Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD FOR IMPROVED TOPOLOGY MAPPING IN WIRELESS COMMUNICATION NETWORKS
Document Type and Number:
WIPO Patent Application WO/2012/106140
Kind Code:
A2
Abstract:
A method is provided for enabling a base station to infer a compact topology graph among a set of mobile nodes in its cell, the mobile nodes having a secondary radio to enable inter-nodal communication. This methodology ensures that nodal membership information is gathered within approximately 100 ms, and additional topology information is gathered from all the mobile nodes within approximately 300 ms over Wi-Fi radios. In dense networks, this time can be reduced to within 100 ms.

Inventors:
BEJERANO YIGAL (US)
NANDAGOPAL THYAGARAJAN (US)
GUO KATHERINE H (US)
Application Number:
PCT/US2012/022294
Publication Date:
August 09, 2012
Filing Date:
January 24, 2012
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ALCATEL LUCENT (FR)
BEJERANO YIGAL (US)
NANDAGOPAL THYAGARAJAN (US)
GUO KATHERINE H (US)
International Classes:
H04W40/24; H04W84/18
Foreign References:
US7660319B22010-02-09
US7688846B22010-03-30
Other References:
See references of EP 2671408A4
Attorney, Agent or Firm:
STEIN, Julie, E. (Attention: Docket Administrator - Room 3D-201600-700 Mountain Avenu, Murray Hill NJ, US)
Download PDF:
Claims:
The Claims:

1. A method in a wireless communication system for determining a network topology among a plurality of mobile nodes forming a cluster and having a common communication link to a base station, each mobile node having a unique identity, the method comprising:

causing at least one of the mobile nodes to transmit a signal during a transmission interval, the at least one node thereby becoming a cluster head (CH);

selecting, at mobile nodes other than the CH (hereafter "non-CH nodes"), one or more transmission intervals in a transmission frame;

causing ones of the non-CH nodes to transmit a signal during the selected interval for given non-CH nodes;

forming, by the CH, a first digest of transmitted signals received from non-CH nodes according to the transmission interval in which at least one signal is received; constructing a compact topology graph for the node cluster as a function of the digest, a node identity for the CH and the transmission intervals in which the CH signal was transmitted.

2. The method of claim 1 wherein ones of the non-CH nodes

(1) detect transmitted signals from other non-CH nodes in a sequence of transmission intervals;

(2) upon detection of signals transmitted over the transmission frame, record a presence or absence of at least one transmitted signal in transmission intervals of the frame as a vector; and

(3) transmits the vector to the CH.

3. The method of claim 2 wherein the CH forms a second digest of transmitted signals according to the transmission interval in which a given signal is detected based on the vectors transmitted by the non-CH nodes.

4. The method of claim 3 further comprising constructing a second compact topology graph as a function of the first and second digests, a node identity for the CH and the transmission intervals in which the CH signal was transmitted.

5. The method of claim 1 wherein the forming by the CH of a first digest further comprises logging, as a binary vector, a presence or absence of a signal transmitted from ones of the non-CH nodes during each of the transmission intervals in the transmission frame. 6. The method of claim 5 wherein the CH node determines the presence or absence of a transmitted signal in a given transmission interval as a function of received signal energy relative to a predetermined threshold value.

7. The method of claim 2 wherein ones of the non-CH nodes determine the presence or absence of a transmitted signal in a given transmission interval as a function of received signal energy relative to a predetermined threshold value.

8 The method of claim 1 wherein the selection of transmission intervals by the non-CH nodes is carried out in a manner to assure that at least one of the transmission intervals selected by ones of the non-CH nodes is free of collisions from other transmitting non-CH nodes. 9. The method of claim 8 further wherein each of the non-CH nodes transmits in up to d transmission intervals in a window of length k transmission intervals, where k and d are integral values provided by the base station.

10. The method of claim 9 wherein a determination by a given non-CH node of the up-to d transmission intervals in which it will transmit is based on a random hash of a seed value and an identification indicia for the given non-CH node, where the seed value is provided to the non-CH node by the base station.

Description:
METHOD FOR IMPROVED TOPOLOGY MAPPING IN WD3ELESS

COMMUNICATION NETWORKS

FIELD OF THE INVENTION

[001] The present invention generally relates to nodal mapping in a wireless

communications system.

BACKGROUND OF THE INVENTION

[002] Contemporary wireless communication systems are characterized by multiple radio access technologies, some of which result from an evolution of successive generations of cellular communications services and some of which represent wireless communication services that have developed outside the conventional cellular paradigm. Examples of the former include Universal Mobile

Telecommunications System (UMTS) and Long Term Evolution (LTE), while 802.11 services such as Wi-Fi exemplify the latter. A multi-mode user terminal (hereafter usually referred to as a mobile node) having RF capabilities compatible with two or more radio access technologies can switch to an available technology that is most suitable at the relevant time. This provides advantages for both the user ~ who may be able to access a network operating with a given technology at a given time, but not a network for the other technology supported by the user's terminal, and the system operator operating with multiple technologies in its network ~ which will often be able to do load-sharing between different technology carriers, so as to improve network usage and performance.

[003] At least for the case of user terminals supporting access with both a conventional cellular system and with an 802.11 system, the aggregate available network may be characterized as implementing a hybrid cellular architecture. An advantage of hybrid cellular architectures lies in the ability of end-user devices to assist the base station (BS) in various functions by acting as content caches, cell relays, aggregators, mobility predictors, and the like. In a hybrid architecture, the key differentiator is that the base station knows the location of a given mobile node (MN) as well as that of its neighbors. This location information supports the determination by the base station of the topology of a network formed by the mobile nodes using their secondary radio (generally, the radio supporting access to an 802.11 system). Availability of this topology information is vital for the base station in order to fully exploit the potential benefits of a hybrid architecture.

[004] Although procedures for discovery of topology information by mobile nodes in a cell is generally known in the art, the conventional focus has been on how each node discovers the entire network connectivity graph. In a hybrid model, the base station has to know the topology of the underlying network graph among its served MNs. However, the base station does not necessarily need to know the entire set of links among all of the served MNs. For example, the base station might be interested in knowing only the high-quality links between the served MNs, or it might be interested in knowing only if there exists at least one path between those MNs, etc. Many of these functions may be addressed without knowledge of the entire topology of the MN network. The reduced topology so needed is referred to herein as a compact topology graph (CTG).

[005] Another issue is that, while topology discovery can happen in a distributed

manner for an ad-hoc wireless network, in the case of a hybrid network, the process is centralized in nature with all mobile nodes informing a single destination {i.e., base station) about their neighbors. This can result in excessive transmission overhead.

[006] In modern cellular data networks, communication from the MN to the base station involves some signaling to acquire a bearer channel and once the bearer is acquired, transmission of data over the bearer. For a typical cell with hundreds of users, doing the above solely for the purpose of topology discovery can become a significant bottleneck.

[007] A typical manner in which this resource constraint can be relaxed is by use of clustering, wherein groups of MNs organize themselves into clusters and elect a cluster-head (CH), with each CH discovering the cluster topology and communicating this to the base station. Thus, the signaling overhead is proportional to the number of CHs, while the data transmitted is at most the same as before. In principle, each CH performs at least one of the functions: (a) identify the membership information for each cluster, or (b) identify the topology of the cluster. However, the methods of the art carry out such functions in a sub-optimal way. SUMMARY OF INVENTION

[008] The invention provides novel methods to perform both of the above-described CH functions. Specifically, the invention provides a method for communicating a compact topology representation of the underlying network graph formed by the secondary radios of the MNs to the base station in a fast and efficient manner.

[009] In an embodiment of the invention, a fast algorithm is provided that allows the base station to infer the compact topology among the mobile nodes with a secondary radio in its cell. This methodology ensures that membership information is gathered within approximately 100 ms, and additional topology information is gathered from all the mobile nodes within approximately 300 ms over Wi-Fi radios. In dense networks, this time can be reduced to within 100 ms.

[0010] In a further embodiment, the base station can obtain the topology of the network without any mobile node revealing its identity to any other mobile node. This has significant implications regarding the privacy of mobile nodes.

BRIEF DESCRIPTION OF THE FIGURES

[0011] The teachings of the present invention can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:

[0012] Figure 1 provides a schematic depiction of a a wireless system arrangement in which the method of the invention may be implemented.

[0013] Figure 2 depicts illustrative compact topology graphs for a given nodal network.

[0014] Figure 3 provides a schematic representation of nodal transmission slots

determined according to the method of the invention.

[0015] Figure 4 provides a nodal representation for computation of a compact topology graph according to the method of the invention.

DETAILED DESCRIPTION

[0016] In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular architectures, interfaces, techniques, etc., in order to provide a thorough understanding of illustrative embodiments of the invention. However, it will be apparent to those skilled in the art that the invention may be practiced in other illustrative embodiments that depart from these specific details. In some instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of described embodiments with unnecessary detail. All principles, aspects, and embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future.

[0017] The invention is described hereafter in terms of a methodology for determining a compact topology representation for a network of mobile nodes. While the disclosed invention is illustratively described in terms of mobile nodes having dual radio access to a cellular wireless communication system such as LTE or High Speed Packet Access (HSPA) and to an 802.11 system such as Wi-Fi, it should be readily apparent that the inventive concept is applicable to networks of mobile nodes having either dual radio access to other wireless system combinations or to mobile nodes having only single radio access to 802.11 systems.

[0018] As a predicate to a detailed description of the methodology of the invention, consider the cellular data network shown in Figure 1 , which illustratively may be implemented according to LTE or HSPA standards. There are multiple cells in the network, each accessed via the equivalent of a base station, which in the case of the illustrative LTE/HSPA network is designated as an eNodeB (eNB). The eNBs are connected via a signaling path to a Mobility Management Entity (MME), and via a data path to the Serving Gateway (SGW). The eNBs are controlled by the

MME/SGW pair, and a single MME/SGW complex generally represents a large geographic area, with scores of cells. When a Mobile Node (MN) enters the network, it first registers itself with the MME (via an appropriate one of the eNBs), and establishes a control channel with it. When the MN sends data, it must first signal the eNB to acquire a bearer channel for sending data. The eNB (or another network entity) assigns the bearer, and informs the MN about the bearer channel. This process can take as long as 100 ms in LTE and up to 2 seconds in HSPA networks. For purposes of the description herein, the MME/SGW pair will be referred to as a Base Station, since they act as a single logical entity for both the control and data path for MNs, and also since they provided the functional equivalent of an access point for a single 802.1 1 cell such as a wireless local area network (WLAN) cell.

[0019] As described above, the MNs are configured as multi-mode terminals having at least two radios, one used to talk to a base station of the cellular network, and the other as a secondary radio for access to an 802.1 1 network such as Wi-Fi or WiMAX. It is assumed for purpose of the description herein that the secondary radio is a Wi-Fi radio adhering to the IEEE 802.11 family of standards, but it should be understood that the inventive concept is not so limited. Mobile nodes are able to use this secondary radio to communicate with a Wi-Fi access point, or among themselves. As such, the mobile nodes are considered to be in a peer-to-peer mode.

[0020] Each Base Station controls hundreds of MNs at any given time, and knows the identities of all the MNs since they have to register with the network to receive service. However, the Base Station has only limited information regarding the relative position of an MN with respect to other nodes in its cell. Techniques such as Assisted GPS (A-GPS) or plain GPS may be used to place the user at a geographical location on a map, but cannot guarantee that two nodes that are nearby (to one another) can talk to each other. In order to do this, the Base Station has to rely on the MNs to gather and provide this information.

[0021] The term "link" refers herein to the Wi-Fi link between two MNs. Note also that the terms "node", "mobile" and "MN" are used inter-changeably in the discussion herein.

[0022] The link between two nodes is symmetric. Each node is uniquely identified by an ID composed of the International Mobile Equipment Identity (IMEI) and the Wi-Fi MAC address. The Base Station is aware of the Wi-Fi MAC addresses of all the mobiles, obtaining them during registration. The Base Station is capable of sending a broadcast message to all of the mobiles via a control channel (e.g. the BCCCH channel in HSPA and LTE). The Base Station also provides timing signals to synchronize all the mobiles, thus allowing the mobiles to operate without explicit synchronization over the Wi-Fi interface. [0023] There are a total of N nodes in the system, and the density of nodes is denoted by p. The interference range is assumed to be at most twice the data range. The invention methodology does not require that the nodes to be distributed uniformly, nor that a given node can hear all other nodes, i.e., there is no assumption of a clique.

[0024] For purposes of the invention description, the notion of a Compact Topology Graph is defined herein. Let the set of mobile nodes be represented as a set of vertices, V, of a network graph, G = (V; E). The set of links between MNs is represented as the set of edges, E, between the corresponding vertices of this graph. wv|wv e Ε, Μ, ν e X

[0025] A Compact Topology Graph, CTGj(G) = (V, E,), I = 1, 2, 3, is defined as a

weighted sub-graph of G. The node set Vis, split into two sets, X, Y, where is a dominating set (DS) of G, and Y= V\X. (A set of nodes is a dominating set of a graph G, if all nodes in the graph are either in the set or neighbors of some node in X.) The set is chosen to be a DS of G, which implies that 7 is the set of non- dominating nodes of G that have a node in the dominating set as their neighbor. In addition, for each node, v e l , Hi(v) = {u\uv e E] are defined to be the one-hop neighbors of v and H 2 v = {u\u <£ H l (v), 3w e H l (v)s.t.ww e E} . In other words, Hi(v)and H 2 (v) represent the one-hop and two-hop neighbors of a node v e l.

[0026] The sets i¾and E 3 are defined as:

Ei = {wv|wv e E, u, v e X}

E 2 = E 1 u {wv|wv e E, u e X, v e Y}

E 3 = E 2 {uv\u, v e X and h G (u,v) = 3}

Edges in the sets E\ and E 2 have a weight of 1, while edges in the set E 3 \ E 2 have a weight of 3, representing the minimum hop count between the end-points of the links.

[0027] Examples of CTG 2 and CTG 3 for a graph G are shown in Figure 2. Notice that CTG 2 is not a weakly connected dominating set (WCDS) of G. If the original graph G is disconnected, then the CTG, are also disconnected. [0028] The dominating set, X, is established by means of a clustering algorithm, where nodes elect a representative node in their neighborhood as their Cluster-Head (CH). This CH is also a dominator {i.e., a member of the DS) and is 1, 2, or 3 hops away from another dominator. If the set of dominating nodes can determine the paths to their nearest dominators, and add the nodes and links on these paths, one can then build a CTG of the underlying network graph G.

[0029] It was noted above that the process of obtaining a bearer channel from an MN to the Base Station involves at least a 100 ms delay on a per-MN basis. If each node in G, were to attempt to communicate its topology information on a per-node basis, contending to obtain access to the control channel alone could easily take a few seconds, without even being bandwidth-intensive, tying up resources on the Base Station. Therefore, an objective is to rely on the CHs to transfer the relevant information to the Base Stations. Since the number of CHs is typically an order of magnitude smaller than the number of MNs in the network, the communication overhead will be expected to be much smaller with this approach. As a result, the construction of CTGj(G) at the Base Station will proceed much faster.

[0030] As part of the invention methodology, the inventors have developed a fast and efficient algorithm that obtains the CTG of the network graph. To make the presentation simpler for the illustrative embodiment described herein, any

transmission by a node is assumed to be on the Wi-Fi interface, unless explicitly mentioned otherwise. It should be understood, however, that the intended scope of the invention methodology is not limited to such a Wi-Fi application.

[0031] The algorithm of the invention is divided into two components: (a) topology

discovery and (b) topology construction. In order to avoid disruption of existing traffic on the Wi-Fi links, there is a need to keep the former as small in duration as possible. It is also desirable to avoid variability in the duration of discovery.

[0032] The algorithm of the invention runs in four phases, where the first three are for topology discovery and the last one is the topology construction phase. All phases are of a fixed duration, determined by the density of mobiles. At the beginning of the algorithm, the Base Station sends a broadcast message to all nodes with the lengths of the first three phases (W, k and k), a value d, a random seed R, and its choice of discovering either CTG 2 or CTG 3 .

[0033] The first phase is directed to Cluster Head selection (characterized as phase Z 0 ), and is W slots long, with each slot equal to a back-off slot in 802.11. Nodes volunteer to act as the CHs for their neighbors following a probabilistic scheme. In this phase, each node sends at most one broadcast message, without knowing the size of its neighborhood. Each node completes this phase when one of two actions occurs: (a) the node transmits, or (b) the node overhears another transmission, whichever happens first.

[0034] Note that, while transmissions can collide in this phase, the process is essentially terminated at each node as soon as the first transmission occurs in its neighborhood. Each node that transmitted assumes the role of a CH, while the nodes that overhear a transmission (success or collision) become non-CH nodes. The CH node notes down the slot number in which it transmitted.

[0035] The second phase carried out by the algorithm is directed to obtaining a one-hop neighbor list (characterized as phase Zi). At the end of Phase 1, each non-CH node will send out its identity in a unique signature following an approach developed by one of the inventors (and others) in a prior work directed to communication with RFID tags. That approach is described in detail in US Published Patent Application No. 2010/0295659, but is summarized here in sufficient detail for an understanding of the invention here. According to that approach, each non-CH node transmits up to d times in a window K of length k slots, where k and d are provided by the Base Station. In each slot, the non-CH node transmits 1 PHY symbol worth of bits. The selection of d slots is based on a random hash of a seed value provided by the BS and the ID (MAC or IMEI) of the node. The idea is to ensure that there exists at least one slot where each node can transmit without any collisions from neighboring nodes in that slot. The values of k and d are chosen such that all nodes in a two-hop neighborhood have at least one slot where they will be the only node transmitting, with high probability of being successfully received. This is illustrated in Figure 3. [0036] Each CH node listens to the transmissions of all of its non-CH neighbors. In each slot, the CH node detects the energy of the overall transmission, and determines if there is at least one transmission in this slot or not based on an energy threshold. Since the received bits are not actually decoded, interference from non-neighboring nodes is not an issue. The CH logs which slots had a transmission and which ones did not as a binary bit vector of length k, and stores it as digest, ψι, which is intended as an encoding of all the neighbors of a CH. This idea is explained in detail below.

[0037] At this point, one has enough data from the ψι information to obtain the CTG 2 sub-graph, and the topology construction for that development is described below in respect to the description of phase 4 of the algorithm. However, if the CTG 3 subgraph is needed, additional procedures are needed, as described immediately below.

[0038] As described before, in a window K oik slots, each non-CH node transmits up to d times. In order to obtain only the CTG 2 sub-graph, each slot lasts for a duration equivalent to a PHY symbol length, and a node simply transmits a symbol in its d slots and stays idle in the others. For determining the CTG 3 sub-graph, however, non- CH nodes in the Z \ phase switch between transmission and reception modes.

Therefore, the slot duration for non-CH nodes is Short Interframe Space (SIFS) + 1 symbol length (e.g. 20 for 802.1 la/g and 17 for 802.1 lb). At the beginning of the frame all non-CH nodes act as receivers. If, in a slot, a non-CH node has to transmit, it will switch to transmit mode in the SIFS interval, send a symbol and return to receive mode. In all other slots, a non-CH node will listen to broadcasts from its neighbors in the same manner as a CH described above. It will detect a sequence of transmitted slots (including its own) and idle slots, and record it as a bit vector, φ, which is intended as an encoding all of the neighboring nodes of this non- CH node.

[0039] It is important to note that this entire phase lasts exactly k slots throughout the network and happens in a distributed manner.

[0040] The third phase carried out by the algorithm is directed to obtaining a two-hop neighbor list (characterized as phase Z 2 ). At the end of phase all nodes start phase Z 2 that enables CHs to construct their two-hop neighborhood. This phase lasts exactly k slots as well, except that each slot is only the duration of a data symbol (i.e., 4 in 802.1 la/g). In this phase, each non-CH node transmits its φ vector as a single message in this phase. A "1" in the bit vector corresponds to a PHY data symbol of all Is, while a "0" in the bit vector corresponds to no transmissions. The CH node listens to the coordinated transmissions of all of its neighbors. In the same manner as above, it then records the presence of a signal in each slot as a "1", and the absence as a "0". This bit vector of length k is called the ψ 2 digest.

[0041] At the end of receiving k symbols at each CH node, this phase is complete. Each non-CH node broadcasts exactly once (and in parallel) in this phase.

[0042] Phase 4 is directed to building the CTG sub-graph at the Base Station

(characterized as phase Z 3 ). It is important to point out that no MN has transmitted anything to the Base Station until now. The topology discovery process ends at the Z \ phase for CTG 2 and at the Z 2 phase for the CTG 3 sub-graphs. All that remains is for the Base Station to use this information to construct the CTG of the network graph, G.

[0043] At the end of the previous phase, each CH node sends the following information to the Base Station: (a) its identifier, (b) the slot number in which it transmitted in phase Z 0 , (c) the ψι digest obtained in phase Zi, and (d) if CTG 3 construction is requested, the ψ 2 digest obtained in phase Z 2 . Since the Base Station knows the set of all MNs in the network, it can pre-compute the exact set of d t slots in which each MN / ' would have transmitted in the Zi phase. This is characterized herein as the node signature. The process of decoding a node is simply one of looking at the signature of each of the N nodes registered at the Base Station, and doing a bit- wise AND operation of this digest with ψι(ν) and ψ 2 (ν). If the result is the signature of a node, then the node is marked as present in ¾(v)and Hi(v) H 2 (v) respectively, where Hi and H 2 are as defined above. After the ψι and ψ 2 vectors are decoded for all the nodes N, then the H 2 (v)can be computed by removing Hi(v)from the latter set. Using this, the CTG 2 and CTG 3 sub-graphs can be computed.

[0044] Additional details respecting the methodology of the invention are presented in the sections following. Cluster Head Selection - Z 0

[0045] At the beginning of the Z 0 phase, the Base Station sends a synchronization signal to all nodes to initiate the CH selection process. The Base Station sends a random seed, R, that is used in conjunction with the node ID by each node to initialize its random seed generator. Each node u e V now selects a slot randomly (from a uniform distribution) in a frame of length W. The nodes listen to the channel until their slot time arrives. If their slot arrives, they transmit a random string as 1 PHY symbol, and assume the role of a CH. The transmitting node might collide with other nodes transmitting in this slot, but they ignore it, and all nodes that collide in this slot will assume the role of a CH.

[0046] Nodes that overhear a transmission assume that some other node in their one-hop neighborhood has become a CH, and therefore terminate their selection algorithm, without knowing who their CH is. This is true even if the node overhears a collision. A unique part of the topology discovery process of the invention methodology is that a node never needs to know its CH, ever, unless the CH or the Base Station chooses to make this knowledge available to the node. This allows a non-CH node to be adjacent to multiple CHs within its range.

[0047] Interference Range: An MN could overhear cumulative interference from some nodes outside its range and assume that it has a CH in its neighborhood. In an embodiment of the invention, the existence of such interfering signals may be addressed by the establishment at a node of an energy threshold for detecting a valid signal. Thus, if the received signal strength for a signal heard by the node is above a certain threshold, then the signal is declared to be from a neighboring node. This measurement is available in existing Wi-Fi chip sets, and can be leveraged to combat the issue of interference from nodes further away.

[0048] Maintenance of CHnode: If the topology is largely unchanged, then it may be preferable for the Base Station to use the same set of nodes as CHs, and have the topology discovery process repeat itself. The use of a random seed, R, provided by the Base Station assists this process. Accordingly, as long as the topology remains unchanged {i.e., no new nodes come into the network, no existing nodes leave, no mobility among the nodes), the same nodes are guaranteed to become the CHs again. If the Base Station wants a different set of CHs, then it can simply change the random seed, R, to get a different set.

Discovering one-hop neighbors, Z\

[0049] As described previously, at the end of the Z 0 Phase, each non-CH node will send out its identity in a unique signature following an approach described in the prior section, that approach based on transmission by a node up to d times in a window of length k slots. In the Zi phase, the Base Station specifies if it wants to find CTG 2 or CTG 3 , and specifies h and d, based on its estimated user density. Non-CH nodes use the random seed R provided by the Base Station earlier along with their ID to select the d slots at random from the frame of size k. Each non-CH node transmits an 802.11 PHY symbol worth of random data in each of the d slots that it selects. Note that this symbol can be transmitted without the need for any preamble, as it does not affect the synchronization of the signal at the receivers. Indeed, as the node does not need to decode the received signal, the question of synchronization is moot.

[0050] The CHs simply listen to each slot and record if there has been a transmission by at least one of the neighbors in this slot or not. Again, the CHs only need to have the received signal exceed a threshold to mark this slot as occupied. If not, they mark this slot as empty. This allows the CHs to record the one-hop neighborhood in the bit vector ψι as described previously.

[0051] The behavior of non-CH nodes differs based on whether the Base Station wants to discover CTG 2 or CTG 3 . For the former, the non-CH nodes merely act as transmitters, which allows the slot lengths to be 1 PHY symbol wide. In order to ensure bit integrity, an additional 1 guard duration can be added between slots. This adds nearly 4 ms to the duration but avoids bit-synchronization errors due to propagation delays at the CHs.

[0052] If CTG 3 is needed, then the non-CH nodes have to switch between their roles as transmitters and receivers. This is because, in order to obtain CTG 3 , each CH node u needs to obtain its 2-hop neighborhood H 2 (w). This implies that non- CH nodes in Hi(w) need to know their 1-hop neighborhood so that they can relay this to node u. They also need to listen to which slots their neighbors are selecting. Therefore, each slot is split into two parts: (a) SIFS duration that allows a node that is in transmitting mode to switch to receiving mode and vice versa, and (b) PHY symbol duration where the non-CH nodes transmit/listen. The resultant bit-vector recorded at a non- CH node v is called φ(ν). In this bit-vector, the d slots selected by v are also marked as Is.

Discovering two-hop neighbors, Z 2

[0053] In the second phase, each non-CH node v sends out φ(ν), in the same manner as they do in Phase for discovering CTG 2 . Each 1-bit in φ(ν) translates to a data symbol, and a 0-bit is marked by absence of transmission, with a 1 guard duration between processing each bit in the digest. When a CH overhears this information, it is hearing from all of its 1-hop neighbors broadcasting their φ digests. In each slot of the window K, if it detects a transmission, a CH node marks the bit corresponding to this slot as a 1 in the ψ 2 digest, and if there is no transmission, then it marks it as a 0 bit.

Computing CTG, Z 3

[0054] In this phase, the Base Station obtains ψι; ψ 2 as well as the transmitted slot

number in phase Z 0 from each CH node.

[0055] Constructing The methodology first finds those CHs that are adjacent.

These are nodes that would have collided in the first transmission slot in phase Z 0 . They are identified by looking up pairs u, v e X that have the same tx-slot number in

Z 0 , and compare them bit wise AND of their ψι vectors. As long as the neighborhood of two nodes is not sparse, there will be a significant overlap among the Hi sets represented by these two vectors. These two nodes are considered to be neighbors in with high probability, if ψι(¾) differs from ψι(ν) in at most b much less than d bit positions.

[0056] Constructing CTG 2 (G) : In the construction of the CTG 2 graph, the CTG \ graph is augmented with more edges. First, the Base Station does a bitwise AND operation on a node's signature and the ψι digest sent by a CH to see if this signature is contained in the digest. The process is very much similar to a Bloom filter. If a node is identified positively (i.e., the AND operation is nonzero), then it is added to the one- hop neighborhood of the CH node. This is done iteratively until all N nodes' signatures have been matched against all the digests provided by the CHs. All the CHs (i.e., those that send the digests to the Base Station) are denoted by the set , and the one-hop neighborhood sets computed thus are denoted by H 1 (u) fu e X < V . An edge is drawn from ί/ e l to all nodes in to get CTG 2 . If two CHs u, v e X have a node in H 1 (u) n H 1 (v) , then they will be connected in the CTG 2 sub-graph.

[0057] Constructing CTG 3 (G): In order to construct CTG 3 , the Base Station needs to find all pairs of CH nodes who are separated by a distance of 3 in G. By adding an edge of weight 3 to these two nodes in CTG 2 , CTG 3 is created.

[0058] The CTG 3 construction is started by setting CTG 3 = 2. The Base Station now computes the two-hop non-CH neighborhood H 2 (u), Vw e X by decoding the ψ 2 digests sent by u. It is known that these represent Η λ (ιι) H 2 (w) . The same method as before is applied of comparing each MN's signature against the digest to see if it is present. From this H 2 (u), Vw e X can be computed.

[0059] For any two nodes, u, v e X that are not connected in CTG 2 , the Base Station knows H 2 (v). It now computes H 1 (u) ΓΛ H 2 (V) to find those nodes which are two hops away from v but only one hop away from u. This is illustrated in Figure 4. If there exists at least one node satisfying this, then it implies that h G (u, v) =3, and therefore an edge of weight 3 is added to the CTG sub-graph. Repeating this for all disconnected pairs of nodes in CTG 2 completes the construction.

Computing the 3-hop paths

[0060] For two nodes u, v e X with an edge of weight 3 between them in CTG , there exists a shortest path of 3 hops between them in G. Identification by the Base Station of at least one specific path between u and v is addressed hereafter.

[0061] The Base Station knows that there exists a node x e H 1 (u) n H 2 (v) and node y e H 2 (u) n H j (v) , such that there is a w— x— y— v path in G. The Base Station looks at a node x in H 1 (u) n H 2 (v) , whose identity is known to it. The Base Station looks at node x's signature, as well as the signatures of all the nodes represented in ψ 2 (ν) to find out which bit of ψ 2 (ν) uniquely represents x. Since x can be decoded from ψ 2 (ν), the existence of at least one such bit is guaranteed. The Base Station informs node v of this slot number. The CH node v then broadcasts this slot number to its neighbors and asks if any node in Hi(v) has a bit corresponding to this slot set in their φ vector. Assuming that the topology has not changed, there exists at least one such node y e H 1 (v) . Now, y can inform the Base Station directly or relay its ID via v. This allows the Base Station to compute the 3 -hop minimum distance paths between such nodes in CTG 3 sub-graph.

[0062] An illustrative application of the invention methodology is hereafter described.

[0063] Given a set of nodes N in the entire network, the Base Station can compute the density p of mobiles knowing the geographic spread of the network (i.e., the inhabitable spread). The Base Station can add a safety margin for this density by, for example, multiplying it by a factor of 3. Given this, the Base Station computes the expected number of users m in a 2-hop neighborhood as no more than m 2 = π2 2 * 3p = 37p. In a 1-hop neighborhood, the expected number of users will be less than m\ = π * 3p = 9.42p.

[0064] For the Z 0 phase, the Base Station sets W= 3 * Z 2 phases, it sets k = 2:08 * m 2 In (Ν/ε) , where ε =0:001.

[0065] Phase Z 0 lasts W slots, where each slot is the same length as a back-off slot in 802. I I, i.e., 20 μβ. Phase Z 2 lasts for the duration of transmission of k data symbols. For IEEE 802.1 la/g, the symbol time is 10 μβ, regardless of the bit-rate used if there is only one symbol in the entire data frame. The Phase Zi length can vary depending on the type of sub-graph requested. If only CTG 2 is required, then Zi lasts for k data symbols, with no Phase Z 3 following it. However, if CTG 3 is requested, then each slot in the Zi phase lasts SIFS + data symbol duration, which is 20 in 802.1 la/g.

[0066] Therefore, using 802.1 la/g radios, discovering CTG 2 takes (20W+\0k) μβ, and discovering CTG 3 takes (20W+ 20k +\0k) μβ. If one assumes N users spread over 10 km 2 , the values of W; k, d as well as the topology discovery times for CTG 2 and CTG 3 for various node densities are shown in Table I assuming that the Wi-Fi range of a mobile is 100 meters. In the table, W, d, k are in slots, while the time taken for discovering CTG 2 and CTG 3 2 ; 3 respectively) is in milliseconds.

TABLE 1

[0067] Even with a very high node density p = 10, the size of the ψι and ψ 2 digests is only k < 12000 bits, which is 1500 bytes. Thus, each CH sends at most two 1500-byte packets to the Base Station to assist in topology discovery for 3000 nodes, i.e., less than 1-byte per node present. The time taken for discovering the topologies is primarily a function of p, and does not change much even when a larger area is considered {i.e., larger N).

[0068] The CHs use the uplink data channels to send this information to the Base Station.

This implies that there is a small delay (roughly 100 ms in LTE) in acquiring the bearer channels by each CH node. While a CH is transmitting on the bearer channel, the other CHs can attempt to acquire the data channel in parallel by contending on the uplink control channel, thereby reducing the bearer acquisition overhead. The advantage here is that of only a small number of nodes transmitting to the Base Station, which reduces the overall overhead. [0069] Finally, it is important to note again that during the entire process, no node ever transmits any identifying information over the Wi-Fi interface. Thus, any

eavesdropper or even other participating mobiles will never know the identity of any mobile in the network. Only the Base Station will be able to identify all the nodes in the network, and can choose to communicate it as needed to the mobiles. This guarantee of anonymity is a unique aspect of the invention methodology.

[0070] Herein, the inventors have disclosed a system and method for an improved

compact topology graph determination for a network of mobile terminals having a capability of inter-nodal communication. Numerous modifications and alternative embodiments of the invention will be apparent to those skilled in the art in view of the foregoing description.

[0071] Accordingly, this description is to be construed as illustrative only and is for the purpose of teaching those skilled in the art the best mode of carrying out the invention and is not intended to illustrate all possible forms thereof. It is also understood that the words used are words of description, rather that limitation, and that details of the structure may be varied substantially without departing from the spirit of the invention, and that the exclusive use of all modifications which come within the scope of the appended claims is reserved.