| 研究生: |
楊宗穎 Zong-Ying Yang |
|---|---|
| 論文名稱: |
noe The Optimal k-Connectivity Deployment Pattern of Wireless Sensors |
| 指導教授: |
孫敏德
Min-Te Sun |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 論文出版年: | 2015 |
| 畢業學年度: | 103 |
| 語文別: | 中文 |
| 論文頁數: | 44 |
| 中文關鍵詞: | 連接數 、無線網路 |
| 外文關鍵詞: | connectivity, wireless |
| 相關次數: | 點閱:14 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在現今多樣式的無線網路應用中,為了要達到多重連接,節點佈建的方式扮演了很重要的角色。然而,現有的方法在尋找k連接數的時候,並沒有提供一個有系統性的方法來尋找出最佳化的佈建圖形。
在這篇論文中,我們假設節點都是相同的,並且以對稱的形式擺放。結果顯示當我們以這種方式擺放的時候,節點的范諾圖(Voronoi diagram)會是三個regular tessellations的其中一種。基於這點想法,我們設計了一套搜尋的演算法,叫做Pruning and Search(PS) 來尋最佳化的k連接佈建圖形。我們的演算法是第一個採用系統性的方法來尋找最佳化的k連接佈建圖形。雖然PS的時間複雜度是指數型,但最佳化的圖型可以預先尋找出來。除此之外,我們可以透過PS跟RES兩個演算法的結合,來找到k連接以及L覆蓋的佈建圖形。
The strategy for sensor node deployment to achieve multiple connectivity plays a critical role in various applications of wireless sensor networks. However, the existing solutions to identify optimal k-connectivity deployment patterns are heuristic in the sense that they do not provide a systematic approach to identify the optimal pattern for a given k value. In this paper, we assume that nodes are homogeneous and deployed to the ground symmetrically. As a result, the Voronoi diagram of wireless nodes will be one of the known three regular tessellations. Based on this idea, we design an intuitive searching algorithm, called Pruning and Search (PS), to identify the optimal k-connectivity deployment pattern for an arbitrary k value. To the best of our knowledge, our PS algorithm is the first one to do this task in a systematical approach. While the time complexity of the algorithm is exponential, the optimal pattern can be pre-computed offline in advance. In addition, PS can be easily combined with the RES algorithm so that the optimal k-connectivity and l-coverage deployment pattern for a given set of k and l values can be found.
References
[1] Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun, and Ten H. Lai. Deploying wireless sensors to achieve both coverage and connectivity. In Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’06, pages 131–142, New York, NY, USA, 2006. ACM.
[2] Paul Balister, B ́ela Bollobas, Amites Sarkar, and Santosh Kumar. Re- liable density estimates for coverage and connectivity in thin strips of finite length. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, MobiCom ’07, pages 75–86, New York, NY, USA, 2007. ACM.
[3] Jill Britton. Symmetry and Tesselations: Investination Patterns. Dale Seymour Publications, 1999.
[4] Ai Chen, Santosh Kumar, and Ten H. Lai. Designing localized algo- rithms for barrier coverage. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Mobi- Com ’07, pages 63–74, New York, NY, USA, 2007. ACM.
[5] Richard Kershner. The number of circles covering a set. American Journal of Mathematics, 61(3):pp. 665–671, 1939.
31
[6] W.-S. Ku, K. Sakai, and M.-T. Sun. The Optimal k-Covering Tag De- ployment for RFID-based Localization. Journal of Network and Com- puter Applications, 34(3):914–924, 2011.
[7] Mo Li, Zhenjiang Li, and Athanasios V. Vasilakos. A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues. Proceedings of the IEEE, 101(12):2538–2557, 2013.
[8] Yunhao Liu, Lei Chen, Pei Jian, Qiuxia Chen, and Yiyang Zhao. Min- ing Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays. pages 37–46, 2007.
[9] Yunhao Liu, Lei Chen, Jian Pei, Qiuxia Chen, and Yiyang Zhao. Min- ing frequent trajectory patterns for activity monitoring using radio fre- quency tag arrays. In Proceedings of the Fifth IEEE International Con- ference on Pervasive Computing and Communications, PERCOM ’07, pages 37–46, Washington, DC, USA, 2007. IEEE Computer Society.
[10] Rudolf Mathar et al. Optimum positioning of base stations for cellular radio networks. Wirel. Netw., 6(6), December.
[11] Christopher Mitchell, Vikram P. Munishwar, Shailendra Singh, Xi- aoshuang Wang, Kartik Gopalan, and Nael B. Abu-Ghazaleh. Testbed design and localization in mint-2: A miniaturized robotic platform for
32
wireless protocol development and emulation. In Proceedings of the First International Conference on COMmunication Systems And NET- works, COMSNETS’09, pages 268–277, Piscataway, NJ, USA, 2009. IEEE Press.
[12] Lionel M. Ni, Yunhao Liu, Yiu Cho Lau, and Abhishek P. Patil. Land- marc: Indoor location sensing using active rfid. pages 407–415, 2003.
[13] Atsuyuki Okabe, Barry Boots, and Kokichi Sugihara. Spatial Tessella- tions: Concepts and Applications of Voronoi Diagrams. John Wiley & Sons, Inc., New York, NY, USA, 1992.
[14] Yuuki Ota, Toshihiro Hori, Taiki Onishi, Tomotaka Wada, Kouichi Mut- suura, and Hiromi Okada. An adaptive likelihood distribution algorithm for the localization of passive rfid tags. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E91-A(7):1666–1675, July 2008.
[15] H. Takagi and L. Kleinrock. Optimal transmission ranges for randomly distributed packet radio terminals. Communications, IEEE Transac- tions on, 32(3):246–257, Mar 1984.
[16] Jin Teng, Junda Zhu, Boying Zhang, Dong Xuan, and Yuan F. Zheng. E-V: Efficient Visual Surveillance with Electronic Footprints. pages 109–117, 2012.
33
[17] Sabu M. Thampi, Nithya Aniyan, and K. Chitharanjan. Hexagonal groups based key management using deployment knowledge in wireless sensor networks. In Proceedings of the International Conference on Ad- vances in Computing, Communications and Informatics, ICACCI ’12, pages 387–391, New York, NY, USA, 2012. ACM.
[18] Peng-Jun Wan and Chih-Wei Yi. Asymptotic critical transmission ra- dius and critical neighbor number for k-connectivity in wireless ad hoc networks. In Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’04, pages 1–8, New York, NY, USA, 2004. ACM.
[19] Peng-Jun Wan and Chih-Wei Yi. Coverage by randomly deployed wire- less sensor networks. IEEE/ACM Trans. Netw., 14(SI):2658–2669, June 2006.
[20] You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng. Efficient deploy- ment algorithms for ensuring coverage and connectivity of wireless sensor networks. In Wireless Internet, 2005. Proceedings. First International Conference on, pages 114–121, July 2005.
[21] Ziqiu Yun, Xiaole Bai, Dong Xuan, Ten H. Lai, and Weijia Jia. Optimal deployment patterns for full coverage and k- connectivity (k ≤
34
6) wireless sensor networks. IEEE/ACM Trans. Netw., 18(3):934–947, June 2010.
[22] H. Zhang and J. Hou. Maintaining Sensing Coverage and Connectivity in Large Sensor Networks. Ad Hoc and Sensor Wireless Networks, 1(1- 2):89–124, 2005.