Presentation is loading. Please wait.

Presentation is loading. Please wait.

Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE 2009 1Yun-Jung Lu.

Similar presentations


Presentation on theme: "Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE 2009 1Yun-Jung Lu."— Presentation transcript:

1 Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE Yun-Jung Lu

2  Introduction  Preliminaries  The Connectivity-Preserved Virtual Force (CPVF) Scheme  The Floor-Based Scheme  Performance Evaluation  Conclusion 2Yun-Jung Lu

3  In an mobile sensor network, the sensors are able to relocate and self-organize into a network.  The mobility and self-management of sensors are desirable for many application scenarios, including remote harsh fields, disaster areas or toxic urban regions, where manual operations are unsafe or burdensome. 3Yun-Jung Lu

4  Given a target sensing field with an arbitrary initial sensor distribution, how should these sensors self- organize into a connected ad hoc network that has the maximum coverage, at the cost of a minimum moving distance? 4Yun-Jung Lu

5  Potential Fields or Virtual Force ◦ When two electromagnetic particles are too close in proximity, a repulsive force pushes them apart.  Voronoi Diagrams (VDs) ◦ Allow sensors to move to maximize coverage in its own subarea 5Yun-Jung Lu

6  The communication range of a sensor may not be large enough to cover all Voronoi neighbors. ◦ An incomplete view of the Voronoi neighbors may result in very inaccurate VDs being constructed. 6Yun-Jung Lu

7  Network Connectivity? Network partition can still occur in a dense network. ◦ Generally, connectivity must be considered in protocol design.  Obstacle-free? ◦ Naturally, the real-world environments have obstacles or holes render such schemes ineffectual. 7Yun-Jung Lu

8  To achieve connectivity for a network with an arbitrary initial distribution, communication/sensing range, or node density  To minimize moving distance, which dominates energy consumption in the deployment process  To be able to work without any knowledge of the field layout, which can be irregular and have obstacles of arbitrary shape 8Yun-Jung Lu

9  System Assumptions ◦ All sensors have the same communication range r c and sensing range r s. ◦ At any given time, a sensor knows its own position and can recognize the boundary of the obstacles within its sensing range. ◦ Sensors move in steps of variable size.  In each step, a sensor moves in a straight line at a uniform speed for a period and denote by T. ◦ There is a reference point O ; all the sensors will try to connect to O generality. 9Yun-Jung Lu

10  Obstacle Avoidance ◦ BUG2: “Path-Planning Strategies for a Point Mobile Automaton Moving amidst Unknown Obstacles of Arbitrary Shape,” Algorithmica, 1987 ◦ Reference Line : the straight line ( Start, Target ) ◦ H : hitting point ◦ Right-hand rule 10Yun-Jung Lu

11  Lazy Movement (With multiple hop communication, not all disconnected sensors need to move to get connected.) ◦ At the end of each step, a sensor checks its neighbors to see if there are any ahead of it; ◦ If so, then it chooses the nearest neighbor as its candidate path parent. 11Yun-Jung Lu

12  Achieving Connectivity  Maximizing Sensing Coverage 12Yun-Jung Lu

13  Initially, all sensors are required to decide their states regarding connectivity. ◦ Flooding a message to the network  Sensor receives such a message, becomes aware that they are also connected  After a certain period of time, if a sensor still has not received such a message, it can decide that it is disconnected. ◦ It will allow a small random time period to elapse after which it starts to move using the BUG2 Algorithm(with lazy movement) toward the base station. 13Yun-Jung Lu

14  Virtual Force is used to determine the direction to move. ◦ The obstacles and neighboring sensors exert repulsive forces onto a sensor. ◦ The sum of all forces determines the subsequent direction of that sensor. 14Yun-Jung Lu

15  Connectivity Preserving Conditions ◦ The distance between s and s’ at time t’ is no greater than r c ◦ The distance between s’ ’s position at t’ and s’ ’s position at t + T is no grater than r c  A sensor can approximately determine the maximum valid step size by checking a set of possible values, for example, VT, 0.9 * VT, …, 0.1*VT, 0. A A B B C C f ba f ca V : the moving speed T : the moving time of one step VT A A t’ s’ 15Yun-Jung Lu

16 16Yun-Jung Lu

17 17Yun-Jung Lu

18  Achieving Connectivity  Identifying Movable Sensors  Expanding Coverage 18Yun-Jung Lu

19 19Yun-Jung Lu

20 20Yun-Jung Lu

21  To identify sensors that can move without partitioning the network and whose move is expected to increase network coverage  The Rules to achieve that: ◦ Obtain a list of neighbors within two hops of itself ◦ Try to find for each child a new parent ◦ Loop check for a particular child ◦ If all the children can find parents without crating loops, then it means that the sensor can safely move away. 21Yun-Jung Lu

22  With all movable sensors identified, we can now expand the network’s coverage.  Three types of expansion policy ◦ Floor-line-guided expansion ◦ Boundary-line-guided expansion ◦ Interfloor-line-guided expansion 22Yun-Jung Lu

23  Expansion Point  Expansion Circle is min(r c, r s ) frontier point Expansion Circle 23Yun-Jung Lu

24 24Yun-Jung Lu

25 25Yun-Jung Lu Frontier Point

26  If a sensor can not find any expansion points in its expansion circle, it will stop the process.  Else, it will flood a Invitation Message to find some sensors to cover these points.  Invitation Message contains an EP to the network and a TTL value. 26Yun-Jung Lu

27  It collects a certain number of invitations, and picks one with the highest priority.  It sends an AcceptInvitation message to the inviter. Yun-Jung Lu27

28  The inviting sensor constructs a virtual place- holding fixed node in the tree, and sends a message to the root on behalf of the invited sensor to update the location information maintained by its ancestors. Yun-Jung Lu28

29 29Yun-Jung Lu

30  An event-based simulator using C++  240 sensors are initially randomly distributed in a subarea {(x, y):0≦x ≦500m, 0≦y ≦500m} of a target field {(x, y):0≦x ≦1000m, 0≦y ≦1000m}  The base station is located at (0,0).  The maximum moving speed is 2 m/s.  The period length is 1 second.  The simulation runs for 750 seconds. 30Yun-Jung Lu

31 31Yun-Jung Lu

32 32Yun-Jung Lu

33 33Yun-Jung Lu

34  Two sensor deployment schemes are proposed for mobile sensor network in this paper.  The major difference of the proposed schemes with the previous works is their adaptability to arbitrary network densities or communication ranges and to obstacles. 34Yun-Jung Lu


Download ppt "Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE 2009 1Yun-Jung Lu."

Similar presentations


Ads by Google