70 research outputs found

    The Minimum Scheduling Time for Convergecast in Wireless Sensor Networks

    Get PDF
    We study the scheduling problem for data collection from sensor nodes to the sink node in wireless sensor networks, also referred to as the convergecast problem. The convergecast problem in general network topology has been proven to be NP-hard. In this paper, we propose our heuristic algorithm (finding the minimum scheduling time for convergecast (FMSTC)) for general network topology and evaluate the performance by simulation. The results of the simulation showed that the number of time slots to reach the sink node decreased with an increase in the power. We compared the performance of the proposed algorithm to the optimal time slots in a linear network topology. The proposed algorithm for convergecast in a general network topology has 2.27 times more time slots than that of a linear network topology. To the best of our knowledge, the proposed method is the first attempt to apply the optimal algorithm in a linear network topology to a general network topology

    The (k,l) Coredian tree for Ad Hoc Networks

    Get PDF
    In this paper, we present a new efficient strategy for constructing a wireless tree network containing n nodes of diameter ∆ while satisfying the QoS requirements such as bandwidth and delay. Given a tree network T , a coredian path is a path in T that minimizes the centdian function, a k-coredian tree is a subtree of T with k leaves that minimizes the centdian function, and a (k, l)-coredian tree is a subtree of T with k leaves and diameter l at most that minimizes the centdian function. The (k, l)-coredian tree can serve as a backbone for a network, where the internal nodes belong to the backbone and the leaves serve as the heads of the clusters covering the rest of the network. We show that a coredian path can be constructed at O(∆) time with O(n) messages and a k-coredian tree can be constructed at O(k∆) time with O(kn) messages. We provide an O(n 2 ) time construction algorithm for the (k, l)-coredian tree that requires O(n 2 ) messages. We also give upper and lower bounds for a number of nodes covered by the k cluster heads in random geometric graph using critical transmission range of connected network. Finally, simulation is presented for various values of n and k

    Message and time efficient multi-broadcast schemes

    Full text link
    We consider message and time efficient broadcasting and multi-broadcasting in wireless ad-hoc networks, where a subset of nodes, each with a unique rumor, wish to broadcast their rumors to all destinations while minimizing the total number of transmissions and total time until all rumors arrive to their destination. Under centralized settings, we introduce a novel approximation algorithm that provides almost optimal results with respect to the number of transmissions and total time, separately. Later on, we show how to efficiently implement this algorithm under distributed settings, where the nodes have only local information about their surroundings. In addition, we show multiple approximation techniques based on the network collision detection capabilities and explain how to calibrate the algorithms' parameters to produce optimal results for time and messages.Comment: In Proceedings FOMC 2013, arXiv:1310.459

    Enhanced collision avoidance mechanisms for wireless sensor networks through high accuracy collision modeling

    Get PDF
    Wireless channel and multi-hop communications cause a significant number of packet collisions in Wireless Sensor Networks (WSNs). Although a collision may cause packet loss and reduce network performance, low-power wireless transceivers allow packet reception in the presence of collisions if at least one signal can provide a sufficiently high power compared with other signals. Therefore, with respect to the large number of nodes used in WSNs, which necessitates the use of simulation for protocol development, collisions should be addressed at two layers: First, collisions should be modeled at the physical layer through a high-accuracy packet reception algorithm that decides about packet reception in the presence of collisions. Second, collision avoidance mechanisms should be employed at the Medium Access Control (MAC) layer to reduce packet losses caused by collisions. Unfortunately, the existing packet reception algorithms exhibit low accuracy and impede the development of efficient collision avoidance mechanisms. From the collision avoidance perspective, existing contention-based MAC protocols do not provide reliable packet broadcasting, thereby affecting the initialization performance of WSNs. In addition, despite the benefits of schedule-based MAC protocols during the data-gathering phase, the existing mechanisms rely on unrealistic assumptions. The first major contribution of this work is CApture Modeling Algorithm (CAMA), which enables collision modeling with high accuracy and efficiency at the physical layer. The higher accuracy of CAMA against existing approaches is validated through extensive comparisons with empirical experiments. The second major contribution includes mechanisms that improve the reliability of packet broadcasting. In particular, adaptive contention window adjustment mechanisms and the Geowindow algorithm are proposed for collision avoidance during the initialization phases. These mechanisms considerably improve the accuracy of the initialization phases, without violating duration and energy efficiency requirements. As the third major contribution, a distributed and concurrent link-scheduling algorithm (called DICSA) is proposed for collision avoidance during the data-gathering phase. DICSA provides faster slot assignment, higher spatial reuse and lower energy consumption, compared with existing algorithms. Furthermore, evaluating DICSA within a MAC protocol confirms its higher throughput, higher delivery ratio, and lower end-to-end delay

    Analysis and implementation of distributed algorithms for multi-robot systems

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.Includes bibliographical references (p. 159-166).Distributed algorithms for multi-robot systems rely on network communications to share information. However, the motion of the robots changes the network topology, which affects the information presented to the algorithm. For an algorithm to produce accurate output, robots need to communicate rapidly enough to keep the network topology correlated to their physical configuration. Infrequent communications will cause most multirobot distributed algorithms to produce less accurate results, and cause some algorithms to stop working altogether. The central theme of this work is that algorithm accuracy, communications bandwidth, and physical robot speed are related. This thesis has three main contributions: First, I develop a prototypical multi-robot application and computational model, propose a set of complexity metrics to evaluate distributed algorithm performance on multi-robot systems, and introduce the idea of the robot speed ratio, a dimensionless measure of robot speed relative to message speed in networks that rely on multi-hop communication. The robot speed ratio captures key relationships between communications bandwidth, mobility, and algorithm accuracy, and can be used at design time to trade off between them. I use this speed ratio to evaluate the performance of existing distributed algorithms for multi-hop communication and navigation. Second, I present a definition of boundaries in multi-robot systems, and develop new distributed algorithms to detect and characterize them. Finally, I define the problem of dynamic task assignment, and present four distributed algorithms that solve this problem, each representing a different trade-off between accuracy, running time, and communication resources. All the algorithms presented in this work are provably correct under ideal conditions and produce verifiable real-world performance.(cont.) They are self-stabilizing and robust to communications failures, population changes, and other errors. All the algorithms were tested on a swarm of 112 robots.by James Dwight McLurkin, IV.Ph.D

    Positioning and Scheduling of Wireless Sensor Networks - Models, Complexity, and Scalable Algorithms

    Get PDF

    Challenges and Solutions for Location-based Routing in Wireless Sensor Networks with Complex Network Topology

    Get PDF
    Complex Network Topologies (CNTs)–network holes and cuts–often occur in practical WSN deployments. Many researchers have acknowledged that CNTs adversely affect the performance of location-based routing and proposed various CNT- aware location-based routing protocols. However, although they aim to address practical issues caused by CNTs, many proposed protocols are either based on idealistic assumptions, require too much resources, or have poor performance. Additionally, proposed protocols are designed only for a single routing primitive–either unicast, multicast, or convergecast. However, as recent WSN applications require diverse traffic patterns, the need for an unified routing framework has ever increased. In this dissertation, we address these main weaknesses in the research on location- based routing. We first propose efficient algorithms for detecting and abstracting CNTs in the network. Using these algorithms, we present our CNT-aware location- based unicast routing protocol that achieves the guaranteed small path stretch with significantly reduced communication overhead. We then present our location-based multicast routing protocol that finds near optimal routing paths from a source node to multicast member nodes, with efficient mechanisms for controllable packet header size and energy-efficient recovery from packet losses. Our CNT-aware convergecast routing protocol improves the network lifetime by identifying network regions with concentrated network traffic and distributing the traffic by using the novel concept of virtual boundaries. Finally, we present the design and implementation details of our unified routing framework that seamlessly integrates proposed unicast, multicast, and convergecast routing protocols. Specifically, we discuss the issues regarding the implementation of our routing protocols on real hardware, and the design of the framework that significantly reduces the code and memory size to fit in a resource constrained sensor mote. We conclude with a proactive solution designed to cope with CNTs, where mobile nodes are used for “patching” CNTs to restore the network connectivity and to optimize the network performance
    corecore