Neighbor Discovery among Mobile Nodes Equipped with Smart Antennas Martha E. Steenstrup Stow Research L.L.C. Flanders, NJ USA in time and hence over the achievable network topology, represented as a directed graph. Usually, network managers impose certain objectives and constraints on the network in terms of acceptable performance or particular characteristics that the network or individual nodes and links must exhibit. Examples of objectives include minimizing the average rate of energy dissipation or the average amount of interference inflicted on other nodes per transmission. Examples of constraints include bounds on network properties such as k-connectivity and maximum diameter, node properties such as minimum and maximum degree, and link properties such as maximum bit error rate. The constraints result in a set of admissible network topologies, each of which is a subgraph of the achievable network topology. Note that it might be impossible for the nodes to form an admissible topology without relaxing any of the constraints. Nodes may act independently or cooperatively to form an admissible topology and may have access to complete or only partial information about the current state of the network when doing so. In the mobile wireless context, we expect that each node will have only a partial view of network state and that this view may be out-of-date because of volatility of state and limitations on opportunities for communication of information, potentially leading to the formation of an inadmissible topology. Even if each node were to have perfect information about the current state of the network, computing an admissible topology for a large network might be impractical, because for many combinations of objectives and constraints the topology formation problem is NP-hard. In such cases, efficient approximation or heuristic algorithms that yield a “reasonable” topology should be employed instead of exhaustive search. Thus, in practice, the routing topology formed by the nodes is not guaranteed to be admissible with respect to the specified constraints or optimal with respect to the specified objectives. Abstract - In mobile wireless networks, individual nodes with adaptive transceivers and antennas can control the network topology in order to achieve desired properties of the network as a whole or to satisfy specific needs of individual sessions. We examine the role of smart antennas in topology management, where we define a “smart” antenna as one that can form a relatively narrow (transmit or receive) beam and steer it in an arbitrary direction. By focussing energy in a specific direction, such antennas can offer benefits such as increased range and reduced interference and probability of detection, but they also present challenges in terms of determining pointing directions for communication among mobile nodes. In this paper, we address the problems of forming and maintaining neighbor relationships among nodes, a key aspect of topology management, providing solutions that do not rely on prior information about node locations to efficiently and effectively direct transmissions. I. INTRODUCTION In a mobile wireless network, the ability of two nodes to communicate directly depends upon the fundamental properties of radio signal propagation; the inherent characteristics of the environment in which the nodes exist, including the presence of hostile entities; the capabilities of the nodes’ transceivers and antennas; and the current locations and relative mobility of the nodes. Terrain, foliage, weather, obstacles, node movement, and the presence of emitters of electromagnetic radiation all affect communication between the nodes, resulting in problems such as distance-based attenuation, multipath fading, shadowing, and interference. An agile node can mitigate many of these effects by adapting its transceiver and antenna parameters, such as frequency, power, modulation, transmission rate, error-control coding, and transmit and receive beam patterns, to the current situation. Furthermore, an agile node may improve communication by moving to a new location and by using reflective surfaces and barriers to its advantage to increase or limit the range of its transmissions and to reduce interference. Thus, each node can exercise control over the set of nodes with which it can communicate directly at a given point A. Routing Topology The process of forming the routing topology begins with neighbor discovery. During neighbor discovery, each node first determines achievable links to other nodes in the network and then eliminates those that would likely result in an inadmissible topology. The remaining links define the set of neighbors. A node, X, is said to be a neighbor of a node, Y , if X is currently reachable from Y via direct This work was funded in part by the U.S. Army Research Laboratory under SBIR contract DAAD17-02-C-0114 awarded to San Diego Research Center, Inc. and was performed when the author was employed by SDRC. 1 communication and if inclusion of the link from Y to X is not likely to result in an inadmissible topology. Neighbor discovery produces a routing topology which may be subsequently refined depending upon the expected persistence of neighbor relationships and upon the service needs of particular sessions. Persistent neighbor relationships result in links that are likely to last for more than a few seconds and thus can be used effectively in transporting data traffic across the network. Such links may also be advertised as part of the routing information associated with the node, depending upon the routing procedure used in the network. In selecting persistent neighbors, a node favors those that are less mobile and exhibit minimal outages. Nevertheless, in a mobile wireless network, no link is expected to exist forever, and thus nodes must attempt to adjust the routing topology toward admissibility when neighbors vanish. Tactical networks must exhibit a low probability of detection. Thus, the routing topology for such networks will likely consist of a set of low-power links meeting a minimum tolerated error rate that form a connected network. It may often be the case that the current routing topology is unable to provide a particular session with the desired quality of service, especially if the session needs low delay, since paths through the low-power topology are likely to comprise multiple hops. By including a longdistance link from the achievable topology, e.g., one that directly connects the source and destination, the network might be able to provide the quality of service desired for the session, although the resulting topology might no longer be admissible. A node decides whether to negotiate an ephemeral neighbor relationship with another node to improve the performance of a session, depending upon the importance and expected duration of the session and the anticipated negative effects of using the corresponding link. This link is known only to the two nodes it connects and is never advertised as part of the node’s routing information. An ephemeral neighbor relationship is terminated as soon as it is no longer needed. B. Proposed Approaches To date, most of the work on topology management in mobile wireless networks has centered on the problem of finding an assignment of transmit power levels to nodes that minimizes a particular function of transmit power (e.g., maximum level assigned to any one node or total assigned to all nodes) while maintaining k-connectivity of the network graph for some k ≥ 1. Results have included centralized and distributed algorithms, heuristics for use when only partial information about the network is available, and approximation algorithms for the NP-hard problems. Refer to [9, 7, 10, 5] for detailed descriptions and analyses of proposed algorithms. Given the complexity of apparently simple problems (such as the assignment of transmit power levels to each node so as to minimize the total power consumed in the network while keeping the network graph 1-connected, which is shown to be NPhard [2,6]), it is not surprising that more complicated topology management problems requiring satisfaction of multiple objectives and constraints and involving adjustment of transceiver and antenna parameters in addition to transmit power and beam direction, have not yet received much attention. Moreover, techniques for adapting the network topology to the needs of specific sessions are only beginning to receive serious consideration as the technology for smart antennas matures. In the remainder of this paper, we focus on neighbor discovery in networks equipped with smart antennas. We present and compare two simple algorithms that enable nodes to detect each other, and thus form a connecting link in the routing topology, using directed transmissions and without the aid of geolocation information. We also provide a rendezvous procedure that can be used to monitor presistent neighbor relationships and establish ephemeral ones. These algorithms form the foundation on which a general scheme for topology management in networks with smart antennas can be built. II. DIRECTIONAL NEIGHBOR DISCOVERY In a tactical network, communications are likely to take place in three dimensions. Not only will there be communications between terrestrial and airborne nodes, but also between terrestrial nodes located at various elevations and among airborne nodes flying at different altitudes. Ideally, a node should be able to detect a neighbor located in any direction (θ, φ) on the sphere, where θ ∈ [0, 2π) is the horizontal angle and φ ∈ [ π2 , − π2 ] is the vertical angle, in radians. The ability of two nodes to detect each other’s presence through their transmissions depends upon the environment in which they are operating, the settings of their transceiver and antenna parameters, and whether neighbor discovery is executed synchronously or asynchronously among nodes. Most existing neighbor discovery algorithms operate aynchronously as follows. Each node intermittently advertises its presence, thus offering itself as a potential neighbor to other nodes within reception range. Repeated advertisements are necessary to provide information about a node’s presence to other nodes that have recently (re)entered its part of the network. A recipient of a node’s advertisement learns that the advertising node can communicate directly with it, but it should not infer that it can communicate directly with the node. In wireless networks, unidirectional communication between a pair of nodes is not a rare event and may result from interference affecting one node but not the other or mismatches in the transmission and reception capabilities of the two nodes. Node advertisements enable a recipient not only to learn of a potential neighbor but also to track the reachability of an existing neighbor. Failure to receive advertisements 2 from a known neighbor is an indication that the neighbor is no longer directly reachable. A node’s advertisement usually includes a list of its known neighbors. This information enables a recipient to determine whether its own advertisements have reached the advertising node. Presence of the recipient on the node’s advertised list of neighbors indicates that the node has indeed received the recipient’s advertisements, but the absence of the recipient on the advertised list does not necessarily indicate that the node has failed to receive the recipient’s advertisements, since formation of a neighbor relationship depends upon not only receipt of advertisements but also whether the associated link is likely to be admissible. A node’s advertisement may also contain information about transmissions and receptions (e.g., transmit power, received signal-to-noise-plus-interference ratio) that might be used to adjust parameters to improve communications with the recipient. Both omnidirectional and directional neighbor discovery techniques (e.g., [8,5]) have been proposed for use in networks with smart antennas. Omnidirectional techniques are intended to bootstrap the process of determining antenna pointing directions for data transmissions. In most cases, each node is assumed to be able to ascertain its geolocation and includes this information in its advertisements, thus permitting a recipient to compute the direction in which the node lies and hence where to point an antenna beam for future directional data transmssions to or from the node. Directional techniques are likely to detect more potential neighbors than omnidirectional techniques, because of the higher gains and hence longer range associated with directional transmission and reception. Most of the directional techniques proposed have been designed for use with sectored antennas, in which the antenna transmits advertisements out one or more of its sectors and listens on all sectors but only selects the sector with the strongest signal, ignoring the signals received from the other sectors. Thus, a node can determine the general direction from which a advertisement is received, without geolocation information. In contrast to the above techniques, our neighbor discovery algorithm is specifically designed for beam-steering antennas. It requires synchronous operation among nodes but does not require that a node know its geolocation or that of any other node in the network. A node must possess certain capabilities in order to successfully execute this algorithm. These capabilities are outlined below, but the particular technologies for realizing them are not discussed. Each node can form a single transmit or receive beam of arbitrary width ω < π radians and steer the beam in an arbitrary direction. Thus, each node has the ability to transmit and receive directionally. Furthermore, each node has the ability to receive omnidirectionally and to determine direction of arrival. All nodes agree on the cur- rent time and hence can synchronize their activities based on a common global clock. Time is divided into frames and a portion of each frame is dedicated to neighbor discovery. A. Scanning for Neighbors With our algorithm, each node is in one of two modes, scanning or listening, during the neighbor discovery portion of each frame. When scanning, a node probes a sequence of directions for potential neighbors, by transmitting an advertisement in each specified direction. When listening, a node waits for advertisements, which are received omnidirectionally. If a listening node receives an advertisement, it determines the direction of arrival, responds directionally with its own advertisement, and expects to receive an acknowledgement in return, all within a short time interval. This exchange of advertisement messages may also be used to negotiate future rendezvous to reassess reachability, if both nodes tentatively agree to become neighbors. Depending upon the amount of time required to step through the sequence of directions and the proportion of time allotted to neighbor discovery during a frame, only a subset of a sequence may be probed in each frame. This algorithm enables scanning nodes to use very narrow beams and hence to detect distant neighbors reachable only with the additional gain provided by the transmitting antenna. Replacing omnidirectional with directional listening increases the gain of the receiving antenna and hence the size of the region in which potential neighbors can be detected, but it causes the neighbor discovery algorithm to become less tolerant of relative movement among nodes and of discrepancies in beam alignment and clock synchronization among nodes and hence is better suited to quasi-stationary networks. Scanning sequences with directional transmission and reception have been proposed for scheduling transmissions among nodes with directional antennas, once neighbor relationships and directions have been established. According to the approach in [1], nodes listen directionally for data transmissions according to a predetermined scanning pattern known to all nodes. If the current direction of the receive beams is (θ, φ), each node knows that it can point its transmit beam in direction ((θ + π) mod 2π, −φ) and communicate with a neighbor lying in that direction. We note that our analysis of the algorithms for neighbor discovery, described in the remainder of the paper, is independent of whether nodes listen directionally or omnidirectionally for scanning nodes and hence applies in both cases. A scan is a sequence of antenna-pointing directions, S = {(θi , φi ) : 1 ≤ i ≤ n}. A full scan induces a minimal covering of the unit sphere by caps formed by the intersection of the sphere and beams of width ω centered over each of the pointing directions. Use of a minimal covering ensures that each point on the sphere is covered 3 by at least one beam and that the length of the sequence is the shortest possible. The area of each cap is: Z 1 ω Acap = 2πdx = 2π(1 − cos ). ω 2 cos 2 scanning at any point in time, entering the current scan, t−t αj (S), at the appropriate element, k, where k = d δ j e t and j = d ∆ e. B. Mode Selection Algorithms The lower and upper limits on the number of scans necessary for all nodes in the network to discover all of their potential neighbors depends on the characteristics of the achievable network graph and the algorithm a node uses to select its mode, scanning or listening, for each scan. At least one scan is required if the graph contains no cycles of odd length, and at least two scans are required if the graph contains at least one cycle of odd length. The following deterministic algorithm for selecting the mode of each node yields an upper limit of dlg N e scans necessary for all nodes to detect all of their neighbors, where N is the number of nodes in the network and minimal node movement and interference and obstruction among signals is assumed. Each node is initialized with the parameters N , j ∈ {0, ..., N −1} (its unique identifer), and mj0 = j. For each scan i, 1 ≤ i ≤ dlg N e, node j comN putes mji = mj(i−1) mod d 2i−1 e, and then chooses scanN ning mode, if mji < d 2i e, or listening mode, if mji ≥ d N 2i e. Thus, during the first scan, a node has the opportunity of detecting one-half of the nodes in the network. Comparing two successive scans from the perspective of a given node, half of the nodes currently sharing the same mode as the given node are forced to choose the opposite mode for the next scan. Thus, during the next scan, a node has the opportunity of detecting one-half of the nodes that were undetectable during the previous scan. This algorithm guarantees that all nodes will detect all potential neighbors within dlg N e scans and may detect them in fewer scans. In fact, dlg N e is the lowest limit on the maximum number of scans required for any algorithm in which nodes have no other prior information about the network, other than the three initialization parameters listed above. Depending on the assignment of identifiers to nodes, the number of scans required for all nodes to detect all of their potential neighbors may be considerably more than two using this deterministic algorithm, even with no cycles of odd length in the achievable network graph. For example, if there are 20 nodes in the network and node 1 is the only node within range of node 0, nodes 0 and 1 will not detect each other until the fifth and final scan. In this case, the number of scans required for nodes 0 and 1 to detect each other is equal to the maximum number of scans required for all nodes in the network to detect all potential neighbors. The following stochastic algorithm for selecting the mode of each node has no upper limit on the number of scans necessary for all nodes to detect all of their potential neighbors, but is amenable to analysis of expected behavior. For each scan, each node randomly chooses its Thus, a lower bound on the cardinality of a minimal covering of the unit sphere by caps defined by ω is: Asphere 4π 2 = = . Acap 2π(1 − cos ω2 ) 1 − cos ω2 The general problem of finding a minimal covering of the sphere by equal caps defined by angle ω appears to be open, although coverings have been found for specific cases (see [4]). One can use stochastic search techniques, such as simulated annealing, to find coverings of the unit sphere that are likely to be close to minimal. For most situations encountered in practice, a scan, S, need only cover a hemisphere or an equatorial band and hence is a proper subset of the full scan. If two nodes are within reception range of each other, one scanning and one listening, they are guaranteed to detect each other within a single scan, provided that they do not move during that time and that no external entities interfere with or obstruct their communications. The reason is that the scanning node’s transmit beam must point toward the listening node at some time during the scan. If at least one of the nodes is mobile, however, the two nodes might never detect each other. Consider the following pathological example in the plane. Suppose that node X is scanning and node Y is listening, and that the scan, S = {θi : 1 ≤ i ≤ n}, is a monotonically increasing sequence starting at θ1 = 0. Furthermore, suppose X and Y are located on a circle with X at 0 and Y at π initially, and both move counterclockwise around the circle at the same angular speed as the angle changes in the scan. In this case, X always points its transmit beam in a direction diametrically opposed to that in which Y lies. A node might detect all of its potential neighbors within a single scan, but it will usually require multiple scans to find them. Mobile nodes within range of each other can increase the likelihood of mutual detection by choosing a different sequence for each scan. Returning to the pathological example above, if X now chooses a scan, S 0 = {θi0 : 1 ≤ i ≤ n} such that θi0 = (θi + π) mod 2π, X will point its transmit beam at Y throughout the entire scan and thus X and Y will detect each other within a single scan. We recommend that the scanning algorithm be initialized with a pseudorandom sequence of permutations, {αi : i ≥ 0}, to be applied to the initial scan S and a partitioning of time into equal intervals Ti = [ti , ti+1 ) of duration ∆, such that a node applies permutation αi at time t if t ∈ Ti . Let δ be the time required to execute a single direction of a scan sequence. Thus, a node can start 4 mode according to a uniform distribution. The expected number of scans required for nodes 0 and 1, described above, to detect each other with this algorithm is two, as follows. Suppose that a new node comes within range of L > 0 other nodes. The expected number of scans required for the node to discover at least one of its L potential neighbors is: Eany µ ¶ ∞ µ ¶i 1 X 1 2L = 1− L (i + 1) = . 2 2L 2L − 1 i=0 its potential neighbors to form a connected routing topology. Thus, Etree = k=1 = = = ∞ X i=1 ∞ X (1) i(Pi − Pi−1 ) à µ ¶L µ ¶L ! 1 1 i 1− i − 1 − i−1 2 2 i=1 µ ¶µ ¶ L X L 2k (−1)k+1 . k 2k − 1 (2) k=1 Another useful expectation is the number of scans required to form a connected routing topology following node deployment, since once such a topology is formed, communication can theoretically take place among any nodes in the network. To compute this expectation, in the case of the stochastic mode-selection algorithm, we begin with the achievable network graph, in which the presence of a link between two nodes indicates that the two nodes are able to communicate directly. We consider only connected achievable graphs since only these can lead to connected routing topologies. Although we have been unable to generate a closed-form expression for this expectation for an arbitrary N -node achievable graph, we can compute it exactly when the achievable graph is a complete graph or a tree. In the case of a complete graph, which is (N − 1)-connected, as long as all nodes do not choose the same mode for a scan, neighbor discovery will produce a connected routing topology. Thus, Ecomplete = (−1)k+1 µ N −1 k ¶µ 2k k 2 −1 ¶ , which can be derived directly from (2). Any connected N -node achievable graph must be k-connected, where 1 ≤ k ≤ N −1, and thus the expected number of scans required to form a connected routing topology given such a graph must be at least Ecomplete and at most Etree . We have relied on Monte Carlo simulation to compute estimates of the expected number of scans required to form a connected routing topology, given an arbitrary N node achievable network graph, for both the stochastic and deterministic mode-selection algorithms. Achievable graphs were constructed by generating random graphs such that a link was added between two nodes according to a fixed probability. If the resulting achievable graph was not initially connected, randomly-selected links were added one at a time between the components, until the graph was connected. For the example illustrated here, twenty different 20-node achievable graphs were generated. For each graph, twenty different random permutations of node identifiers and twenty different random settings of mode were selected for the deterministic and stochastic algorithms respectively. Results are shown in table 1. We provide the average number of scans computed from the simulated networks; the maximum and minimum number of scans exhibited by all 400 simulations from which each average was computed; and the expectations, Etree and Ecomplete , derived for N = 20. We also give, for the randomly-generated achievable graphs, the initial probability of including a link and the average degree of a node. We conclude that in networks with static membership, neighbor discovery with deterministic mode selection requires significantly fewer scans than with stochastic mode selection, both in the worst case and on average. In networks with dynamic membership, however, the outcome may be different. The deterministic algorithm must be initialized with the maximum number of nodes anticipated rather than the actual number of nodes currently in the network, and the larger the difference in these two values the higher the number of scans that may be required. The stochastic algorithm, however, does not rely on any knowledge about the network, and hence the number of scans required is independent of the difference between anticipated and actual membership. Thus, Eany ∈ (1, 2], with Eany = 2 when L = 1 and Eany → 1 as L → ∞. Therefore, the expected number of scans required for a node to join an existing network is no more than two, independent of the number of potential neighbors. The expected number of scans, Eall , required for a node to detect all L of its potential neighbors depends upon Pi , the probability that at most i scans are required to discover all potential neighbors. Thus, with some rearrangement of terms, Eall N−1 X 2N−1 , 2N −1 − 1 C. Rendezvous The technique of scanning is useful not only for discovering potential neighbors but also for monitoring the persistence of links and for establishing ephemeral links. which can be derived directly from (1). In the case of a tree, which is 1-connected, each node must discover all of 5 link prob. avg. degree tree 0.05 1.92 0.1 2.41 0.2 4.12 0.4 7.95 complete graph deterministic connect all nbrs 4.36 3.77 2.34 1.08 [2,5] [2,5] [1,5] [1,3] 4.38 4.53 4.84 4.99 [2,5] [3,5] [3,5] [4,5] stochastic connect all nbrs 5.62 5.57 [2,12] 5.62 [2,12] 4.62 [2,10] 6.01 [3,12] 2.76 [1,9] 6.76 [3,13] 1.17 [1,3] 7.73 [4,14] 1.00 Table 1: Expected number of scans required to form a connected routing topology and to find all potential neighbors in various 20-node networks, using deterministic and stochastic mode selection during neighbor discovery. When two nodes detect each other during a scan, they may elect to form a neighbor relationship conditional upon the observed persistence of their direct link. Specifically, when exchanging advertisements, the nodes negotiate a set of future rendezvous to reassess the link before including it in the routing topology. The listening node always starts the negotiation by including in its advertisement sent to the scanning node a set of candidate rendezvous times (expressed as particular frames within a block of frames), and the scanning node responds with an acknowledgement containing its selection of rendezvous times from the set offered (or an indication that it does not wish to rendezvous). Rendezvous are always conducted during the neighbor-discovery portion of a frame and supersede the sequence of directions usually scanned during that time. Beginning at the negotiated rendezvous time, the two nodes attempt to reestablish communications using a directionally-restricted spiralling scan whose duration is no longer than the portion of the frame allotted to neighbor discovery. This approach enables the two nodes to quickly detect each other, provided that they have not moved a large angular distance relative to each other since their last contact. Each node maintains a special scanning sequence for rendezvous, comprising a set of directions starting with (0, π2 ) and spiralling outward counterclockwise to cover an angle ψ . To produce a spiral sequence starting in a particular direction, the appropriate rotation can be applied to this sequence. The node, X, that requested the rendezvous executes a spiral scan for the other node, Y , starting with its last known direction for Y . Y listens for X ’s advertisement beginning at the rendezvous time negotiated. If X and Y detect each other at some point during the scan, the link is still intact. Moreover, through the exchange of advertisements during this scan, each node has the opportunity to determine direction of arrival and hence update its directional information for the other. The two nodes may require multiple successful rendezvous before including their link in the routing topology, depending upon the specified criteria for persistence. Rendezvous are also used in forming ephemeral neighbor relationships with distant nodes to improve performance of specific sessions. In this case, a node, X , at- tempts to form an ephemeral link with a distant node, Y , only if X can already communicate with Y over a multiple-hop path composed of persistent links and if X has information about Y ’s direction, implying that X and Y must have detected each during a prior scan. Since X and Y do not currently have a neighbor relationship, X must solicit a rendezvous with Y using multihop communication across a path connecting the nodes. Specifically, X sends a message to Y containing a set of candidate rendezvous times, and Y responds with a message containing the rendezvous times selected. (The general technique of communicating over multiple-hop paths to bootstrap direct communications between distant nodes has previously been proposed for CSMA/CA medium access control in the context of directional antennas [3].) X and Y attempt to rendezvous at the negotiated time, with X executing a spiral scan starting with its last known direction for Y and Y listening for X’s advertisement. If X and Y detect each other at some point during the scan, the ephemeral link can be successfully established. REFERENCES [1] T. Charbonneau and B. Rodgers, Synchronized directional antennas with slotted channel access, 2003 IEEE Comm. Theory Workshop, April 2003. [2] W. Chen and N. Huang, The strongly connecting problem on multihop packet radio networks, IEEE Trans. Comm., Vol. 37, No. 3, March 1989. [3] R.R. Choudhury, X. Yang, R. Ramanathan, and N.H. Vaidya, Using directional antennas for medium access control in ad hoc networks, ACM MobiCom 2002, September 2002. [4] R.H. Hardin, N.J.A. Sloane, and W.D. Smith, Spherical Coverings, http://www.research.att.com/˜njas/coverings/. [5] Z. Huang, C.-C. Shen, C. Srisathapornphat, and C. Jaikaeo, Topology control for ad hoc networks with directional antennas, ICCCN ’02, October 2002. [6] L.M. Kerousis, E. Kranakis, D. Krizanc, and A. Pelc, Power consumption in packet radio networks, STACS ’97, February 1997. [7] E. Lloyd, R. Liu, M.V. Marathe, R. Ramanathan, and S.S. Ravi, Algorithmic aspects of topology control problems for ad hoc networks, ACM MobiHoc 2002, June 2002. [8] R. Ramanathan, On the performance of ad hoc networks with beamforming antennas, ACM MobiHoc 2001, October 2001. [9] R. Ramanathan and R. Rosales-Hain, Topology control of multihop wireless networks using transmit power adjustment, IEEE INFOCOM 2000, April 2000. [10] R. Wattenhofer, L. Li, P. Bahl, and Y.M. Want, Distributed topology control for power efficient operation in multihop wireless ad hoc networks, IEEE INFOCOM 2001, April 2001. 6