create long-range links between more central nodes. The same authorsextend their study to sparse highly partitioned networks in[20].

SimBet [21] is a routing protocol designed for delay-tolerant MANETs. It uses two social network analysismetrics (centrality and similarity) for message forwardingdecisions. Betweenness centrality is selected to identifymore suitable bridge nodes, and the similarity measure isused to find nodes that are closer to the destination neigh-borhood. A utility function combines the similarity and thebetweenness utilities and allows adjusting the relativeimportance of them. For performance evaluation both util-ities has been assigned the same importance. For their part,authors in [22] apply social network analysis metrics todetect critical nodes in a WMN. They show how networkreliability substantially degrades when coordinated attacksare directed to highest centrality nodes. Simulations evincethat nodes with high betweenness centrality exhibit agreater impact than nodes with high degree or closenesscentrality. Authors also propose a socially-aware TDMAchannel access scheduling algorithm. The main idea is togive higher priority (assigning more time slots) to nodeswith high closeness centrality values. Simulations showimportant throughput improvements at the expense ofincreased delay.

The time-evolution of the topological characteristics ofvehicular networks from the perspective of graph theoryand social network analysis is the subject addressed in[23]. It is confirmed that relevant and useful informationabout the behavior of the VANETs could be inferred fromthe centrality metrics. The importance of nodes with highcentrality values on the design of more efficient VANETprotocols is also discussed.

A topology control algorithm for WSN based in edgebetweenness centrality [24] is proposed in [25]. This met-ric is used to identify most relevant edges or links betweennodes, regarding energy consumption. For each node, theaim of the proposal is to select a set of logical neighborsthat minimize energy consumption and fulfill QoS require-ments. Simulation results show better performance of thisproposal in comparison with traditional topology control

is, A centrality-based topology control protocol for wireless mesh.07.026

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241242

244244

245

246

247

248

249

250

251

252

253

254255

257257

258

259

260

261

262

263

264

265

266

267268

270270

271

272

273

274

275

276

277

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 3

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

methods in terms of number of logical neighbors, energyconsumption, latency and hit-ratio (percentage of servedqueries).

Authors in [26] propose a routing protocol based on aconnected dominating set (CDS). A simple marking processis used to establish the initial CDS: a node is designed asgateway if it has at least two unconnected neighbors. Thisinitial CDS is reduced by the application of rules based onthe node IDs. An extension of the selective removal rulesare presented in [9]. In this case the degree and the energylevel of the nodes are considered to reduce the CDS and toachieve balanced energy consumption. In [27] ConnectedDominating Sets with bounded diameters are taken intoaccount. To construct these DS with the smallest size,authors propose and evaluate two centralized algorithmsand one distributed version. On the other hand, given thefact that the transmission ranges of all network nodes arenot necessarily equal, authors in [28] model the networkby means of a Directed Graph and propose two differentsolutions for the case in which all the network links arebidirectional. A recent and extensive survey on energy-aware distributed topology control algorithms is presentedin [4].

Many topology control mechanisms are intended tosensor networks in which the dominant data flow tradi-tionally goes from the sensor nodes to the sink. In thiswork we focus on mesh networks in which it is more com-mon that every node may be origin or destination of thedata flow. On the other hand, we evaluate the use of cen-trality metrics which are calculated both in a centralizedor a distributed way. Besides, we propose and evaluate adistributed implementation of the router selection mecha-nism, as well as different possibilities to achieve total net-work connectivity.

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

3. Background on centrality

Centrality is one of the most useful mathematical mea-sures developed by social network analysts to capture thestructural properties of social relationships. It aims to iden-tify the most important actors/vertices within a graph thatrepresents any physical network. Centrality metrics couldbe based mainly on the degree of a vertex (number ofedges connected to it [14]) or on the geodesic distancesbetween them [15]. In the following we present a sum-mary of the three most useful centrality metrics.

Degree Centrality is the simplest centrality metric. It isdefined as the number of edges (links) attached to a vertex(node) [29]. In a WMN the degree centrality of a mesh sta-tion can be viewed as the number of one-hop neighborswith which it has been established a peer link. This central-ity is generally scaled by the number of nodes N in order tobe a measure independent of the network size. Then, thedegree centrality Dci for the node i is computed as:

Dci ¼PN

j¼1 xij

N � 1ð1Þ

where xij ¼ 1 if there is a link between node i and node jand xij ¼ 0 otherwise. In some networks, it could resultlogical to think that a node which has links to many others

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

(high degree centrality) has greater impact in the networkthan nodes with few links.

Closeness Centrality aims to identify nodes that spreadmessages in shorter time [29]. For that, this metric uses theconcept of geodesic path, which is the path with the short-est distance between two nodes. The closeness centralityCci for node i is computed as:

Cci ¼N � 1PN

j¼1 dij

ð2Þ

where i – j and dij is the geodesic distance between nodes iand j. In social networks, actors with high closeness cen-trality can communicate their ideas faster than actors withlower closeness centrality [14].

Betweenness Centrality measures the proportion ofshortest paths between any pair of nodes passing througha specific node [30]. The control over communications,connections and information flows could be dominatedby nodes with high betweenness centrality. The between-ness centrality Bci for node i is computed as:

Bci ¼XN

j¼1

Xj�1

k¼1

gjkðiÞ

gjkð3Þ

where i – j – k; gjk is the total number of geodesic pathsbetween node j and k, and gjkðiÞ is the number of geodesicpaths between node j and k that pass through node i.

4. Topology control mechanism and centralityevaluation

In this section we propose and evaluate a topology con-trol mechanism based on centrality metrics. We start witha description of the dynamic wireless mesh network sub-ject to analysis. Then, a centralized implementation andevaluation is presented in order to identify the most appro-priate centrality metric for our purpose. At this point, dif-ferent considerations are done for a practical distributedimplementation. Finally, the practical implementation ofthe protocol is presented.

4.1. Scenario under consideration

For the experimental evaluation we have considered adynamic wireless mesh network generated by the ns-3network simulator [31]. The mesh stations (nodes) arebased on the IEEE 802.11s amendment which is currentlyincorporated in the IEEE 802.11-2012 standard [32]. Thesimulation scenario consists of 100 mesh stations uni-formly distributed in a 1040 � 520 m area. According to[33] these values guarantee minimal quality criteria forstringent protocol evaluation. Specifically, the averageshortest-path hop count is greater than four hops (to avoidthat most of the data packets be interchanged just amongone or two-hop neighbors) and the average network parti-tioning is lesser than 5% (to avoid an excessive number ofisolated nodes). The nodes move according to a randomwalk 2D mobility model inside the rectangular bounds.Each node moves with a speed chosen randomly between2 and 4 m/s. The direction and speed of the nodes are

is, A centrality-based topology control protocol for wireless mesh.07.026

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

4 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

updated after they have moved 100 m. These values areselected with the assumption that the mobile nodes aretransported by people moving around a segment of a city.The initial node positions and their trajectories are shownin Fig. 1. For the wireless channel, the log-distance propa-gation loss model has been considered.

According to [32], before the transmission of dataframes, mesh stations must create and maintain a logicaltopology using the mesh peering management protocol.Every mesh station discovers its mesh neighbors (peers)by means of beacon frames which are periodically sent.When a new neighbor has been discovered, the meshstation starts a peer link open handshake. It begins with

Fig. 1. Initial node positions

Fig. 2. Centrality metrics for on

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

a Peering Open management frame that contains meshconfiguration parameters. If the target station agrees withsuch parameters, it responds with a Peering Confirm frame.The same procedure is executed in the opposite directionto ensure bidirectional links. Only if the complete hand-shake procedure is successfully executed, a peer link isestablished between two mesh stations. Standard doesnot specify why or when a peer link must be closed. Thens-3 mesh networking implementation [34] triggers aclose peer link procedure when the number of successivelost beacons achieves a maximum configurable value. Bydefault this threshold is set to 5. If there is an active dataflow, the ns-3 mesh model also executes a close procedure

and their trajectories.

e of the WMN snapshots.

is, A centrality-based topology control protocol for wireless mesh.07.026

329

330

331

332

333

334

335

336

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 5

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

when a station is unable to transmit to a peer a number ofsuccessive frames. This value is also set by default to 5.

337

338

339

340

341

342

4.2. Centralized implementation

Based on the presented scenario, first of all we haveanalyzed several snapshots of the mesh network datasettaken every 5 s. For each snapshot and for each node inside

Fig. 3. Resulting topology with the 40

5 10 15 20 25 300

0.1

0.2

0.3

0.4

0.5

0.6

0.7

t

Net

wor

k Fr

agm

enta

tion

Degree 40%RDegree 50%RCloseness 40%RCloseness 50%RBetweenness 40%RBetweenness 50%R

Fig. 4. Time evolution of the network fragmentation for the thre

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

the network we compute its degree, closeness andbetweenness centrality metrics. ORA [35] and UCINET[36] software have been used to centrality calculations,while network graphics are done with ORA. With the cen-trality values, we are able to rank and identify the mostcentral nodes from those three points of view. Fig. 2 showsthis ranking for one specific snapshot (at time = 5 s) and forthe three metrics. Blue nodes represent the most central

% most central nodes as routers.

35 40 45 50 55 60

[s]

e centrality metrics and for 40% and 50% selected routers.

is, A centrality-based topology control protocol for wireless mesh.07.026

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

375375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

Table 1Summary of the resulting network fragmentation and the number of links per connected node values.

Centrality %R Network fragmentation Links per connected node

Mean SD Max Mean SD Max

Degree 40 0.547 0.090 0.639 7.405 0.839 8.63550 0.356 0.148 0.579 7.226 0.424 8.158

Closeness 40 0.481 0.053 0.580 6.511 0.371 7.20550 0.352 0.030 0.393 6.796 0.362 7.395

Betweenness 40 0.113 0.042 0.173 5.430 0.212 5.69150 0.051 0.021 0.079 6.123 0.299 6.573

Fig. 5. Egocentric network structure from the perspective of the node N18.

6 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

stations and the red ones the least. As expected, Fig. 2confirms that different nodes are selected as most centralones for each different metric. This is because each metricevaluates a very different parameter and there is no rela-tionship among them.

As previously said, to reduce the complexity, communi-cation overhead and energy consumption of the network,we want to find a subset of mesh stations that forms a con-nected dominating set. So, instead of allowing each node toperform routing tasks, we choose only the most centralstations to do it. In a roughly first approach, we limit thenumber of routers to the forty (40%) most central nodesfor each network dataset and for each centrality metric.We virtually remove all the links between non-routerstations and keep all the other. If a non-router stationhas a link with more than one router, we keep all theselinks in order to preserve network resilience and to enablefuture load balancing and fair energy consumptionimprovements. Fig. 3 shows the resulting virtual topologyfor each centrality metric and for the same snapshot con-sidered in Fig. 2. Blue nodes represent the selected routers,the green are the mesh stations that have a link with atleast one router and the red represents the isolated nodes.

To determine which of the centrality metrics is the mostsuitable for our topology control application, we compare(for all the network datasets and for the three centralitymetrics) the resulting network fragmentation F, that is,the proportion of nodes in a network that are disconnectedfrom each other. It can be computed in an efficient waythrough the following equation [37]:

F ¼ 1�P

k sk sk � 1ð ÞN N � 1ð Þ ð4Þ

where sk is the number of nodes of the kth component ofthe graph that represents the network.

Fig. 4 shows the time-evolution of the network frag-mentation for the three centralities and for two differentpercentages of selected routers. As can be seen, the valuesfor the betweenness centrality are considerably lesser thanfor the other two centrality metrics. And as expected, forall the centralities the fragmentation decreases when agreater percentage of nodes are selected as routers.Besides, Table 1 summarizes the average, the standarddeviation and the maximum values for this measure. Ascan be observed, the mean and maximum fragmentationusing the betweenness centrality are much lesser thanwith the other two options. Furthermore, the between-

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

ness-based selection exhibits a more stable (confident)behavior since its standard deviation is the least amongthe three options. Another metric that we use to comparethe three different centralities is the average number oflinks which remain active after router selection perconnected node. Again, betweenness centrality exhibitsbetter performance since on average it requires lessernumber of links for each node that remains connected.The maximum and the standard deviation of this metricare also the least among the analyzed options. Other cen-trality metrics like hub, authority, and bridging have alsobeen evaluated and for all the cases the betweennesscentrality exhibits better outcomes. Based on this, we canconclude that by far the betweenness centrality is the met-ric that better identifies the subset of nodes that should beconsidered as routers.

4.3. Distributed implementation

In this work, we are dealing with a totally dynamicnetwork, in which the links among mesh stations continu-

is, A centrality-based topology control protocol for wireless mesh.07.026

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427428

430430

431

432

433

434435

437437

438

439

440

441

442

443

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 7

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

ously change due to their movements and channelconditions. This is done in an autonomous and distributedway through the mesh peering management protocol.Accordingly, our topology control algorithm must be imple-mented in a fully distributed manner. Mesh stations mustbe able to decide which nodes act as routers based onlyon their local information, and without the need of anycentral controller. In the previous section we determinedthat betweenness centrality is the best choice for our pur-pose. Therefore, we must use the egocentric version ofbetweenness centrality [38]. This version requires onlythe first order (one-hop) neighborhood information of eachnode instead of the complete network topology. Moreover,this information is available in each mesh station since theykeep an updated record of their peer links.

An efficient algorithm to compute the egocentricbetweenness is presented in [39]. Each node representsits ego network (one-hop neighbors) by means of the adja-cency matrix A. The elements of this matrix are given by:

Aij ¼1 if there is a peer link between nodes i and j

0 otherwise

ð5Þ

Fig. 6. Routers selection using 1-h

Fig. 7. Routers selection using 2-h

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

As an example, Fig. 5 shows the egocentric network struc-ture from the perspective of the node N18 at a given timeinstant.

The adjacency matrix for this ego network is given by:

N18 N16 N27 N44 N45 N61 N64 N73 N87

N18 0 1 1 1 1 1 1 1 1N16 1 0 0 0 1 0 0 0 1N27 1 0 0 1 0 1 1 0 0N44 1 0 1 0 0 1 1 0 0N45 1 1 0 0 0 0 0 1 1N61 1 0 1 1 0 0 1 0 0N64 1 0 1 1 0 1 0 0 0N73 1 0 0 0 1 0 0 0 1N87 1 1 0 0 1 0 0 1 0

Observe in Fig. 5 that all the shortest paths between non-adjacent stations that pass through the ego (the stationwho is calculating its egocentric betweenness) have alength of two hops. Therefore, when i – j, and being 1 thematrix with all its elements equal to 1, the expressionA2½1� A�i;j gives the number of shortest paths with length

op egocentric betweenness.

op egocentric betweenness.

is, A centrality-based topology control protocol for wireless mesh.07.026

444

445

446

447

448

449

Fig. 8. Routers selection using the sociocentric betweenness.

(a) Complete topology (b) Selected routers

Fig. 9. Connectivity achieved with the probe packets approach.

Fig. 10. Resulting backbone selecting two routers per neighborhood.

8 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

2 that links stations i and j. Thus, the egocentric between-ness is the sum of the reciprocal of the resulting non-ceroelements [39].

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

Note that the peering management protocol guaranteesthat all the links are bidirectional, and then the matricesare symmetric and only the elements above the main diag-

is, A centrality-based topology control protocol for wireless mesh.07.026

Fram

eCo

ntro

l

Dur

a�on

Des

�n.

Add

ress

Sour

ceA

ddre

ss

BSS

Iden

�f.

Sequ

en.

Cont

rol

Fram

eCo

ntro

l

Dur

a�on

Des

�n.

Add

ress

Sour

ceA

ddre

ss

BSS

Iden

�f.

Sequ

en.

Cont

rol

Fram

eCo

ntro

l

Dur

a�on

Des

�n.

Add

ress

Sour

ceA

ddre

ss

BSS

Iden

�f.

Sequ

en.

Cont

rol

2 2 6 6 6 2 4

4

FCSRSF

Fram

eCo

ntro

l

Dur

a�on

Des

�n.

Add

ress

Sour

ceA

ddre

ss

BSS

Iden

�f.

Sequ

en.

Cont

rol

bytes2 2 6 6 6 2 6 6 6 4

FCS

Sour

ceA

ddre

ss

Nei

g. #

1A

ddre

ss

Nei

g. #

2A

ddre

ss …NAF

Fram

eCo

ntro

l

Dur

a�on

Des

�n.

Add

ress

Sour

ceA

ddre

ss

BSS

Iden

�f.

Sequ

en.

Cont

rol

2 2 6 6 6 2 6 4 4

FCS

Sour

ceA

ddre

ss

Egoc

ent.

Rem

ain.

Ener

gy

EAF

Fram

eCo

ntro

l

Dur

a�on

Des

�n.

Add

ress

Sour

ceA

ddre

ss

BSS

Iden

�f.

Sequ

en.

Cont

rol

2 2 6 6 6 2 4

4

FCSRSF

Fig. 11. Frames format.

05

1015

12

34

50

2

4

6

8

10

12

x 104

Neighbors

NT=100 nodes

Routers

Topo

logy

Con

trol R

ate

(bps

)

TUT = 5.12 s.

TUT = 2.56 s.

(a) 100-nodes mesh network0

510

15

12

34

50

0.5

1

1.5

2

2.5

x 105

Neighbors

NT=200 nodes

Routers

Topo

logy

Con

trol R

ate

(bps

)

TUT = 5.12 s.

TUT = 2.56 s.

(b) 200-nodes mesh network

Fig. 12. Topology control protocol bit rate for different NT and TUT values.

5 10 15 20 25 30 35 400

1

2

3

4

5

6x 10

5

Number of Data Flows

Rat

e of

Rou

ting

Man

agem

ent M

essa

ges

[bps

]

Top 40RAll R

Fig. 13. Rate of routing management messages as a function of the number of active flows.

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 9

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Please cite this article in press as: A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis, A centrality-based topology control protocol for wireless meshnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014.07.026

450

451452

454454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

10 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

onal must be taken into account. For the node N18 thisresults in:

N18 N16 N27 N44 N45 N61 N64 N73 N87

N18 � 0 0 0 0 0 0 0 0N16 � � 1 1 0 1 1 3 0N27 � � � 0 1 0 0 1 1N44 � � � � 1 0 0 1 1N45 � � � � � 1 1 0 0N61 � � � � � � 0 1 1N64 � � � � � � � 1 1N73 � � � � � � � � 0N87 � � � � � � � � �

469

470

5 10 15 200

1

2

3

4

5

6x 105

Number of

Tota

l dat

a fo

rwar

ding

s [p

kts]

Fig. 14. Total data forwarding as a funct

5 10 15 201

2

3

4

5

6

7

8 x 104

Number of

Succ

essf

ully

RX

pack

ets

[pkt

s]

Fig. 15. Total number of successf

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

Therefore, the egocentric betweenness for the node N18 isequal to 16.333. This way, whit just local information,every node is able to calculate its egocentric betweennessvalue. This value should be updated every time a stationestablishes a new peer link or it closes a previously estab-lished one. In a practical implementation, the nodes willrefresh this value at predetermined time intervals.

Once selected a distributed way to obtain the centralityvalues, we also need a distributed way to select the nodesthat will act as routers. Note that in this case there is not acentral control with all the information needed to selectthe nodes with higher centralities. Our proposal here isthat every node selects as router the node (or nodes) withhigher egocentric betweenness in its neighborhood. Notethat with this way of proceeding, the same node can beselected as the router for different neighborhoods. This

25 30 35 40

Data Flows

Top 40RAll R

ion of the number of active flows.

25 30 35 40

Data Flows

Top 40RAll R

ully received data packets.

is, A centrality-based topology control protocol for wireless mesh.07.026

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 11

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

way, the total number of routers is reduced, and this num-ber is determined by the procedure itself. Of course, thissimple method guaranties that every station is connectedto a router, but it does not assure that all the routers areinterconnected between them. Therefore, some furtheractions will be needed. On the other hand, the main advan-tage is that it is a very simple and implementable method.

With this background, the procedure to select the meshstations that will develop routing tasks can be summarizedas follows: first, each station calculates and broadcasts itsegocentric betweenness centrality value, and second, inits respective ego network, each station selects the neigh-bor (or neighbors) with the highest betweenness to beused as routers. The details and practical implementationof the protocol are exposed in Section 4.4.

In the following we present the evaluation of this topol-ogy control algorithm for the network dataset previously

5 10 15 203

4

5

6

7

8

9

10

11

12

13

Number of

Tota

l For

war

ding

s pe

r RX

Pack

et

Fig. 16. Total data forwardings per

5 10 15 200.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

Number o

Net

wor

k Ef

ficie

ncy

Fig. 17. Network efficiency in terms of packet de

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

described. We analyze different alternatives to create aconnected dominating set in a distributed way. In firstplace, we consider that each station computes its egocen-tric betweenness with the first-order (one-hop) neighbor-hood information and selects as router just the one withthe highest egocentric betweenness. As expected due tothe distributed router selection, instead of a connectedbackbone, this procedure generates a set of isolatedclusters that have no common routers among them.Fig. 6 presents the worst case obtained in the simulations,that is, the time instant with the higher number of isolatedclusters. For this specific case, 25% of stations have beenselected as routers. Although this is the worst case, it isworth to mention that the 8.33% of the network snapshotsanalyzed construct a fully connected backbone with thismost simple procedure, and with 30% of stations selectedas routers on average.

25 30 35 40

Data Flows

Top 40RAll R

successfully received packet.

25 30 35 40

f Data Flows

Top 40RAll R

livery ratio as a function of the traffic load.

is, A centrality-based topology control protocol for wireless mesh.07.026

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

0 2 6 10 14 18 22 26 30 34 38 42 46 50 54 58 62 66 700

5

10

15

20

25

30

35

40

45

50

Energy Consumption [J]

(a) Histogram

No.

of n

odes

0 10 20 30 40 50 60 700

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Energy Consumption [J]

(b) Cdf

Cum

mul

ativ

e pr

obab

ility

All RTop 40R

Top 40RAll R

Fig. 18. Energy consumption statistics for the 15-flows reactive mode case.

12 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

To improve the connectivity among the selected rou-ters, in the following some different approaches are pro-posed and evaluated.

4.3.1. K-hops egocentric betweenness centralityThe first possibility is to consider a higher number of

hops when computing the egocentric centrality. Forinstance, we can assess the case in which the stations com-pute it taking into consideration the two-hop neighbor-hood information. Again, only the most central station isselected as router in every neighborhood. Fig. 7 shows asignificant connectivity improvement for the same net-work snapshot shown in Fig. 6. Nevertheless, there are stilltwo unconnected clusters. In this case, 31% of stations havebeen selected as routers.

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

The theoretical limit for this approximation is the casein which the stations compute the sociocentric instead ofthe egocentric betweenness centrality. Namely, eachstation needs to know the complete network topologyinformation, which is not a practical consideration fordynamic WMNs. Fig. 8 shows that this procedure createsa complete backbone with 34% of stations selected as rou-ters. However this total connectivity among all the selectedrouters is not achieved for all the network snapshots thathave been evaluated. Then, this procedure does not guar-antee the creation of a CDS.

4.3.2. Probe packetsIn the following, we describe another possible solution

which guaranties that all the selected routers create a

is, A centrality-based topology control protocol for wireless mesh.07.026

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 13

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

single connected backbone at the expense of increasing thesignaling overhead. After a first router selection round,based on egocentric betweenness, the non-router stationsvirtually linked to at least two routers verify the connectiv-ity between them. If there is no path between any tworouters connected to a non-router station, that stationmust be marked as router. To this end, the station trans-mits a probe message through one (and only one) of itslinks. This special message must be retransmitted by therouters and, if connectivity exists, it will be received bythe sending station through the other links. If the messageis not received before a predetermined time, the stationmarks itself as router and communicates this decision toits neighborhood. To illustrate this, Fig. 9(a) shows a differ-ent network snapshot. The cyan bigger nodes represent thestations that have been selected as routers based on one-hop egocentric betweenness and a selection with just onerouter per station. As it can be seen, selected routers formstwo components (Fig. 9(b)) that can be linked througheither of stations N88; N33; N54; N52; N51; N91, N82 andN11. These nodes will be marked as routers according tothe proposed procedure.

4.3.3. Higher number of routers per neighborhoodWe have evaluated another procedure in which the sta-

tions, instead of selecting only the most central node, markas routers the two nodes with the higher one-hop egobetweenness values in each neighborhood. Fig. 10 showsthe resultant backbone for the same mesh network dataset.In this case, 43% of stations have been selected as routers.This process generates a fully connected backbone for the

0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Delay [s]

(a)

Cum

ulat

ive

prob

abilit

y

0 2 40

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Delay

(b

Cum

ulat

ive

prob

abilit

y

0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Delay [s]

(d)

Cum

ulat

ive

prob

abilit

y

0 2 40

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Delay

(e

Cum

ulat

ive

prob

abilit

y

Top40R-5FlowsAllR-5FlowsTop40R-10FlowsAllR-10FlowsTop40-15FlowsAllR-15Flows

Top40R-30FlowsAllR-30Flows

Fig. 19. Cumulative distribution function

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

83.33% of the network snapshots tested. The increase inthe number of redundant routers can be exploited by loadbalancing techniques, and it is also valuable from a net-work resilience perspective. Due to the fact that thisapproach is the one with a lower amount of overload, wehave chosen it to propose a practical implementation inthe next section. Obviously, incrementing the number ofrouters selected by each station will ensure a fully com-plete backbone for all the scenarios at the expense of ahigher router redundancy. As a future line of work we willstudy the minimum number of routers per neighborhoodneeded to guaranty a desired connectivity (expressed asa percentage of the total connectivity).

4.4. Practical implementation

Energy efficiency and fair energy consumption are con-sider for the practical implementation of the protocol. It iscarried out in three steps:

– Step 1: Every node broadcast its own neighbors list bymeans of a Neighborhood Advertising Frame (NAF). Thisis a special management frame where every neighbor isidentified by its MAC address.– Step 2: Every node receives the NAFs from its neigh-bors. With this information, they are able to computetheir own egocentric value. Once computed, theybroadcast that value in the Egocentric AdvertisingFrame (EAF). In order to allow fair energy consumptionin the network, the nodes remaining energy is alsoincluded in the frame.

6 8 10 [s]

)

0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Delay [s]

(c)

Cum

ulat

ive

prob

abilit

y

6 8 10 [s]

)

0 2 4 6 8 10Delay [s]

(f)

Cum

ulat

ive

prob

abilit

y

Top40R-20FlowsAllR-20Flows

Top40R-25FlowsAllR-25Flows

Top40R-35FlowsAllR-35Flows

Top40R-40FlowsAllR-40Flows

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

of data packets end-to-end delay.

is, A centrality-based topology control protocol for wireless mesh.07.026

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

14 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

– Step 3: Every node receives the egocentric value of allof its neighbors and selects the one with the highervalue as its router. If different options are available(i.e., different neighbors with the same centralityvalue), the node with the higher value of remainingenergy is chosen. A multi-metric protocol, assigning dif-ferent weights to the centrality and energy remainingvalues, is one of the targets of a future work. The deci-sion is communicated to the new router with the Rou-ter Selection Frame (RSF). When the new routerreceives the RSF, it switches to the router mode (or rou-ter state) and activates its routing functionality. As saidin the previous section, in order to guarantee obtaininga connected topology, a bigger number of routers can bechosen by every node.

Due to the network variability, this three steps proce-dure must be repeated every certain interval time, called

5 4 30

1

2

3

4

5

6

7x 105

Lifetime of reactive ro

Rat

e of

Rou

ting

Man

agem

ent M

essa

ges

[bps

]

Fig. 20. Rate of routing management messages

5 44

4.5

5

5.5

6

6.5

7 x 104

Lifetime of reactive r

Succ

essf

ully

RX

pack

ets

[pkt

s]

Fig. 21. Total number of successfully received pac

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

the Topology Updating Time (TUT). Besides, the routerstate must be seen as a soft state. That is, to keep the rout-ing functionality activated, a node must receive at least aRSF every TUT seconds. Otherwise the node understandsthat its routing functionality is not needed anymore andswitches it off.

Fig. 11 shows the specific frame format for the newthree management frames needed by this protocol. TheNAF and EAF frames can be included into the mesh-specificmanagement frames. They are broadcast frames and there-fore they do not need to be acknowledged by the receiver.The RSF frame is also a mesh-specific management framebut in this case it is a unicast frame and therefore it mustbe acknowledged by the receiver. The three frames canbe identified by the sub-type code in the Frame Controlfield.

Calling NT the total number of nodes in the networkand NR the number of routers that every node selects,

2 1

uting information [s]

Top 40RAll R

as a function of the reactive path lifetime.

3 2 1outing information [s]

Top 40RAll R

kets as a function of reactive path lifetime.

is, A centrality-based topology control protocol for wireless mesh.07.026

627

628629

631631

632

633

634

635

636

637

638

639

641641

642

643

644

645

647647

648

649

650

651

652

653

654

655

656

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 15

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

the total number of bytes transmitted by this protocolprocedure is:

NT size NAFð Þ þ size EAFð Þ½þNR size RSFð Þ þ size ACKð Þ½ �� bytes ð6Þ

where sizeðXÞ stands for the size in bytes of the frame X.As it can be seen in Fig. 11, the size of the NAF depends

on the number of neighbors. Calling NN to the averagevalue of this number, the average size of these frames is34þ 6NN bytes. The size of EAF and RSF frames are 42and 28 bytes respectively. Substituting these values in Eq.(6) we obtain:

NT 34þ 6NN þ 42þ 42NRð Þ¼ NT 76þ 6NN þ 42NRð Þ bytes ð7Þ

5 4 33

4

5

6

7

8

9

10

Lifetime of reactive r

Tota

l For

war

ding

s pe

r RX

Pack

et

Fig. 22. Total data forwardings per successfully receive

5 40.2

0.22

0.24

0.26

0.28

0.3

0.32

0.34

Lifetime of reactive

Net

wor

k Ef

ficie

ncy

Fig. 23. Network efficiency as a func

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

This amount of bytes is sent by the protocol every TUTseconds. Therefore, the bit rate added by the topologycontrol protocol to the network, RTC , is:

657

RTC ¼8NT 76þ 6NN þ 42NRð Þ

TUTbps ð8Þ

Obviously, RTC grows linearly with NT ; NN; NR, andð1=TUTÞ. These dependencies are shown in Fig. 12 for sev-eral values of the involved parameters. It is important toremark that the lifetime of a network topology must begreater than or at least equal to the lifetime of a routingpath. In the figure two typical values have been considered(one of them, 5.12 s, is the standard default value). Theresulting protocol bit rate will affect the node energy con-sumption and the network load, and will be taken intoaccount later in the performance evaluation.

2 1

outing information [s]

Top 40RAll R

d packet as a function of reactive path lifetime.

3 2 1

routing information [s]

Top 40RAll R

tion of reactive path lifetime.

is, A centrality-based topology control protocol for wireless mesh.07.026

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

0 10 20 30 40 50 60 70 800

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Energy Consumption [J]

(b) Cdf

Cum

mul

ativ

e pr

obab

ility

Top R pathTAll R pathT

2.5 7.5 12.5 17.5 22.5 27.5 32.5 37.5 42.5 47.5 52.5 57.5 62.5 67.5 72.5 77.50

5

10

15

20

25

30

35

40

45

Energy Consumption [J]

(a) Histogram

No.

of n

odes

Top 40RAll R

Fig. 24. Energy consumption statistics for the nodes working with the reactive mode, 20 peer-to-peer data flows and reactive routing information lifetimeof 3 s.

16 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

5. Performance evaluation

In this section, extensive simulations have been carriedout to evaluate the performance of WMNs with the pro-posed centrality based topology control mechanism. Forthe evaluation, we consider the following metrics andparameters:

– The rate of routing management messages.– The total number of forwardings per successfully

received packet.– The network efficiency in terms of packet delivery

ratio.– The energy consumed on a node by node basis.

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

– The end-to-end packet delay.– The transmission bit-rate savings taking into account

the overload added by the topology control protocol.

We take into account the two routing modes of thehybrid wireless mesh protocol (HWMP). In the reactiveon-demand mode, a source mesh station starts a pathdiscovery procedure only when it has a data packet to sendto any destination. This operation mode is more suitablefor peer to peer communication inside the mesh network.On the other hand, proactive mode is more appropriatewhen a single or a few mesh stations are configured asgateways for external communications and therefore theyare the targets of most of data connections. In this mode, a

is, A centrality-based topology control protocol for wireless mesh.07.026

684

685

686

687

688

689

690

691

692

693

694

695

696

697

698

699

700

701

702

703

704

705

706

707

708

709

710

711

712

713

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 17

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

single or few mesh stations are configured to be path treeroots, and they periodically initiate path selectionprocedures.

All simulations are done with the ns-3 network simula-tor. To model the mesh network, we have used one of thenetwork snapshots described in Section 4.2. It consists of100 IEEE 802.11s-based mesh stations randomly distrib-uted in a 1040 � 520 m rectangular area. For all the exper-iments, we compare the performance of the mesh networkwhen all the station are configured as routers with the casethat only 40 most central nodes are selected as routers(from now they will be called the All R and Top 40R topol-ogies for convenience). All the simulations are 500 s longand we have carried out 100 statistically independent runsfor every experiment. The average of these runs with 95%confidence interval is shown for all the results. In the

0 1 2 3 4 50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Dela

(a

Cum

ulat

ive

prob

abilit

y

0 1 2 3 4 50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Dela

(b

Cum

ulat

ive

prob

abilit

y

Fig. 25. Cumulative distribution function of data packets e

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

following, we present and discuss the simulation resultsfor different mesh network conditions and configurations.

5.1. Reactive mode. Impact of traffic load

The aim of this part is to evaluate the impact of thetraffic load on the network performance when peer-to-peer communications are more relevant and then, meshstations are operating in the reactive mode. We vary thenumber of simultaneously active UDP data flows from 5to 40. The source and the destination nodes are randomlyselected for each independent run and for each flow. Allthe UDP flows are configured with an exponential distribu-tion for the interarrival time with mean value of 20 ms. Forthe packet length we use an exponential distribution withmean of 512 bytes that has been truncated to a minimum

6 7 8 9 10y [s]

)

6 7 8 9 10y [s]

)

Top40R-pathT=1sTop40R-pathT=2sAllR-pathT=1sAllR-pathT=2s

Top40R-pathT=3sTop40R-pathT=4sTop40R-pathT=5sAllR-pathT=3sAllR-pathT=4sAllR-pathT=5s

nd-to-end delay for different reactive path lifetimes.

is, A centrality-based topology control protocol for wireless mesh.07.026

714

715

716

717

718

719

720

721

722

723

724

725

726

727

728

729

730

731

732

733

734

735

736

737

738

739

740

741

742

743

744

745

746

747

748

749

750

751

752

753

754

755

756

757

758

759

760

761

762

763

764

765

766

767

768

769

770

771

772

773

774

775

776

777

778

779

780

781

782

783

784

785

786

787

788

789

18 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

of 12 bytes (header size), and a maximum of 1500 bytes.Mesh stations are configured with the default value of5.12 s for the lifetime of reactive routing information.

First of all, Fig. 13 shows the evolution of the mean rateof routing management messages as a function of the num-ber of data flows. Evidently, since mesh stations are usingthe on-demand path selection mode, a greater number ofsources demand a greater number of path selection proce-dures. Therefore, the rate of routing management mes-sages increases when the number of data flows increases.As expected because of the lower number of mesh stationswith path selection functionality, a significant reductionoccurs (76.14% on average) when the mesh network oper-ates with the topology control mechanism. Observe thatthis reduction directly impacts on the total energy con-sumed by the network.

The next parameter that we consider is the total num-ber of unicast data packets forwarded by all the stationsin the network (Fig. 14)). We can clearly identify two dif-ferent trends of this parameter. For low traffic loads, upto 15 concurrent flows for the network without topologycontrol and up to 20 flows when topology control isapplied, the data forwardings growth linearly with thenumber of flows. Beyond these values the network startsto exhibit a saturated behavior and then the growthbecomes less significant. This is also verified when westudy the total number of successfully received packets(Fig. 15)). This figure confirms that the network is satu-rated beyond 15 data flows for the All R topology andbeyond 20 flows for the Top 40R case. Over these values,although there are more sources generating data packets,there is practically no increase in the number of success-fully received data packets. The topology control mecha-nism produces a savings of the total data forwardings of32.77% on the average. This is another important reductionof the total amount of energy consumed by the network. Itis important to remark that this is not in detriment of thenumber of received packets. In fact, when the topology

20.48/8.192 10.24/4.096 5.12/2.0480

0.5

1

1.5

2

2.5

3

3.5

4 x 106

Active path to root time

Rat

e of

Rou

ting

Man

agem

ent M

essa

ges

[bps

]

Fig. 26. Rate of proactive routing managemen

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

control is applied, the stations get on average 2.3% moredata packets than without topology control. Precisely, tobetter analyze this relation we compute the total numberof data forwardings per successfully received packet.Fig. 16 shows the evolution of this measure and it can beobserved that for all the cases the network with topologycontrol is more efficient. Namely, the number of forwar-dings is reduced a 33.43% on average. We also verify thatan increase of traffic sources causes more collisions andtherefore a greater number of retransmissions and forwar-dings are required to deliver each data packet. This grow-ing trend continues until the network reaches thesaturated state.

The next parameter that has been evaluated is the net-work efficiency in terms of packet delivery ratio. Fig. 17shows that the network with the topology control becomesmore efficient when the number of sources is equal orgreater than 20. This is because the impact of the signalingrequired for path selection is not so important when a fewnumber of stations are generating data traffic. Neverthe-less, in more practical situations, the routing overhead ismore relevant and then the advantage of reducing thenumber of stations involved in routing is evident. Withinthe interval of this experiment, although this is not ourmain objective, the average improvement of the networkefficiency is about 3.7% when the topology control isapplied.

This small improvement in the efficiency comestogether with a significant reduction of the global energyconsumption inside the network, which is in fact the maingoal of this proposal. To evaluate this, we consider the totalamount of energy dissipated by each node for all the trans-missions and receptions during the entire simulation time.The energy model presented in [40] has been consideredfor all the reported cases. Fig. 18(a) shows the histogramof the energy consumed by the nodes for the 15-activeflows case (which corresponds to a non-saturated situa-tion). As can be observed, the maximum energy dissipated

2.56/1.024 1.28/0.512 0.64/0.256

out / Root Interval [s]

Top 40RAll R

t messages for different update times.

is, A centrality-based topology control protocol for wireless mesh.07.026

790

791

792

793

794

795

796

797

798

799

800

801

802

803

804

805

806

807

808

809

810

811

812

813

814

815

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 19

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

by a node has been reduced from 72 to 63.6 J when topol-ogy control is applied. The total energy consumed by thenetwork has been reduced around a 41% (from 2247.4 to1324.4 J). Besides, the cumulative distribution function ofthe energy consumption (Fig. 18(b)) shows also the betterbehavior achieved with the topology control. For instance,it can be observed that around 27% of nodes dissipate lessthan 10 J for the All R case, and that this figure is increasedto 65% for the Top 40R case.

Finally, Fig. 19 shows the cumulative distribution func-tion of data packets end-to-end delay. As expected, agreater number of data sources increases the contentionfor channel access and also the path selection messagesoverhead. This implies that path selection requests require

20.48/8.192 10.24/4.096 5.12/2.0485

10

15

20

25

30

35

Active path to root time

Tota

l For

war

ding

s pe

r RX

Pac

ket

Fig. 27. Total data forwardings per successfully receiv

20.48/8.192 10.24/4.096 5.12/2.0480

0.05

0.1

0.15

0.2

0.25

0.3

Active path to root time

Net

wor

k E

ffici

ency

Fig. 28. Network efficiency for diffe

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

more time to be resolved and then the end-to-end delay ofdata packets grows with the number of traffic sources. Forall the cases the delay whit the Top 40R is lower than withthe All R topology. The difference is more significant forlow traffic loads (Fig. 19 and is reduced when the networkis saturated (Fig. 19c–f).

5.2. Reactive mode. Impact of reactive routing informationlifetime

The aim of this set of experiments is to analyze howdynamic a network could be. Mesh stations continueworking in reactive mode and 20 simultaneous peer-to-peer data flows are established between randomly

2.56/1.024 1.28/0.512 0.64/0.256

out / Root Interval [s]

Top 40RAll R

ed packet for different proactive path lifetimes.

2.56/1.024 1.28/0.512 0.64/0.256

out / Root Interval [s]

Top 40RAll R

rent proactive path lifetimes.

is, A centrality-based topology control protocol for wireless mesh.07.026

816

817

818

819

820

821

822

823

824

825

826

827

828

829

830

831

832

833

834

835

836

837

838

839

840

841

842

843

844

845

846

847

0 100 200 300 400 500 600 7000

10

20

30

40

50

60

70

Energy Consumption [J]

(a) Histogram

No.

of n

odes

0 100 200 300 400 500 600 700 8000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Energy Consumption [J](b) Cdf

Cum

mul

ativ

e pr

obab

ility

Top 40RAll R

Top 40RAll R

Fig. 29. Energy consumption statistics for the network working in the proactive mode with one root station. The root node is included and the proactiverouting information lifetime is set to the default value of 5.12 s.

20 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

selected sources and destinations. A more dynamic andvariable network requires a more frequent activation ofthe mesh path selection mechanism in order to keepthe paths updated. As stated in the IEEE 802.11-2012standard [32], we can control the time for which meshstations consider the forwarding information to be validby means of the dot11MeshHWMPactivePathTimeout con-trol variable. Therefore, in this section we evaluate theperformance of the network when this lifetime variesfrom 5.12 to 1 s. The evolution of the mean rate of rout-ing management messages is shown in Fig. 20. Of coursewe can observe that, although the traffic load is equiva-lent for all the cases, the rate of path selection relatedmessages grows as lifetime of reactive routing informa-tion decreases. As expected, topology control producesan important reduction of around 83.43% because of

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

the reduced number of mesh stations involved in rout-ing. This directly corresponds to the same significantlyenergy consumption savings due to the lower amountof routing messages exchanged by the mesh stations.We verify that the limitation in the number of routershas no negative impact in the total number of success-fully received packets. In fact, as can be seen in Fig. 21,topology control produces an average increase of around8.75% in the number of successfully received packetswith regard to the All R configuration. The decreasingbehavior is explained as follows: lower duration ofestablished paths implies a greater number of path dis-covery messages which in turn increases the collisionsand the contention inside the network. Thus, data pack-ets have less transmissions opportunities and then thereare less successfully received packets.

is, A centrality-based topology control protocol for wireless mesh.07.026

848

849

850

851

852

853

854

855

856

857

858

859

860

861

862

863

864

865

866

867

868

869

870

871

872

873

874

875

876

877

878

879

0 20 40 60 80 100 120 140 1600

10

20

30

40

50

60

70

Energy Consumption [J]

(a) Histogram

No.

of n

odes

0 20 40 60 80 100 120 140 1600

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Energy Consumption [J]

(b) Cdf

Cum

mul

ativ

e pr

obab

ility

Top 40RAll R

Top 40RAll R

Fig. 30. Energy consumption statistics for the network working in the proactive mode with one root station. Only common mesh nodes are included andthe proactive routing information lifetime is set to the default value of 5.12 s.

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 21

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

This behavior is also confirmed when we analyze thetotal number of data forwardings per successfully receivedpacket (Fig. 22)). We can observe that, although the trafficload remains equivalent for all the cases and even theincreasing number of collisions requires more data packetretransmissions, the high network contention caused bythe routing messages overhead reduces the transmissionopportunities of data packets and then the number of for-wardings decreases instead of remain constant or growdue to collisions. Nevertheless, it is important to remarkthat the topology control contributes with an averagereduction in the number of data forwardings of about42.19%. This represents again a considerably energyconsumption savings.

The network efficiency in terms of packet delivery ratioalso exhibits a decreasing tendency when the lifetime or

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

reactive routing information decreases (Fig. 23). Aspreviously said, this is due to the big amount of routingmanagement messages overhead required for a fasterupdate of the established paths. An important observationis that, for a given network efficiency value, the topologycontrol allows almost twice routing information updatescompared with the network operating with all routers.For example, the efficiency reached by the All R networkwith the default active path timeout value of 5.12 s couldbe achieved with the Top 40R topology even if the pathupdates are done approximately every 2.7 s. In summary,topology control also improves the scalability when moredynamism and variability is required.

With the same criteria of the previous section, Fig. 24shows the energy consumption statistics for the networkconfigured with a reactive path lifetime of 3 s. The

is, A centrality-based topology control protocol for wireless mesh.07.026

880

881

882

883

884

885

886

887

888

889

890

891

892

893

894

895

896

897

898

899

900

901

902

903

904

905

906

907

0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Delay [s]

(b)C

umul

ativ

e pr

obab

ility

0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Delay [s]

(c)

Cum

ulat

ive

prob

abilit

y

0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Delay [s]

(a)

Cum

ulat

ive

prob

abilit

y

Top40R-ActivePath=20.48s-Interv=8.192sAllR-ActivePath=20.48s-Interv=8.192s

AllR-ActivePath=10.24s-Interv=4.096sTop40R-ActivePath=10.24s-Interv=4.096s

Top40R-ActivePath=5.12s-Interv=2.048sAllR-ActivePath=5.12s-Interv=2.048s

Fig. 31. Cumulative distribution function of data packets end-to-end delay for different proactive path lifetimes.

22 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

histogram (Fig. 24(a)) shows that the maximum energydissipated by a node in the network reduces from 79.3 to71.3 J when topology control is applied. The total energydissipated in the network reduces around a 38.44% (from2655.8 to 1635 J). The cdf (Fig. 24(b)) shows that whileonly 23% of nodes consumes less than 10 J in the All R con-figuration, this percentage increases to 67 in the Top 40Rnetwork.

The data packets end-to-end delay analysis (Fig. 25))reveals that the delay decreases when the path updatesare more frequents. This is due to the fact that the networkreacts earlier to link failures and to paths that should nolonger be valid for data forwarding. But it is also becausethere is a lesser number of data packets forwarded by

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

intermediate stations and a lesser number of successfullyreceived packets. When the level of routing overheadincreases, most of the packets that finally arrives to thedestination are those that traverse a few number of inter-mediate nodes. Therefore, those packets arrives in shortertime. On the other hand, it is important to remark thatthe application of topology control improves the perfor-mance of the network regarding end-to-end delay for allthe simulation cases. Even the worst case results for thenetwork with topology control (Lifetime = 5.12 s) are bet-ter than the results for network with all routers and life-time greater than or equal to 2 s. The reason for this isthat the paths are established faster when a lesser numberof stations are involved in the path discovery procedure.

is, A centrality-based topology control protocol for wireless mesh.07.026

908

909

910

911

912

913

914

915

916

917

918

919

920

921

922

923

924

925

926

927

928

1 2 30

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

x 106

Number of Roots

(a)

Rat

e of

Rou

ting

Man

agem

ent M

essa

ges

[bps

]

1 2 30.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

0.55

0.6

Number of Rooots

(b)

Net

wor

k Ef

ficie

ncy

Top 40RAll R

All RTop 40R

Fig. 32. Proactive mode, variable number of root stations and constant traffic load: (a) rate of routing management messages and (b) network efficiency.

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 23

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

5.3. Proactive mode. Impact of proactive routing informationlifetime

Proactive mode of HWMP protocol is more suitablewhen the target of data communications is mainly outsideof the mesh basic service set. The most common use casesare mesh stations accessing to Internet or the internet-working with other network technologies. In these cases,one or more mesh stations are configured to be the rootmesh station(s) and they play the role of gateways. Eachroot periodically sends path request (PREQ) messages in

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

order to build a proactive tree, and thus, create paths fromall the mesh stations to the root.

As in the previous section, we begin evaluating how fastproactive data forwarding paths could be updated. A fasterroute update is required by more dynamic networks inwhich stations continuously vary their established peerlinks. Obviously, this implies a greater path selectionmanagement messages overhead. As stated in the IEEE802.11-2012 standard [32], the lifetime of the proactiverouting information is configured by the dot11Mesh-HWMPactivePathToRootTimeout control variable. This

is, A centrality-based topology control protocol for wireless mesh.07.026

929

930

931

932

933

934

935

936

937

938

939

940

941

942

943

944

945

946

947

948

949

950

951

952

953

954

1GW - 25Flows 2GW - 50Flows 3GW -75Flows0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

x 106

Num. Roots - Num. Flows

(a)

Rat

e of

Rou

ting

Man

agem

ent M

essa

ges

[bps

]

1GW - 25Flows 2GW - 50Flows 3GW - 75Flows

0.16

0.18

0.2

0.22

0.24

0.26

0.28

Num. Roots - Num. Flows

(b)

Net

wor

k Ef

ficie

ncy

All RTop 40R

Top 40RAll R

Fig. 33. Proactive mode, variable number of root stations and traffic load: (a) rate of routing management messages and (b) network efficiency.

24 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

variable should be greater than dot11MeshHWMProotInter-val which in turn controls the frequency of proactive PREQframes sent by the root. For the evaluation we configureone station as the root and then we vary the values of thesepair of variables from 20.48 to 0.64 s for the active path toroot timeout and from 8.192 to 0.256 s for the root inter-val. As it can be seen, we maintain constant the defaultratio between these variables in all the reported cases.For each independent run, the traffic load consists of 25simultaneously active data flows, five uploads fromrandomly selected mesh stations to the root and 20 down-loads from the root to randomly selected stations. Theexpected growth of routing management messages rate

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

as the lifetime of routing information decreases is verifiedin Fig. 26. We also confirm that proactive routing overheadis greater than the reactive one. For instance, when thedefault routing lifetime values are used and for the 25flows case, the routing management rate increases fromaround 432 Kbps (Fig. 13)) to 1.1 Mbps for the All R config-uration, and from around 97 Kbps to 190 Kbps for thenetwork with topology control. The application of topologycontrol produces an average reduction of around 78.87% inthe routing management messages overhead.

The increase of routing overhead due to faster pathupdates causes more collisions and then data packets needto be retransmitted a greater number of times. This is

is, A centrality-based topology control protocol for wireless mesh.07.026

955

956

957

958

959

960

961

962

963

964

965

966

967

968

969

970

971

972

973

974

975

976

977

978

0 100 200 300 400 500 600 700 800 9000

10

20

30

40

50

60

Energy Consumption [J]

(a) Histogram

No.

of n

odes

0 100 200 300 400 500 600 700 800 9000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Energy Consumption [J]

(b) Cdf

Cum

mul

ativ

e pr

obab

ility

Top 40RAll R

Top 40RAll R

Fig. 34. Energy consumption statistics for the network working in the proactive mode with three root stations and 75 active flows. The root nodes areincluded and the proactive routing information lifetime is set to the default value of 5.12 s.

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 25

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

verified in Fig. 27 which shows the evolution of total dataforwardings per successfully received packet as a functionof routing information lifetime. It can be seen that,although the traffic load remains equivalent for all thecases, the average number of forwandings required to suc-cessfully transmit each data packet increases as the life-time decreases. The average reduction achieved with theapplication of topology control for this parameter isaround 51.75%.

The growing routing overhead makes increasingly diffi-cult to successfully transmit data packets and then the net-work efficiency gradually reduces (Fig. 28). As previously

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

said, although this is not the main objective of the topologycontrol mechanism, the network efficiency significantlyimproves when only the most central stations are involvedin the path selection algorithm. The average improvementachieved in the presented range is about 58.17%. Thisimprovement is much more significant than in the reactivemode case in which the path selection overhead level islower. Fig. 28 also shows that, for a given network effi-ciency, the mesh network with topology control supportsalmost four times faster path selection updates.

The energy consumption statistics for all the nodes inthe network, including the root mesh station configured

is, A centrality-based topology control protocol for wireless mesh.07.026

979

980

981

982

983

984

985

986

987

988

989

990

991

992

993

994

995

996

997

998

0 50 100 150 200 2500

10

20

30

40

50

60

Energy Consumption [J]

(b) Histogram

No.

of n

odes

0 50 100 150 200 250 3000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Energy Consumption [J]

(b) Cdf

Cum

mul

ativ

e pr

obab

ility

Top 40RAll R

Top 40RAll R

Fig. 35. Energy consumption statistics for the network working in the proactive mode with three roots and 75 active flows. Only the non-root stations areincluded and the proactive routing information lifetime is set to the default value of 5.12 s.

26 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

with the default values for the routing information lifetime(i.e. the active path to root is 5.12 s and the root interval is2.048 s) are shown in Fig. 29. As expected, the station con-figured as root dissipates significantly more energy thannon-root stations since all the traffic (data and routing)starts and ends in that node. For the root station, theenergy dissipation reduction achieved with the topologycontrol is around 14.79% (from 775.1 to 660.5 J). The totalenergy dissipated in the network reduces around 30.4%(from 3233.1 to 2250.2 J). These higher energy dissipation

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

values also confirm the greater overhead of the proactivemode regarding to the reactive one. The cdf of Fig. 29(b)shows that 52% of nodes dissipates less than 20 J for theAll R configuration and this value increases to 73% in theTop 40R network. On the other hand, since the root is aspecial type of station, Fig. 30 shows the energy consump-tion statistics for only non-root stations. The histogramand the cdf in Fig. 30 identifies a drawback of the proposedtopology control mechanism: three nodes selected asrouters are overloaded regarding the All R configuration.

is, A centrality-based topology control protocol for wireless mesh.07.026

999

1000

1001

1002

1003

1004

1005

1006

1007

1008

1009

1010

1011

1012

1013

1014

1015

1016

1017

1018

1019

1020

1021

1022

1023

1024

1025

1026

1027

1028

1029

1030

1031

1032

1033

1034

1035

1036

1037

1038

1039

1040

1041

1042

1043

1044

1045

1046

1047

1048

1049

1050

1051

1052

1053

1054

1055

1056

1057

1058

1059

1060

1061

1062

1063

1064

1065

1066

1067

1068

1069

1070

1071

1072

1073

1074

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 27

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

This fact also confirms that the remaining energy of nodesmust be included in the router selection process as statedin Section 4.4.

The end-to-end delay cdf (Fig. 31) also confirms thateach successfully received data packet had to be retrans-mitted a greater number of times. It can be observed thatfaster proactive path updates increases the data packetdelays. This behavior holds for both network configura-tions, with or without topology control. Nevertheless,delays are smaller when topology control is applied dueto the lower channel access contention.

5.4. Proactive mode with more than one root station

A way to improve the network efficiency is to distributethe root or gateway functionality to a greater number ofmesh stations. This section evaluates the effect of addingone or two roots to the previous configuration. For thereported simulations, the proactive path lifetime remainsconstant in its default values (activePathToRootTime-out = 5.12 s and rootInterval = 2.048 s). In the first set ofexperiments, the traffic load also remains constant (foreach independent run there are 25 continuously activedata flows: five uploads from randomly selected mesh sta-tions to the roots and 20 downloads from the roots to ran-domly selected stations). Fig. 32(a) shows the rate ofrouting management messages as a function of the numberof root stations. Obviously, since proactive mode is used,this rate increases when there are a greater number ofroots independently of the traffic load. It is important toobserve that the growth is not linear because of, while eachroot sends periodic PREQs, the non-root stations justresponse with a PREP to the root with the best path metric.The average path selection overhead reduction achievedwith the application of the topology control in this caseis around 69.14%.

The evident improvement of the network efficiency interms of packet delivery ratio due to the distribution ofthe load in a greater number of roots can be verified in

5 10 15 200

200

400

600

800

1000

1200

1400

1600

Number of

Tota

l Sav

ing

[Kbp

s]

Fig. 36. Global bit-rate savings a

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

Fig. 32(b). On the other hand, the reduction of path selec-tion overhead decreases the collisions probability and thusa greater number of data packets successfully arrives to thetarget stations when topology control is applied. The aver-age value of the improvement due to topology control isaround 19.71% for the reported experiments. The improve-ment is more significant when the level of congestionaround the root(s) is greater (i.e. the one root case).

Finally, we evaluate the situation in which the numberof roots and the traffic load increases at the same time.Namely, for the single root network data traffic consist of25 flows, for the network with two roots there are 50 flows,and for three roots there are 75 active flows. For all thecases, downloads represents the 80% traffic and uploadsthe remaining 20%. The results for this set of simulationsare shown in Fig. 33. As expected, since proactive modeis used, the rate of routing management messages(Fig. 33(a)) is pretty similar to the constant traffic results.There is a slight difference, a bit more noticeable for thenetwork with tree roots and all stations as routers (around145 Kbps), due to the higher level of channel contentionproduced by the 75 data flows. This higher contentionreduces the transmission opportunities of routing mes-sages and therefore its rate is lower than in the 25 flowscase. This does not happen when the topology control isapplied since the path selection overhead has beenreduced a 68.2% on average.

Although the traffic load is increased, the distribution ofroot functionality to a greater number of roots stillimproves the network efficiency (Fig. 33(b)) of the networkconfigured with all stations as routers. The reduction of thenumber of mesh stations involved in routing implies theavailability of fewer alternative paths, and causes adecrease by 2% of the network efficiency with topologycontrol and two roots with respect to the one root case.This does not hold for the three roots case, which achievesaround a 6% of improvement in comparison with the oneroot network because of a better distribution of the trafficload. Nevertheless, for all the cases, the efficiency of the

25 30 35 40

Data Flows

s a function of traffic load.

is, A centrality-based topology control protocol for wireless mesh.07.026

1075

1076

1077

1078

1079

1080

1081

1082

1083

1084

1085

1086

1087

1088

1089

1090

1091

1092

1093

1094

1095

1096

1097

1098

1099

1100

1101

1102

1103

1104

1105

1106

1107

1108

28 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

network with topology control is better than the all routersnetwork even though consuming less energy. The averageimprovement is about 19.54%.

The energy consumption statistics for the three rootsand 75 active flows configuration are shown in Fig. 34 forall the nodes in the network and in Fig. 35 for only non-root stations. Again, the three root stations can be easilyidentified. Although the global energy dissipation isreduced around a 10.25% (from 5782.9 to 5190.3 J) withthe topology control, we can recognize, as in the previoussection, four overloaded non-root stations regarding theAll R network. However, the nodes that dissipate less than20 J increases from 30% to 64% in the Top 40R case.

5.5. Total bit rate savings for the distributed implementation

This section includes a first approximation to the eval-uation of the proposed distributed implementation. We

5 40

200

400

600

800

1000

1200

1400

1600

Lifetime of reactive

Tota

l Sav

ing

[Kbp

s]

Fig. 37. Global bit-rate savings as a fu

20.48/8.192 10.24/4.096 5.12/2.0481200

1400

1600

1800

2000

2200

2400

2600

2800

Active path to root time

Tota

l Sav

ing

[Kbp

s]

Fig. 38. Global bit-rate savings as a fun

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

analyze the total bit-rate savings achieved with the appli-cation of the topology control mechanism. The computa-tions include the reduction of data forwardings, thereduction of path selection related messages and also thecost of the router selection protocol (Eq. (8)). For all thereported cases, in order to compute the bit rate added bythe topology control we make the following consider-ations: NT ¼ 100 nodes, NN ¼ 8 (i.e. NN equal to the averagedegree of all the nodes in the network), NR ¼ 2 whichresults on average in around 40% of nodes selected as rou-ters, and the periodicity (TUT) of the required topologycontrol related messages is the same that the routing infor-mation lifetime. Remember from Section 4.4 that TUT Pdot11MeshHWMPactivePathTimeout.

For the first set of experiments, reported in Section5.1, Fig. 36 shows the total bit-rate savings achievedwith the topology control application as a function ofthe number of data flows. In this case TUT = 5.12 s and

3 2 1

routing information [s]

nction of reactive path lifetime.

2.56/1.024 1.28/0.512 0.64/0.256

out / Root Interval [s]

ction of proactive path lifetimes.

is, A centrality-based topology control protocol for wireless mesh.07.026

1109

1110

1111

1112

1113

1114

1115

1116

1117

1118

1119

1120

1121

1122

1123

1124

1125

1126

1127

1128

1129

1130

1131

1132

1133

1134

1135

1136

1137

1138

1139

1140

1141

1142

1143

1144

1145

1146

1147

1148

1149

1150

1151

1152

1153

1154

1155

1156

1157

1158

1159

1160

1161

1162

1163

1164

1165

1166

1167

1168

1169

1170

1171

1172

1173

1174

1175

1176

1177

1178

1179

1180

1181

1182

1183

1184

1185

1186

1187

1188

1189

1190

1191

1192

1193

1194

1195

1196

1197

1198

119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231

A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx 29

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

remains constant for all the different traffic loads. Anaverage savings of 1.24 Mbps is reached with thetopology control and the previously mentioned networksaturation is also verified in this figure. It is importantto remark that the transmission/reception energy savingsof the mesh stations is directly proportional to thisreported quantity.

On the other hand, Fig. 37 shows the evolution of thisglobal traffic reduction as a function of the lifetime of thereactive routing information (experiments reported in Sec-tion 5.2). As previously justified, in these experiments theperiodicity of topology control updates is again the samethan the path lifetime. The average reduction for thereported cases is around 1.46 Mbps.

Finally, the global bit-rate reduction for the proactiveone-root case (experiments reported in Section 5.3) isshown in Fig. 38. The average value of the savings is around1.86 Mbps and as it was expected this is greater than in thereactive mode configuration.

6. Conclusions

In this paper we have evaluated the feasibility of usingthe centrality metrics from social network analysis to cre-ate a topology control mechanism based on a connecteddominating set. Specifically, for a dynamic wireless meshnetwork formed by user hand-held devices, we have pro-posed and evaluated some mechanisms to select whichof those devices must act as routers, forwarding the pack-ets received from other hand-held to their destination. Themechanism implementation has been proposed in twoways, centralized and distributed. For the centralizedapproach, we have evaluated the three most common cen-trality measures: degree, closeness and betweenness cen-trality. In all those cases, the more central nodes havebeen selected to form the backbone. The experimentalanalysis has shown that the network fragmentation usingthe betweenness centrality is considerably lesser thanthe resultant with degree or closeness centralities. Thus,it is possible to conclude that by far the betweenness cen-trality is the metric that better identifies the stations thatshould be considered for routing tasks. In the second place,taking into consideration that a centralized implementa-tion could be unfeasible in most scenarios, a distributedimplementation has been proposed. In this case only thebetweenness centrality has been considered. To distributethe responsibility, the concept of the egocentric networkperspective of each station is needed. That is, every stationcomputes its own centrality knowing only its own estab-lished links (neighbors). Besides, due to the dynamic andtime evolving nature of the network with which we aredealing, we also discuss and evaluate different distributedmechanisms to select the central stations that will act asrouters. First of all, every station selects the node in itsneighborhood with the highest centrality. This mechanismworks well in most cases if a minimum density of nodesexists. Then again, the complete connectivity is notassured. To guarantee that connectivity, some approacheshave been proposed and compared in terms of overloadand effectiveness. As a future line of work, the minimumnumber of routers per neighborhood needed to guaranty

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

a desired connectivity in the distributed implementationwill be studied.

The effectiveness of this centrality-aware topology con-trol protocol has been verified through extensive simula-tions. The evaluation has been carried out for bothreactive and proactive path selection modes. For all thestudied cases the efficiency of the network was improvedor at least remain equal but always with a considerablylower amount of transmission/reception energy consump-tion. Another common factor in all the simulation results isthe reduction of the packet end-to-end delays. This is adirect consequence of the global bit-rate savings whichimplies lower channel contention. The reduction of thenumber of mesh stations involved in the path selectionprocedure also improves the scalability when the variabil-ity of the network demands faster path updates. Finally, weconfirm that greater energy savings are obtained in theproactive path selection case because of the greater over-head present with this operation mode.

As current and future lines of work we are carrying outperformance evaluations considering human mobilitymodels. Besides, we are designing and evaluating amulti-metric protocol which assigns different weights tothe egocentric betweenness centrality and the noderemaining energy values.

Acknowledgments

This work was supported by the Spanish ResearchCouncil under project COPPI (TEC2011-26491), and bythe Ecuadorian SENESCYT (2010) and Salesian PolytechnicUniversity grant programs.

References

[1] I.F. Akyildiz, X. Wang, W. Wang, Wireless mesh networks: a survey,Comput. Netw. 47 (4) (2005) 445–487. http://dx.doi.org/10.1016/j.comnet.2004.12.001. <http://www.sciencedirect.com/science/article/pii/S1389128604003457>.

[2] W. Khan, Y. Xiang, M. Aalsalem, Q. Arshad, Mobile phone sensingsystems: a survey, Commun. Surv. Tutorials, IEEE 15 (1) (2013) 402–427, http://dx.doi.org/10.1109/SURV.2012.031412.00077.

[3] Y. Jiang, A. Jaiantilal, X. Pan, M. Al-Mutawa, S. Mishra, L. Shi,Personalized energy consumption modeling on smartphones, in: D.Uhler, K. Mehta, J. Wong (Eds.), Mobile Computing, Applications, andServices, Lecture Notes of the Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering, vol. 110, Springer,Berlin Heidelberg, 2013, pp. 343–354. http://dx.doi.org/10.1007/978-3-642-36632-1_20.

[4] A. Aziz, Y. Sekercioglu, P. Fitzpatrick, M. Ivanovich, A survey ondistributed topology control techniques for extending the lifetime ofbattery powered wireless sensor networks, Commun. Surv. Tutorials,IEEE 15 (1) (2013) 121–144, http://dx.doi.org/10.1109/SURV.2012.031612.00124.

[5] S. Narayanaswamy, V. Kawadia, R.S. Sreenivas, P.R. Kumar, Powercontrol in ad-hoc networks: theory, architecture, algorithm andimplementation of the COMPOW protocol, in: European WirelessConference, 2002, pp. 156–162.

[6] N. Li, J. Hou, L. Sha, Design and analysis of an MST-based topologycontrol algorithm, IEEE Trans. Wirel. Commun. 4 (3) (2005) 1195–1206, http://dx.doi.org/10.1109/TWC.2005.846971.

[7] Y. Xu, J. Heidemann, D. Estrin, Geography-informed energyconservation for ad hoc routing, in: Proceedings of the 7th AnnualInternational Conference on Mobile Computing and Networking,MobiCom ’01, ACM, New York, NY, USA, 2001, pp. 70–84. http://dx.doi.org/10.1145/381677.381685.

[8] F. Ye, G. Zhong, J. Cheng, S. Lu, L. Zhang, Peas: a robust energyconserving protocol for long-lived sensor networks, in: Proceedings.

is, A centrality-based topology control protocol for wireless mesh.07.026

12321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272 Q312731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310

13111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336Q4133713381339134013411342134313441345134613471348134913501351135213531354

1355

13571357

13581359136013611362136313641365136613671368136913701371

13731373

13741375137613771378137913801381138213831384

30 A. Vázquez-RodasQ1 , L.J. de la Cruz Llopis / Ad Hoc Networks xxx (2014) xxx–xxx

ADHOC 1083 No. of Pages 30, Model 3G

8 August 2014

Q1

23rd International Conference on Distributed Computing Systems,2003, pp. 28–37. http://dx.doi.org/10.1109/ICDCS.2003.1203449.

[9] J. Wu, F. Dai, M. Gao, I. Stojmenovic, On calculating power-awareconnected dominating sets for efficient routing in ad hoc wirelessnetworks, J. Commun. Netw. 4 (1) (2002) 59–70, http://dx.doi.org/10.1109/JCN.2002.6596934.

[10] R. Misra, C. Mandal, Minimum connected dominating set using acollaborative cover heuristic for ad hoc sensor networks, IEEE Trans.Parall. Distrib. Syst. 21 (3) (2010) 292–302, http://dx.doi.org/10.1109/TPDS.2009.78.

[11] Z. Yuanyuan, X. Jia, H. Yanxiang, Energy efficient distributedconnected dominating sets construction in wireless sensornetworks, in: Proceedings of the 2006 International Conference onWireless Communications and Mobile Computing, IWCMC ’06, ACM,New York, NY, USA, 2006, pp. 797–802. http://dx.doi.org/10.1145/1143549.1143709.

[12] A.-L. Barabási, Network Science, 2012. <http://barabasilab.neu.edu/networksciencebook/>.

[13] T.G. Lewis, Network Science: Theory and Applications, WileyPublishing, 2009.

[14] M. Newman, Networks: An Introduction, Oxford University Press,Inc., New York, NY, USA, 2010.

[15] D. Katsaros, N. Dimokas, L. Tassiulas, Social network analysisconcepts in the design of wireless ad hoc network protocols,Netw., IEEE 24 (6) (2010) 23–29, http://dx.doi.org/10.1109/MNET.2010.5634439.

[16] E. Stai, V. Karyotis, S. Papavassiliou, Topology enhancements inwireless multihop networks: a top-down approach, IEEE Trans.Parall. Distrib. Syst. 23 (7) (2012) 1344–1357, http://dx.doi.org/10.1109/TPDS.2011.250.

[17] C. Verma, B. Tamma, B.S. Manoj, R. Rao, A realistic small-world modelfor wireless mesh networks, Commun. Lett., IEEE 15 (4) (2011) 455–457, http://dx.doi.org/10.1109/LCOMM.2011.020111. 100266.

[18] A. Banerjee, R. Agarwal, V. Gauthier, C.K. Yeo, H. Afifi, F. Lee, A self-organization framework for wireless ad hoc networks as smallworlds, IEEE Trans. Veh. Technol. 61 (6) (2012) 2659–2673, http://dx.doi.org/10.1109/TVT.2012.2197768.

[19] D.J. Watts, S.H. Strogatz, Collective dynamics of ‘small-world’networks, Nature 393 (6684) (1998) 409–410.

[20] R. Agarwal, A. Banerjee, V. Gauthier, M. Becker, C.K. Yeo, B.S. Lee,Achieving small-world properties using bio-inspired techniques inwireless networks, Comput. J. http://dx.doi.org/10.1093/comjnl/bxs024. <http://comjnl.oxfordjournals.org/content/early/2012/03/28/comjnl.bxs024.abstract>.

[21] E.M. Daly, M. Haahr, Social network analysis for routing indisconnected delay-tolerant manets, in: Proceedings of the 8thACM International Symposium on Mobile Ad Hoc Networking andComputing, MobiHoc ’07, ACM, New York, NY, USA, 2007, pp. 32–40.http://dx.doi.org/10.1145/1288107.1288113.

[22] M. Kas, S. Appala, C. Wang, K. Carley, L. Carley, O. Tonguz, What ifwireless routers were social? Approaching wireless mesh networksfrom a social networks perspective, Wirel. Commun., IEEE 19 (6)(2012) 36–43, http://dx.doi.org/10.1109/MWC.2012.6393516.

[23] G. Pallis, D. Katsaros, M. Dikaiakos, N. Loulloudes, L. Tassiulas, On thestructure and evolution of vehicular networks, in: IEEE InternationalSymposium on Modeling, Analysis Simulation of Computer andTelecommunication Systems, MASCOTS ’09, 2009, pp. 1–10. http://dx.doi.org/10.1109/MASCOT.2009.5366230.

[24] M. Girvan, M.E.J. Newman, Community structure in social andbiological networks, Proc. Nat. Acad. Sci. 99 (12) (2002) 7821–7826,http://dx.doi.org/10.1073/pnas.122653799. <http://www.pnas.org/content/99/12/7821.abstract>.

[25] A. Cuzzocrea, A. Papadimitriou, D. Katsaros, Y. Manolopoulos, Edgebetweenness centrality: a novel algorithm for QoS-based topologycontrol over wireless sensor networks, J. Netw. Comput. Appl. 35 (4)(2012) 1210–1217. http://dx.doi.org/10.1016/j.jnca.2011.06.001.<http://www.sciencedirect.com/science/article/pii/S1084804511001135>.

[26] J. Wu, H. Li, On calculating connected dominating set for efficientrouting in ad hoc wireless networks, in: Proceedings of the 3rdInternational Workshop on Discrete Algorithms and Methods forMobile Computing and Communications, DIALM ’99, ACM, New York,NY, USA, 1999, pp. 7–14. http://dx.doi.org/10.1145/313239.313261.

[27] D. Kim, Y. Wu, Y. Li, F. Zou, D.-Z. Du, Constructing minimumconnected dominating sets with bounded diameters in wirelessnetworks, IEEE Trans. Parall. Distrib. Syst. 20 (2) (2009) 147–157,http://dx.doi.org/10.1109/TPDS.2008.74.

[28] M. Thai, F. Wang, D. Liu, S. Zhu, D.-Z. Du, Connected dominating setsin wireless networks with different transmission ranges, IEEE Trans.

Please cite this article in press as: A. Vázquez-Rodas, L.J. de la Cruz Llopnetworks, Ad Hoc Netw. (2014), http://dx.doi.org/10.1016/j.adhoc.2014

Mobile Comput. 6 (7) (2007) 721–730, http://dx.doi.org/10.1109/TMC.2007.1034.

[29] L.C. Freeman, Centrality in social networks conceptual clarification,Soc. Netw. 1 (3) (1978–1979) 215–239. http://dx.doi.org/10.1016/0378-8733(78)90021-7. <http://www.sciencedirect.com/science/article/pii/0378873378900217>.

[30] L.C. Freeman, A set of measures of centrality based on betweenness,Sociometry 40 (1) (1977) 35–41. <http://links.jstor.org/sici?sici= 0038-0431%28197703%2940%3A1%3C35%3AASOMOC%3E2.0.CO%3B2-H>.

[31] ns-3 Network Simulator. <http://www.nsnam.org/>.[32] IEEE Standard for Information Technology–Telecommunications and

Information Exchange between Systems Local and Metropolitan AreaNetworks–Specific Requirements Part 11: Wireless LAN MediumAccess Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std802.11-2012 (Revision of IEEE Std 802.11-2007) (2012) 1–2793 http://dx.doi.org/10.1109/IEEESTD.2012. 6178212.

[33] S. Kurkowski, W. Navidi, T. Camp, Constructing manet simulationscenarios that meet standards, in: IEEE Internatonal Conference onMobile Adhoc and Sensor Systems, MASS, 2007, pp. 1–9. http://dx.doi.org/10.1109/MOBHOC.2007.4428640.

[34] K. Andreev, P. Boyko, IEEE 802.11s mesh networking NS-3 model, in:Workshop on ns3, 2010, p. 43.

[35] K.M. Carley, J. Pfeffer, J. Reminga, J. Storrick, D. Columbus, ORA User’sGuide 2012, Tech. Rep., DTIC Document, 2012.

[36] S.P. Borgatti, M.G. Everett, L.C. Freeman, UCINET for windows:software for social network analysis (2002).

[37] S.P. Borgatti, Identifying sets of key players in a social network,Comput. Math. Org. Theory 12 (1) (2006) 21–34, http://dx.doi.org/10.1007/s10588-006-7084-x. <http://dx.doi.org/10.1007/s10588-006-7084-x>.

[38] P.V. Marsden, Egocentric and sociocentric measures of networkcentrality, Soc. Netw. 24 (4) (2002) 407–422. doi:http://dx.doi.org/10.1016/S0378-8733(02)00016-3. URL http://www.sciencedirect.com/science/article/pii/S0378873302000163.

[39] M. Everett, S.P. Borgatti, Ego network betweenness, Social Networks27 (1) (2005) 31–38. http://dx.doi.org/10.1016/j.socnet.2004.11.007.<http://www.sciencedirect.com/science/article/pii/S037887330400067X>.

[40] W. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficientcommunication protocol for wireless microsensor networks, in:Proceedings of the 33rd Annual Hawaii International Conference onSystem Sciences, vol. 2, 2000, p. 10. http://dx.doi.org/10.1109/HICSS.2000.926982.

Andrés Vázquez Rodas received the Elec-tronics Engineering degree (Honors) in 2004from the Salesian Polytechnic University,Cuenca, Ecuador and the M.Sc. (Honors) fromthe University of Cuenca, Ecuador in 2010. Hewas also an assistant professor at the SalesianPolytechnic University until 2010. He is cur-rently pursuing his Ph.D. at the Department ofTelematic Engineering at the UniversitatPolitècnica de Catalunya BarcelonaTech (UPC),Barcelona, Spain. His research interestsinclude wireless mesh networks, wireless

sensor networks, multimedia services and complex networks.

Luis J. de la Cruz Llopis received the tele-communication engineering degree in 1994and the Ph.D. in telecommunications engi-neering in 1999, both from the UniversitatPolitècnica de Catalunya BarcelonaTech (UPC),Barcelona, Spain. He is currently an AssociateProfessor at the Department of TelematicEngineering of the UPC. His current researchinterests include multimedia service trans-mission with QoS and network security.

is, A centrality-based topology control protocol for wireless mesh.07.026