413 research outputs found

    An ant colony optimization approach for maximizing the lifetime of heterogeneous wireless sensor networks

    Get PDF
    Maximizing the lifetime of wireless sensor networks (WSNs) is a challenging problem. Although some methods exist to address the problem in homogeneous WSNs, research on this problem in heterogeneous WSNs have progressed at a slow pace. Inspired by the promising performance of ant colony optimization (ACO) to solve combinatorial problems, this paper proposes an ACO-based approach that can maximize the lifetime of heterogeneous WSNs. The methodology is based on finding the maximum number of disjoint connected covers that satisfy both sensing coverage and network connectivity. A construction graph is designed with each vertex denoting the assignment of a device in a subset. Based on pheromone and heuristic information, the ants seek an optimal path on the construction graph to maximize the number of connected covers. The pheromone serves as a metaphor for the search experiences in building connected covers. The heuristic information is used to reflect the desirability of device assignments. A local search procedure is designed to further improve the search efficiency. The proposed approach has been applied to a variety of heterogeneous WSNs. The results show that the approach is effective and efficient in finding high-quality solutions for maximizing the lifetime of heterogeneous WSNs

    Towards a Unified Radio Power Management Architecture for Wireless Sensor Networks

    Get PDF
    In many wireless sensor networks, energy is an extremely limited resource. While many different power management strategies have been proposed to help reduce the amount of energy wasted, application developers still face two fundamental challenges when developing systems with stringent power constraints. First, existing power management strategies are usually tightly coupled with network protocols and other system functionality. This monolithic approach has led to standalone solutions that cannot easily be reused or extended to other applications or platforms. Second, different power management strategies make different and sometimes even conflicting assumptions about the rest of the system with which they need to interact. Without knowledge of which strategies are interoperable with which set of network stack protocols it is dificult for application developers to make informed decisions as to which strategy is most appropriate for their particular application. To address these challenges, we propose a Unified Power Management Architecture (UPMA) that supports the flexible composition of different power management strategies based on application requirements. We envision this architecture to consist of both low level programming interfaces, as well as high level modeling abstractions. These abstractions characterize the key properties of different applications, network protocols, and power management strategies. Using these properties, configuration tools can be created that match each application with the most appropriate network protocol and power management strategy suited to its needs

    Structure and topology of transcriptional regulatory networks and their applications in bio-inspired networking

    Get PDF
    Biological networks carry out vital functions necessary for sustenance despite environmental adversities. Transcriptional Regulatory Network (TRN) is one such biological network that is formed due to the interaction between proteins, called Transcription Factors (TFs), and segments of DNA, called genes. TRNs are known to exhibit functional robustness in the face of perturbation or mutation: a property that is proven to be a result of its underlying network topology. In this thesis, we first propose a three-tier topological characterization of TRN to analyze the interplay between the significant graph-theoretic properties of TRNs such as scale-free out-degree distribution, low graph density, small world property and the abundance of subgraphs called motifs. Specifically, we pinpoint the role of a certain three-node motif, called Feed Forward Loop (FFL) motif in topological robustness as well as information spread in TRNs. With the understanding of the TRN topology, we explore its potential use in design of fault-tolerant communication topologies. To this end, we first propose an edge rewiring mechanism that remedies the vulnerability of TRNs to the failure of well-connected nodes, called hubs, while preserving its other significant graph-theoretic properties. We apply the rewired TRN topologies in the design of wireless sensor networks that are less vulnerable to targeted node failure. Similarly, we apply the TRN topology to address the issues of robustness and energy-efficiency in the following networking paradigms: robust yet energy-efficient delay tolerant network for post disaster scenarios, energy-efficient data-collection framework for smart city applications and a data transfer framework deployed over a fog computing platform for collaborative sensing --Abstract, page iii

    A policy-based architecture for virtual network embedding

    Full text link
    Network virtualization is a technology that enables multiple virtual instances to coexist on a common physical network infrastructure. This paradigm fostered new business models, allowing infrastructure providers to lease or share their physical resources. Each virtual network is isolated and can be customized to support a new class of customers and applications. To this end, infrastructure providers need to embed virtual networks on their infrastructure. The virtual network embedding is the (NP-hard) problem of matching constrained virtual networks onto a physical network. Heuristics to solve the embedding problem have exploited several policies under different settings. For example, centralized solutions have been devised for small enterprise physical networks, while distributed solutions have been proposed over larger federated wide-area networks. In this thesis we present a policy-based architecture for the virtual network embedding problem. By policy, we mean a variant aspect of any of the three (invariant) embedding mechanisms: physical resource discovery, virtual network mapping, and allocation on the physical infrastructure. Our architecture adapts to different scenarios by instantiating appropriate policies, and has bounds on embedding efficiency, and on convergence embedding time, over a single provider, or across multiple federated providers. The performance of representative novel and existing policy configurations are compared via extensive simulations, and over a prototype implementation. We also present an object model as a foundation for a protocol specification, and we release a testbed to enable users to test their own embedding policies, and to run applications within their virtual networks. The testbed uses a Linux system architecture to reserve virtual node and link capacities

    A policy-based architecture for virtual network embedding (PhD thesis)

    Full text link
    Network virtualization is a technology that enables multiple virtual instances to coexist on a common physical network infrastructure. This paradigm fostered new business models, allowing infrastructure providers to lease or share their physical resources. Each virtual network is isolated and can be customized to support a new class of customers and applications. To this end, infrastructure providers need to embed virtual networks on their infrastructure. The virtual network embedding is the (NP-hard) problem of matching constrained virtual networks onto a physical network. Heuristics to solve the embedding problem have exploited several policies under different settings. For example, centralized solutions have been devised for small enterprise physical networks, while distributed solutions have been proposed over larger federated wide-area networks. In this thesis we present a policy-based architecture for the virtual network embedding problem. By policy, we mean a variant aspect of any of the three (invariant) embedding mechanisms: physical resource discovery, virtual network mapping, and allocation on the physical infrastructure. Our architecture adapts to different scenarios by instantiating appropriate policies, and has bounds on embedding enablesciency, and on convergence embedding time, over a single provider, or across multiple federated providers. The performance of representative novel and existing policy configuration are compared via extensive simulations, and over a prototype implementation. We also present an object model as a foundation for a protocol specification, and we release a testbed to enable users to test their own embedding policies, and to run applications within their virtual networks. The testbed uses a Linux system architecture to reserve virtual node and link capacities

    An ant colony optimization approach for maximizing the lifetime of heterogeneous wireless sensor networks

    Get PDF
    Maximizing the lifetime of wireless sensor networks (WSNs) is a challenging problem. Although some methods exist to address the problem in homogeneous WSNs, research on this problem in heterogeneous WSNs have progressed at a slow pace. Inspired by the promising performance of ant colony optimization (ACO) to solve combinatorial problems, this paper proposes an ACO-based approach that can maximize the lifetime of heterogeneous WSNs. The methodology is based on finding the maximum number of disjoint connected covers that satisfy both sensing coverage and network connectivity. A construction graph is designed with each vertex denoting the assignment of a device in a subset. Based on pheromone and heuristic information, the ants seek an optimal path on the construction graph to maximize the number of connected covers. The pheromone serves as a metaphor for the search experiences in building connected covers. The heuristic information is used to reflect the desirability of device assignments. A local search procedure is designed to further improve the search efficiency. The proposed approach has been applied to a variety of heterogeneous WSNs. The results show that the approach is effective and efficient in finding high-quality solutions for maximizing the lifetime of heterogeneous WSNs

    Approximation algorithms for mobile multi-agent sensing problem

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์‚ฐ์—…๊ณตํ•™๊ณผ, 2020. 8. ๋ฌธ์ผ๊ฒฝ.Multi-agent systems are generally applicable in a wide diversity of domains, such as robot engineering, computer science, the military, and smart cities. In particular, the mobile multi-agent sensing problem can be defined as a problem of detecting events occurring in a large number of nodes using moving agents. In this thesis, we introduce a mobile multi-agent sensing problem and present a mathematical formulation. The model can be represented as a submodular maximization problem under a partition matroid constraint, which is NP-hard in general. The optimal solution of the model can be considered computationally intractable. Therefore, we propose two approximation algorithms based on the greedy approach, which are global greedy and sequential greedy algorithms, respectively. We present new approximation ratios of the sequential greedy algorithm and prove tightness of the ratios. Moreover, we show that the sequential greedy algorithm is competitive with the global greedy algorithm and has advantages of computation times. Finally, we demonstrate the performances of our results through numerical experiments.๋‹ค์ค‘ ์—์ด์ „ํŠธ ์‹œ์Šคํ…œ์€ ์ผ๋ฐ˜์ ์œผ๋กœ ๋กœ๋ด‡ ๊ณตํ•™, ์ปดํ“จํ„ฐ ๊ณผํ•™, ๊ตฐ์‚ฌ ๋ฐ ์Šค๋งˆํŠธ ๋„์‹œ์™€ ๊ฐ™์€ ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์— ์ ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. ํŠนํžˆ, ๋ชจ๋ฐ”์ผ ๋‹ค์ค‘ ์—์ด์ „ํŠธ ๊ฐ์ง€ ๋ฌธ์ œ๋Š” ์›€์ง์ด๋Š” ์—์ด์ „ํŠธ๋ฅผ ์ด์šฉํ•ด ๋งŽ์€ ์ˆ˜์˜ ๋…ธ๋“œ์—์„œ ๋ฐœ์ƒํ•˜๋Š” ์ด๋ฒคํŠธ๋ฅผ ๊ฐ์ง€ํ•˜๋Š” ๋ฌธ์ œ๋กœ ์ •์˜ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋ชจ๋ฐ”์ผ ๋‹ค์ค‘ ์—์ด์ „ํŠธ ๊ฐ์ง€ ๋ฌธ์ œ์˜ ์ˆ˜ํ•™์  ๊ณต์‹์„ ์ œ์•ˆํ•œ๋‹ค. ์ด ๋ฌธ์ œ๋Š” ์ผ๋ฐ˜์ ์œผ๋กœ NP-๋‚œํ•ด ๋ฌธ์ œ์ธ ๋ถ„ํ•  ๋งคํŠธ๋กœ์ด๋“œ ์ œ์•ฝ ํ•˜์—์„œ ํ•˜์œ„ ๋ชจ๋“ˆ ํ•จ์ˆ˜์˜ ์ตœ๋Œ€ํ™” ๋ฌธ์ œ๋กœ ํ‘œํ˜„ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ฌธ์ œ์˜ ์ตœ์ ํ•ด๋Š” ์ž…๋ ฅ ๋ฐ์ดํ„ฐ์˜ ํฌ๊ธฐ๊ฐ€ ์ปค์งˆ์ˆ˜๋ก ๋ณดํ†ต ํ•ฉ๋ฆฌ์ ์ธ ์‹œ๊ฐ„ ์ด๋‚ด์— ๊ณ„์‚ฐํ•˜๊ธฐ ์–ด๋ ต๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ํƒ์š•์  ์ ‘๊ทผ ๋ฐฉ์‹์— ๊ธฐ์ดˆํ•œ ๋‘ ๊ฐ€์ง€ ๊ทผ์‚ฌ ์•Œ๊ณ ๋ฆฌ์ฆ˜ (์ „์—ญ ํƒ์š• ์•Œ๊ณ ๋ฆฌ์ฆ˜, ์ˆœ์ฐจ ํƒ์š• ์•Œ๊ณ ๋ฆฌ์ฆ˜)์„ ์ œ์•ˆํ•œ๋‹ค. ๋˜ํ•œ, ์ˆœ์ฐจ ํƒ์š• ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ์ƒˆ๋กœ์šด ๊ทผ์‚ฌ ๋น„์œจ์„ ์ฆ๋ช…ํ•˜๊ณ  ๊ทผ์‚ฌ ๋น„์œจ์— ์ •ํ™•ํ•˜๊ฒŒ ์ผ์น˜ํ•˜๋Š” ์ธ์Šคํ„ด์Šค๋ฅผ ์ œ์‹œํ•œ๋‹ค. ๋˜ํ•œ, ์ˆ˜์น˜ ์‹คํ—˜ ๊ฒฐ๊ณผ๋กœ ์ˆœ์ฐจ ํƒ์š• ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ํšจ๊ณผ์ ์ธ ํ•ด๋ฅผ ์ฐพ์•„์ค„ ๋ฟ ์•„๋‹ˆ๋ผ, ์ „์—ญ ํƒ์š• ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ ๋น„๊ตํ•ด ๊ณ„์‚ฐ ์‹œ๊ฐ„์˜ ์ด์ ์„ ๊ฐ€์ง€๊ณ  ์žˆ์Œ์„ ํ™•์ธํ•œ๋‹ค.Chapter 1 Introduction 1 Chapter 2 Literature Review 4 Chapter 3 Problem statement 7 Chapter 4 Algorithms and approximation ratios 11 Chapter 5 Computational Experiments 22 Chapter 6 Conclusions 30 Bibliography 31 ๊ตญ๋ฌธ์ดˆ๋ก 40Maste

    Simulation of physical and media access control (MAC) for resilient and scalable wireless sensor networks

    Get PDF
    The resilience of wireless sensor networks is investigated. A key concept is that scale-free network principles can be adapted to artificially create resilient wireless sensor networks. As scale-free networks are known to be resilient to errors but vulnerable to attack, a strategy using "cold-start" diversity is proposed to reduce the vulnerability to attacks. The IEEE 802.15.4 MAC and ZigBee protocols are investigated for their ability to form resilient clusters. Our investigation reveals there exists deficiencies in these protocols and the possibility of selfdirected and attack-directed denial-of-service is significant. Through insights gained, techniques are recommended to augment the protocols, increasing their resilience without major changes to the standard itself. Since both topological and protocol resilience properties are investigated, our results reveal important insights. Simulation of the physical and media access control layers using ns-2 is carried out to validate key concepts and approach.http://archive.org/details/simulationofphys109452893Approved for public release; distribution is unlimited
    • โ€ฆ
    corecore