CPSC 689-601: Special Topics in Discrete Algorithms for Mobile and Wireless Networks
Spring 2006
Reading List

0. General Background 1. MAC Layer

This section of the course will describe protocols that attempt to coordinate message transmissions over the shared communication medium.

2. Localization

These algorithms describe how a node can learn its own location, to within some reasonable approximation.

3. Time Synchronization

These papers describe various techniques for providing the nodes with a consistent notion of time.

4. Topology Control

These papers describe how to reduce transmission power while guaranteeing to maintain network connectivity.

5. Local Infrastructure

This section will contain papers that are designed to build up some local structure that can help in building distributed algorithms. Such algorithms have a local flavor; however, they may rely on the nodes having good information about the current time and about their own locations. Obtaining this information may require distributed algorithms, as described in the previous items.

6. Broadcast

Now we begin studying network-layer issues. The broadcast problem studied in these paper is that of ensuring that a certain message is eventually delivered to every node in the network.

7. Point-to-Point Routing

Much work on algorithms for mobile networks has been devoted to message routing. The algorithms in the first two subsections below (DRC, AODV, TORA, etc.) do not rely on any kind of geographic information, whether absolute or relative; they just rely on connectivity information (who are my neighbors). In that sense, they seem quite a bit like "traditional" routing algorithms for wired networks.

7.1 "Classic" Routing Algorithms

7.2 Link-Reversal Routing Algorithms 7.3 Location-Free Routing

These algorithms do not use information about actual locations in Euclidean space. Rather, they try to determine, and use, some other kind of "distance".

7.4 Other Protocols 8. Location-Based Communication Services

8.1 Location Services

A location service maps node ids to their geographic locations. This can be combined with lcoation-based routing (see below). Various algorithms have been proposed.

8.2 Location-Based Routing

These routing algorithms use information about the geographic location of the nodes to determine how to route messages to destinations.

9. Global Infrastructure

This topic includes problems like constructing and maintaining spanning trees and clusters.

10. Middleware Services

These papers show how to implement various kinds of global services, which may be useful in implementing applications.

10.1 Token Circulation, Leader Election

10.2 Mutual Exclusion, Resource Allocation 10.3 Group Communication 11. Virtual Node Layers

11.1 Compulsory Protocols

An important precursor to the virtual nodes work was the "compulsory protocols" by Hatzis, et al. These protocols rely on mobile nodes that move according to a pre-planned pattern.

11.2 Virtual Nodes

Vrtual nodes are explicit active entities that are implemented by the real mobile nodes. They may be stationary or mobile. If they are mobile, they can emulate moving nodes in compulsory protocols.

12. Applications

12.1 Data Aggregation

12.2 Implementing Atomic Memory 12.3 Robot Motion Coordination 12.4 Car Networks 12.5 Tracking Non-Cooperating Objects (Intruders)