skip to main content
10.1145/1582379.1582392acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

Topology management for public safety networks

Published: 21 June 2009 Publication History

Abstract

Topology management for public safety networks (PSNs) presents some particularities which make it a challenging problem. First, the main concerns for PSNs is rapid deployment and survivability. Second, the network requirements for different disaster scenarios may differ completely. This work describes a flexible distributed algorithm to perform network admission control and topology management for public safety wireless networks using as target architecture the network proposed by the CHORIST project [5]. The proposed algorithm is able, not only to dynamically adapt to different network requirements, but also to create homogeneous clusters, where the number of mobile routers attached to each cluster is roughly the same. The technique successfully creates and maintains the desired topology relying only on a simple and customized cost function.

References

[1]
Ying Huang, Wenbo He, Klara Nahrstedt, Whay C. Lee, Incident Scene Mobility Analysis, IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability, Waltham, MA, May 2008
[2]
R. Rajaraman, Topology control and routing in adhoc networks: a survey, SIGACT News, vol. 33, pp. 60--73, Jan. 2002
[3]
Paolo Santi, Topology Control in Wireless Ad Hoc and Sensor Networks, WILEY, July 2005
[4]
J. Q. Bao and W. C. Lee, Rapid deployment of wireless ad hoc backbone networks for public safety incident management, in Proc. IEEE Globecom, Nov., 2007
[5]
http://www.chorist.eu/, last visited Apr. 2009
[6]
S. F. Midkiff and C. W. Bostian. Rapidly-deployable broadband wireless networks for disaster and emergency response. In Proc. First IEEE Workshop on Disaster Recover Networks, June 2002
[7]
Teresa W. Haynes, S. T. Hedetniemi, Peter J. Slater, Fundamentals of Domination in Graphs, CRC; 1 ed., Jan, 1998
[8]
M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NP-Complet., Freeman, New York, 1979
[9]
V. Chvatal, A greedy heuristic for the set-covering problem, Math of Operation Research, vol. 4, no. 3, 1979
[10]
Sudipto Guha and Samir Khuller, Approximation Algorithms for Connected Dominating Sets, Algorithmica, volume 20, 1998
[11]
R. Gandhi and S. Parthasarathy, Distributed algorithms for connected domination in wireless networks. J. Parallel Distrib. Comput., Jul. 2007
[12]
http://dcg.ethz.ch/projects/sinalgo/, last visited Apr. 2009

Cited By

View all

Index Terms

  1. Topology management for public safety networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
      June 2009
      1561 pages
      ISBN:9781605585697
      DOI:10.1145/1582379
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 June 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cluster heads
      2. connection cost
      3. mesh networks
      4. public safety networks

      Qualifiers

      • Research-article

      Conference

      IWCMC '09
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 06 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media