Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k ≦ 6) Wireless Sensor Networks Xiaole Bai, Dong Xuan, Ten H. Lai, Ziqiu Yun,

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks Xiao Chen Neil C. Rowe epartment of Computer Science Department of Computer Science.
GPS-Free Node Localization in Mobile Wireless Sensor Networks H¨useyin Akcan 1, Vassil Kriakov 1,Herv´e Br¨onnimann 1, Alex Delis 2 1 CIS Department Polytechnic.
General Description Coverage-Preserving Routing Protocol for WSNs Distributed, power-balanced multi- hop routing protocol Coverage-preserving based route-
Joint Access Point Placement and Channel Assignment for Wireless LANs Xiang Ling School of Communication and Information Engineering University.
Secrecy Capacity Scaling of Large-Scale Cognitive Networks Yitao Chen 1, Jinbei Zhang 1, Xinbing Wang 1, Xiaohua Tian 1, Weijie Wu 1, Fan Fu 2, Chee Wei.
Coverage Preserving Redundancy Elimination in Sensor Networks Bogdan Carbunar, Ananth Grama, Jan Vitek Computer Sciences Department Purdue University West.
1 School of Computing Science Simon Fraser University, Canada PCP: A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda and Hossein.
Target Tracking Algorithm based on Minimal Contour in Wireless Sensor Networks Jaehoon Jeong, Taehyun Hwang, Tian He, and David Du Department of Computer.
Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks Xiao Wang, Xinbing Wang, Jun Zhao Department of Electronic.
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
Data Fusion Improves the Coverage of Wireless Sensor Networks Guoliang Xing 1, Rui Tan 2, Benyuan Liu 3, Jianping Wang 2, Xiaohua Jia 2,Chih-wei Yi 4 1.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Avoiding Energy Holes in Wireless Sensor Network with Nonuniform Node Distribution Xiaobing Wu, Guihai Chen and Sajal K. Das Parallel and Distributed Systems.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Critical Transmission Range for Mobile Clustered Wireless Networks Qi Wang, Liang Liu, Xinbing Wang Department of Electronic Engineering Shanghai Jiao.
An Energy-efficient Target Tracking Algorithm in Wireless Sensor Networks Wang Duoqiang, Lv Mingke, Qin Qi School of Computer Science and technology Huazhong.
Department of Computer Science and Engineering The Ohio State University Key Student Collaborator: Xiaole Bai and Jin.
Using Rotatable and Directional (R&D) Sensors to Achieve Temporal Coverage of Objects and Its Surveillance Application You-Chiun Wang, Yung-Fu Chen, and.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
A novel gossip-based sensing coverage algorithm for dense wireless sensor networks Vinh Tran-Quang a, Takumi Miyoshi a,b a Graduate School of Engineering,
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Shambhavi Srinivasa Carey Williamson Zongpeng Li Department of Computer Science University of Calgary Barrier Counting in Mixed Wireless Sensor Networks.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Prediction-based Object Tracking and Coverage in Visual Sensor Networks Tzung-Shi Chen Jiun-Jie Peng,De-Wei Lee Hua-Wen Tsai Dept. of Com. Sci. and Info.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Convergecast with MIMO Luoyi Fu, Yi Qin, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Xue Liu Department of Computer.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
1 Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai*, Santosh Kumar*, Dong Xuan*, Ziqiu Yun +, Ten H. Lai* * Computer Science.
KAIS T Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun and Ten H.Lai MobiHoc 2006.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Query Aggregation for Providing Efficient Data Services in Sensor Networks Wei Yu *, Thang Nam Le +, Dong Xuan + and Wei Zhao * * Computer Science Department.
Barrier Coverage With Wireless Sensors
Central China Normal University A Cluster-based and Range Free Multidimensional Scaling-MAP Localization Scheme in WSN 1 Ke Xu, Yuhua Liu ( ), Cui Xu School.
Ai Chen, Ten H. Lai, Dong Xuan Department of Computer Science and Engineering The Ohio State University Columbus Measuring and Guaranteeing Quality of.
Redeployment for Mobile Wireless Sensor Networks Weihong Fan, Hengyang Zhang and Xuanping Cai Yunhui Liu Yunhui LiuJoint Center of Intelligent Sensing.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China.
Adaptive Tracking in Distributed Wireless Sensor Networks Lizhi Yang, Chuan Feng, Jerzy W. Rozenblit, Haiyan Qiao The University of Arizona Electrical.
Barrier Coverage in Camera Sensor Networks ACM MobiHoc 2011 Yi Wang Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
A Deafness Free MAC Protocol for Ad Hoc Networks Using Directional Antennas Jia Feng, Pinyi Ren, and Shuangcheng Yan Department of Electronic Engineering.
A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks Wen-Tsuen Chen Department of Computer Science National Tsing Hua University Po-Yu.
Decentralized Energy-Conserving and Coverage-Preserving Protocols for Wireless Sensor Networks Chi-Fu Huang, Li-Chu Lo, Yu-Chee Tseng, and Wen-Tsuen Chen.
Dong Xuan: CSE885 on 11/07/07 The Ohio State University 1 Research in Networking Dong Xuan Dept. of Computer Science and Engineering The Ohio State University.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Outline Introduction Network model Two-phase algorithm Simulation
Strong Barrier Coverage of Wireless Sensor Networks Benyuan Liu, Olivier Dousse, Jie Wang and Anwar Saipulla University of Massachusetts Lowell and Deutsche.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
EASE: An Energy-Efficient In-Network Storage Scheme for Object Tracking in Sensor Networks Jianliang Xu Department of Computer Science Hong Kong Baptist.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Deploying Sensors for Maximum Coverage in Sensor Network Ruay-Shiung Chang Shuo-Hung Wang National Dong Hwa University IEEE International Wireless Communications.
1 Terrain-Constrained Mobile Sensor Networks Shu Zhou 1, Wei Shu 1, Min-You Wu 2 1.The University of New Mexico 2.Shanghai Jiao Tong University IEEE Globecom.
Flocks of Robots Coordinated Multi-robot Systems Dylan A. Shell Distributed AI Robotics Lab Department of Computer Science & Engineering Texas A&M University.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
/ 24 1 Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai Santosh Kumar Dong Xuan Computer Science and Engineering The Ohio.
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks IEEE Transactions on Parallel and Distributed System, Vol. 19, No. 5, May 2008.
An Opportunistic Directional MAC Protocol for Multi-hop Wireless Networks with Switched Beam Directional Antennas Osama Bazan and Muhammad Jaseemuddin.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 1 Sriram Chellappan, Xiaole Bai, Bin Ma ‡ and Dong Xuan Presented by Sriram.
Prof. Yu-Chee Tseng Department of Computer Science
Presentation transcript:

Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k ≦ 6) Wireless Sensor Networks Xiaole Bai, Dong Xuan, Ten H. Lai, Ziqiu Yun, Weijia Jia Computer Science and Engineering The Ohio State University, USA Department of Mathematics Suzhou University, CHINA Department of Computer Science City University of Hong Kong, CHINA ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008 YearSubmittedAccepted% Accepted % % %

Outline IntroductionThe proposed patternsNumerical resultsConclusion

Introduction Wireless sensor networks show more and more popularity for both military and civil applications.

Introduction Wireless sensor networks show more and more popularity for both military and civil applications. –Noxious Gas Detection

Introduction Wireless sensor networks show more and more popularity for both military and civil applications. –Fire Detection

The deployment is a fundamental issue in Wireless Sensor Networks (WSNs) that affects many facts for these applications. There are two categories of deployments in WSNs. –Random deployment –Deterministic deployment Introduction

RsRs

Achieve 6-connectivity only when r c ≧ RsRs A

The work on exploring optimal patterns in WSNs is not yet complete. –3-connected –5-connected –6-connected when R c / R s < The previous exploration on optimal patterns has not yet been conducted systematically. Introduction

Goal Propose deployment patterns systematically. –Achieve full coverage and k-connectivity (k ≦ 6) under different ratios of sensor communication range over sensing range.

Deployment Patterns Universal elemental patternk=3k=4k=5k=6 k=1 or k=2

Deployment Patterns - Universal elemental pattern θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2

θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2

Deployment Patterns – 3-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s

Deployment Patterns – 3-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=15, Rs=20 :  1 = 120 °,  2 = 120 °,  3 = 120 °, d 1 =15, d 2 =15 120° 15

Deployment Patterns – 3-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=25, Rs=20 :  1 = °,  2 = °,  3 = °, d 1 =25, d 2 = ° ° ° ° 25

Deployment Patterns – 3-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=28.284, Rs=20 :  1 = 180°,  2 = 90°,  3 = 90°, d 1 =28.284, d 2 = ° 90° 180°90°

Deployment Patterns – 3-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=32, Rs=20 :  1 = 180°,  2 = °,  3 = 73.74°, d 1 = 32, d 2 = ° °73.74° 180° °73.74° 32

Deployment Patterns – 3-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=40, Rs=20 :  1 = 180°,  2 = 120°,  3 = 60°, d 1 = , d 2 = ° 120°60° 180° 120 °60°

Deployment Patterns – 4-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s

Deployment Patterns – 4-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s ≦ √2 √2 < R c / R s < √3 √3 ≦ R c / R s 180° 90° 180°90° RcRc RcRc RcRc RcRc RcRc RcRc

Deployment Patterns – 4-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=32, Rs=20 :  1 = 180°,  2 = °,  3 = 73.74°, d 1 = 32, d 2 = ° °73.74° 180° °73.74° 32

Deployment Patterns – 4-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=40, Rs=20 :  1 = 180°,  2 = 120°,  3 = 60°, d 1 = , d 2 = ° 120°60° 180° 120 °60°

Deployment Patterns – 5-connectivity R c / R s ≦ √2 √2 < R c / R s < √3 √3 ≦ R c / R s θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2

Deployment Patterns – 5-connectivity R c / R s ≦ √2 √2 < R c / R s < √3 √3 ≦ R c / R s 150° 60° 150° 60° RcRc RcRc RcRc RcRc RcRc RcRc θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2

Deployment Patterns – 5-connectivity R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=32, Rs=20 :  1 = 60 °,  2 = °,  3 = °, d 1 = 32, d 2 = 32 60° ° ° 60° ° ° 32 θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2

Deployment Patterns – 5-connectivity R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=40, Rs=20 :  1 = 60°,  2 = 180°,  3 = 120°, d 1 = , d 2 = ° 180° 120° 60° 180 ° 120° θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2

Deployment Patterns – 6-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < √3 √3 ≦ R c / R s

Deployment Patterns – 6-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 180° 120°60° 180° 120°60° RcRc RcRc RcRc RcRc RcRc RcRc R c / R s < √3 √3 ≦ R c / R s

Deployment Patterns – 6-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 180° 120°60° 180° 120°60° RsRs RsRs RsRs RsRs RsRs RsRs R c / R s < √3 √3 ≦ R c / R s

Deployment Patterns – 1 or 2-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s

Deployment Patterns – 1 or 2-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=15, Rs=20 :  1 = 180°,  2 =78.779°,  3 =101.22°, d 1 =15, d 2 = °78.779°101.22° 180°78.779°101.22°

Deployment Patterns – 1 or 2-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=25, Rs=20 :  1 = 180°,  2 = °,  3 = °, d 1 =25, d 2 = °69.450°110.55° 180° °110.55°

Deployment Patterns – 1 or 2-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=28.284, Rs=20 :  1 = 180°,  2 = 65.53°,  3 = °, d 1 =28.284, d 2 = °65.53°114.47° ° 180° 65.53°

Deployment Patterns – 1 or 2-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=32, Rs=20 :  1 = 180°,  2 = 60°,  3 = 120°, d 1 = 32, d 2 = °60°120° ° 180° 60°

Deployment Patterns – 1 or 2-connectivity θ1θ1 θ1θ1 θ2θ2 θ2θ2 θ3θ3 θ3θ3 d1d1 d1d1 d1d1 d1d1 d2d2 d2d2 R c / R s < 1 1 ≦ R c / R s < √2 R c / R s = √2 √2 < R c / R s < √3 √3 ≦ R c / R s Rc=39, Rs=20 :  1 = 180°,  2 = °,  3 = °, d 1 = , d 2 = ° °142.91° ° 180° °

Deployment Patterns

Numerical Results Parameters SimulatorUnknow Size of network1000*1000 m Sensing range30 m Communication range20~60 m

Numerical Results

Conclusion This paper propose deployment patterns systematically. –Achieve full coverage and k-connectivity (k ≦ 6) under different ratios of sensor communication range over sensing range.