In a large scale distributed system with a large number of sensors interconnected through a wide-area network infrastructure, it is advantageous not to disseminate a query to all available sensors, but only to a subse...
详细信息
ISBN:
(纸本)1424402379
In a large scale distributed system with a large number of sensors interconnected through a wide-area network infrastructure, it is advantageous not to disseminate a query to all available sensors, but only to a subset of the most-relevant ones. We target an application scenario where mobile phones trace users' objects (which are equipped with small identification tags), distribute useful context information related to these objects, and are able to locate them when lost or misplaced. For locating a lost object, the proposed algorithm - parameterized with a data model of the application domain - is able to explore a wide range of heuristics based on history data present in the system (on objects, users, and their past location), similarly to the way a human user would re-iterate all that she/he knows about a lost object in order to locate it. As the proposed algorithm uses the data present in the system to parameterize its execution, it is generic enough to be applied to other application domains.
Mobile sinks pose several challenges for network protocol design. While moving, a sink should continuously update its topological position information in the sensor nodes to maintain paths. This may require large sign...
详细信息
ISBN:
(纸本)9783540683797
Mobile sinks pose several challenges for network protocol design. While moving, a sink should continuously update its topological position information in the sensor nodes to maintain paths. This may require large signaling overhead, resulting in excessive energy consumption. Various schemes have been proposed to reduce the path management overhead. In many of these schemes, the sinks only maintain paths from active sources to reduce the overhead. While reducing the path management overhead, this approach introduces other problems. In this paper, Data Rate Adaptive Route Optimization (DRARO) scheme is proposed. DRARO provides a method for adjusting the route optimization level depending on the amount of data traffic, to minimize overall energy consumption. In addition, DRARO provides ceaseless connection for every sensor nodes and its performance is not affected by the number or movement of the. sensing targets.
Wireless sensor networks play a key role in monitoring remote or inhospitable physical environments. One of the most important constraints is the energy efficiency problem. Power conservation and power management must...
详细信息
ISBN:
(纸本)3540380914
Wireless sensor networks play a key role in monitoring remote or inhospitable physical environments. One of the most important constraints is the energy efficiency problem. Power conservation and power management must be taken into account at all levels of the sensor networks system hierarchy. Especially, DPM (Dynamic Power Management) technology, which shuts down the devices when not needed and wake them up when necessary, has been widely used in sensor networks. In this paper, we modify the sleep state policy developed by Simunic and Chdrakasan in [1] and deduce a new threshold satisfies the sleep-state transition policy. Nodes in deeper sleep states consume lower energy while asleep, but require longer delays and higher latency costs to awaken. Implementing dynamic power management with considering the battery status and probability of event generation will reduce the energy consumption and prolong the whole lifetime of the sensor networks. The sensor network consumed less energy in our simulation than that in [1].
Rapid and efficient recovery in the event of site crash is very important for distributed real-time main memory database system. In this paper, the recovery correctness criteria of distributed real-time main memory da...
详细信息
ISBN:
(纸本)354038619X
Rapid and efficient recovery in the event of site crash is very important for distributed real-time main memory database system. In this paper, the recovery correctness criteria of distributed real-time main memory databases are first given. Then, a time-cognizant dynamic crash recovery scheme (TCDCRS) based on log is presented. TCDCRS uses nonvolatile RAM as logging store and integrates the properties of partitioned logging, ephemeral logging and real-time logging in order to reduce the logging cost as possible during the normal running. During restart recovery after site crashes, a dynamic recovery method based on the classification recovery strategy, which supports concurrent of system services and recovery processing, is adopted to decrease the downtime to the most extent. Experiments and evaluations show that TCDCRS has better performances than traditional recovery schemes in two aspects: the missing deadlines ratio of transactions and the time of system denying services after crashes.
The majority of analytical work on the performance of ieee 802.11 [1] focuses on predicting the throughput and the mean delay of only the medium access, although higher layer applications and protocols are interested ...
详细信息
The majority of analytical work on the performance of ieee 802.11 [1] focuses on predicting the throughput and the mean delay of only the medium access, although higher layer applications and protocols are interested in the total performance of the MAC layer. Seen in this perspective, surprisingly little focus has been on predicting the queueing delay. The main contribution of this paper opposed to other works is that it presents the full delay distribution through the z-transform. As a result, the mean medium access delay is found by the first order moment of the transform, and the mean queueing delay by the second order moment. Together this gives the average total delay associated with the MAC layer. The z-transform is derived from an analytical model that works in the whole range from a lightly loaded, non-saturated channel to a heavily congested, saturated medium. The model describes the priority schemes of the Enhanced distributed Channel Access (EDCA) mechanism of the ieee 802.11e standard [2]. EDCA provides class-based differentiated Quality of Service (QoS) to ieee 802.11 WLANs, and distinguishes between four different traffic classes - called Access Categories (AC). By setting the number of ACs to one, and by using an appropriate parameter setting, the results presented are also applicable to the legacy 802.11 distributed Coordination Function (DCF) [1]. The model predictions are calculated numerically and validated against simulation results. A good match between the analytical predictions and simulations was observed.
Arising when a large percentage of queries is accessing data stored in few sensor nodes, query hot-spots reduce the Quality of Data (QoD) and the lifetime of the sensor network. All current In-Network Data-Centric Sto...
详细信息
ISBN:
(纸本)9781424404988
Arising when a large percentage of queries is accessing data stored in few sensor nodes, query hot-spots reduce the Quality of Data (QoD) and the lifetime of the sensor network. All current In-Network Data-Centric Storage (INDCS) schemes fail to deal with query hot-spots resulting from skewed query loads as well as skewed sensor deployments. In this paper we present two algorithms to locally detect and decompose query hot-spots, namely Zone Partitioning (ZP) and Zone Partial Replication (ZPR). We build both algorithms on top of the DIM scheme, which has been shown to exhibit the best performance among all INDCS schemes. Experimental evaluation illustrates the efficiency of ZP/ZPR in decomposing query hot-spots while increasing QoD as well as energy savings by balancing energy consumption among sensor nodes.
We develop algorithms for finding the minimum energy transmission schedule for duty-cycle and rate constrained wireless sensor nodes transmitting over an interference channel. Since traditional optimization methods us...
详细信息
In this paper, bidirectional data aggregation (BDA) scheme is proposed for wireless sensor networks. Traditionally, data aggregation bas been performed in backward direction (from source to sink) where each node in th...
详细信息
ISBN:
(纸本)3540380914
In this paper, bidirectional data aggregation (BDA) scheme is proposed for wireless sensor networks. Traditionally, data aggregation bas been performed in backward direction (from source to sink) where each node in the network combines data from its child nodes. BDA algorithm, however, aggregates sensory data in both directions (sink to sources and sources to sink) when the sink is interested in gathering singular aggregates such as MAX and MIN. In forward aggregation (sink to sources), each node tags its sensor reading to the ongoing query only if its local reading is not redundant. Node receiving the tagged query suppresses its response if its local reading is redundant. By doing so, we can limit a number of redundant and unnecessary responses from the sensor nodes, saving energy. Performance evaluation shows that BDA algorithm significantly improves energy-efficiency as well as provides an accurate response for a given singular query in the presence of time-varying sensor readings.
Internet-based communication is currently in a hype. People utilize Internet services more and more to communicate with each other e.g., via VoIP or chat. The next step would be to reutilize the same applications to a...
详细信息
ISBN:
(纸本)9780780397910
Internet-based communication is currently in a hype. People utilize Internet services more and more to communicate with each other e.g., via VoIP or chat. The next step would be to reutilize the same applications to achieve ubiquitous communication, anytime and anywhere, also where network support is not available, such as in ad-hoe networks. Existing Internet protocols must be modified for working in the ad-hoc server-less environment. The Session Initiation Protocol (SIP) is a fundamental element in the Internet for establishing multimedia communication sessions. However SIP cannot be used in ad-hoc networks, as it relies on the support of SIP servers in the network;e.g, in ad-hoc networks it is not possible to locate SIP users since the assistance of a dedicated SIP server is missing. A solution for this problem is presented in this paper which describes and evaluates a fully decentralized mechanism for locating SIP users in ad-hoc networks.
Multi-hop wireless networks facilitate applications in metropolitan area broadband, home multimedia, surveillance and industrial control networks. Many of these applications require high end-to-end throughput and/or b...
详细信息
ISBN:
(纸本)9781424404247
Multi-hop wireless networks facilitate applications in metropolitan area broadband, home multimedia, surveillance and industrial control networks. Many of these applications require high end-to-end throughput and/or bounded delay. Random access link-layer protocols such as Carrier Sense Multiple Access (CSMA) which are widely used in single-hop networks perform poorly in the multi-hop regime and provide no end-to-end QoS guarantees. The primary causes for their poor performance are uncoordinated interference and unfairness in exclusive access of the shared wireless medium. Furthermore, random access schemes do not leverage spatial reuse effectively and require routes to be linkaware. In this paper, we propose and study MAX, a time-division-multiplexed resource allocation framework for multi-hop networks with regular topologies. MAX tiling delivers optimal end-to-end throughput across arbitrarily large regularly structured networks while providing bounded delay. It outperforms CSMA-based random access protocols by a factor of 5 to 8. The MAX. approach also supports network services including flexible uplink and downlink bandwidth management, deterministic route admission control, and optimal gateway placement. MAX has been implemented on ieee 802.15.3 embedded nodes and a test-bed of 50 nodes has been deployed both indoors and outdoors.
暂无评论