Responsive image
博碩士論文 etd-0128113-174409 詳細資訊
Title page for etd-0128113-174409
論文名稱
Title
隨意無線網路中虛擬骨幹的局部維護機制
Local Maintenance Scheme of Virtual Backbone in Mobile Ad Hoc Networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
63
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2013-01-18
繳交日期
Date of Submission
2013-01-28
關鍵字
Keywords
無線感測網路、行動隨意網路、維護、連通支配集、虛擬骨幹
wireless sensor networks (WSNs), virtual backbone, connected dominating set (CDS), maintenance, mobile ad hoc networks (MANETs)
統計
Statistics
本論文已被瀏覽 5695 次,被下載 770
The thesis/dissertation has been browsed 5695 times, has been downloaded 770 times.
中文摘要
無線隨意網路中以連通支配集(connected dominating set)特性,建立虛擬骨幹(virtual backbone)的方式,可以有效減少廣播封包在網路中負擔的成本與能量的消耗。近年來,許多虛擬骨幹的建立方法陸續被提出,但是在這些方法中,很少有提到當網路拓樸改變,虛擬骨幹維護的議題。因為在無線隨意網路和無線感測網路中,節點的移動或是關閉造成網路拓樸改變是常常發生的,缺乏維護機制會使虛擬骨幹遭到破壞。本文提出一套維護虛擬骨幹的機制,利用修復網路上的斷裂鏈節,確保當網路拓樸發生改變時,虛擬骨幹架構得以維持。斷裂鏈節的修復,依據斷裂鏈節在虛擬骨幹中的角色,而有不同的作法。節點在維護虛擬骨幹的過程中,考慮到了鄰居資訊、虛擬骨幹的性質和已存在的虛擬骨幹架構,所以使我們提出的方法有很高的局部化程度。不管其虛擬骨幹的建立方法為何,我們的虛擬骨幹維護機制,可以套用在任何存在虛擬骨幹的網路之中,而且不會加大虛擬骨幹建立方法的複雜度。ns-2上的模擬結果顯示當網路節點密度較高和節點變動較小時,本文所提出的方法在封包消耗量與參與節點數上表現較其他方法好。
Abstract
Using connected dominating set as a virtual backbone in ad hoc networks has the advantage of reducing both communication overhead and power consumption. Many virtual backbone (VB) construction methods have been proposed in recent years, but few of them focus on the maintenance issue. Since the network topology may dramatically change due to node mobility or switch off in mobile ad hoc networks (MANETs) or wireless sensor networks (WSNs). In this paper, we propose a localized virtual backbone maintenance scheme to retain the virtual backbone stable when network topology changed. Our method maintains the VB by repairing the broken link in the network. According to the broken link’s role in the VB, we use different ways to repair. Because the consideration for the broken VB’s property in the network, our maintenance method have more localized behavior. Our algorithm can be applied to any topologies with a VB structure, no matter what VB formation methods were used. And the complexity of proposed algorithm will not increase the complexity of VB formation methods. The simulation results on ns-2 demonstrate that our scheme outperforms other approaches in a dense and low mobility network environment in terms of packet consumption and number of involved nodes.
目次 Table of Contents
論文審定書 ii
致 謝 iii
摘 要 iv
Abstract v
圖次 x
表次 x
字母縮寫對照表 xi
第一章 導論
1.1 簡介 1
1.1.1 無線網路的通訊模式 3
1.1.2 IEEE 802.11定義的無線網路架構 7
1.2 無線隨意式網路背景與介紹 9
1.3 研究動機 12
1.4 論文架構 12
第二章 背景及相關研究
2.1虛擬骨幹的性質 13
2.2建立虛擬骨幹的好處與問題 16
2.3虛擬骨幹的建立 18
2.4虛擬骨幹的維護 19
第三章 系統之架構與運作
3.1 設計動機及方向 22
3.2 功能及名詞釋義 24
3.3 協定機制 25
3.3.1 網路模型 25
3.3.2 虛擬骨幹維護機制 26
3.3.3斷裂鏈結類型:(u.State, v.State)=(VB, VB) 27
3.4複雜度分析 32
第四章 模擬結果與討論
4.1 模擬工具介紹 33
4.2比較的其他方法 36
4.3 量測指標 37
4.4 模擬環境 38
4.5 數據分析與討論 39
第五章 結論 46
參考文獻 47
參考文獻 References
[1] K.M. Alzoubi, P.-J. Wan, and O. Frieder, “Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks,” in Proceedings of the ACM MobiHoc, pp. 157-164, June 2002.
[2] R. Asgarnezhad and J. A. Torkestani, “A Survey on Backbone Formation Algorithms for Wireless Sensor Networks (A New Classification),” Australasian Telecommunication Networks and Applications Conference (ATNAC), pp. 1-4, Nov. 2011.
[3] S. Basagni, M. Mastrogiovanni, A. Panconesi, and C. Petrioli, “Localized Protocols for Ad Hoc Clustering and Backbone Formation: A Performance Comparison,” IEEE Transactions on Parallel and Distributed Computing, vol. 17, no. 4, pp. 292-306, Apr. 2006.
[4] F. Dai, and J. Wu, “An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 10, pp. 908-920, Oct. 2004.
[5] F. Dai, and J. Wu, “On Constructing k-Connected k-Dominating Set in Wireless Networks,” in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symp. (IPDPS), pp. 81.1, Apr. 2005.
[6] L. Ding, X. Gao, W. Wu, W. Lee, X. Zhu and D.-Z. Du, “Distributed Construction of Connected Dominating Sets with Minimum Routing Cost in Wireless Network,” in the 30th International Conference on Distributed Computing Systems (ICDCS), pp. 448-457, June 2010.
[7] L. Ding, W. Wu, J. Willson, H. Du, W. Lee and D.-Z. Du, “Efficient Algorithms for Topology Control Problem with Routing Cost Constraints in Wireless Networks,” IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 22, no. 10, pp. 1601-1609, Oct. 2011.
[8] H. Du, Q. Ye, W. Wu, D. Li, D.-Z. Du and S. Howard, “Constant Approximation for Virtual Backbone Construction with Guaranteed Routing Cost in Wireless Sensor Networks,” in the 30th IEEE International Conference on Computer Communications (INFOCOM), pp. 1737-1744, Apr. 2011.
[9] Pervis Fly and Natarajan Meghanathan, “Predicted Link Expiration Time Based ConnectedDominating Sets for Mobile Ad hoc Networks,” International Journal on Computer Science and Engineering, vol. 2, no. 06, pp. 2096-2103, Nov. 2010.
[10] S. Funke, A. Kesselman and U. Meyer,“A Simple Improved Distributed Algorithm for Minimum CDS in Unit Disk Graphs,” ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 3, pp. 444-453, Aug. 2006.
[11] X. Gao, Y. Wang, X. Li and W. Wu, “Analysis on Theoretical Bounds for Approximating Dominating Set Problems,” Discrete Mathematics, Algorithms and Applications (DMAA), vol.1, no. 1, pp. 71-84, Jan. 2009.
[12] H. Kassaei, M. Mehrandish, L. Narayanan, and J. Opatmy, “Efficient algorithms for connected dominating sets in ad hoc networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), vol.1, no. 6, pp. 18-21, Apr. 2010.
[13] D. Kim, Y. Wu, Y. Li, F. Zou, and D.-Z. Du, “Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks,” IEEE Transactions on Parallel and Distributed Systems(TPDS), vol. 20, no. 2, pp. 147-157, Feb. 2009.
[14] S. Lee, B. Bhattacharjee, A. Srinivasan, and S. Khuller, “Efficient and resilient backbones for multihop wireless networks,” IEEE Transactions on Mobile Computing, vol. 7, no. 11, pp. 1349-1362, Nov. 2008.
[15] M. Li, P.-J. Wan and F. F. Yao,“Tighter Approximation Bounds for Minimum CDS in Wireless Ad Hoc Networks,” in Proceedings of the 20th International Symposium on Algorithms and Computation(ISAAC), vol. 5878, pp. 699-709, Jan. 2009.
[16] Y. Li, M.T. Thai, F. Wang, C.-W. Yi, P.-J. Wan, and D.-Z. Du, “On Greedy Construction of Connected Dominating Sets in Wireless Networks,” Wireless Comm. and Mobile Computing, vol. 5, no. 8, pp. 927-932, Dec. 2005.
[17] C.R. Lin, and M. Gerla, “Adaptive Clustering for Mobile Wireless Networks,” IEEE Journa on. Selected Areas in Communications, vol. 15, no. 7, pp. 1265-1275, Sep. 2006.
[18] N. Meghanathan, “Use of Minimum Node Velocity Based Stable Connected Dominating Sets for Mobile Ad hoc Networks,” IJCA Special Issue on MANETs, Vol 2, pp. 89-96, Feb. 2010.
[19] M. A. Nanni and S. Basagni, “M-Backs: Mobile backbones for multi-hop wireless networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pp.944-949, March 2011.
[20] F.G. Nocetti, J.S. Gonzalez, and I. Stojmenovic, “Connectivity Based k-Hop Clustering in Wireless Networks,” in Proceedings of the 35th Annual Hawaii International Conference, vol. 22, pp. 2450-2459, Jan. 2002.
[21] K. Sakai, S. C.-H Huang, W. S. Ku, M. T. Sun and X. Cheng, “Timer-Based CDS Construction in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 10, pp. 1388-1402, Oct. 2011.
[22] K. Sakai, F. Shen, K. M. Kim, M.-T. Sun, and H. Okada, “Multi-Initiator Connected Dominating Set for Mobile Ad Hoc Networks,” in Proceedings of International Conference on Communications (ICC), pp.2431-2436, May 2008.
[23] P.-R. Sheu, H.-Y. Tsai, Y.-P. Lee and J. Y. Cheng, “On Calculating Stable Connected Dominating Sets Based on Link Stability for Mobile Ad hoc Networks,” Tamkang Journal of Science and Engineering, vol. 12, no. 4, pp. 417 – 428, Jan. 2009.
[24] D. Simplot-Ryl, I. Stojmenovic, and J. Wu, “Energy-Efficient Backbone Construction, Broadcasting, and Area Coverage in Sensor Networks,” Handbook of Sensor Networks: Algorithms and Architectures, pp. 343-379, Sep. 2005.
[25] I. Stojmenovic, M. Seddigh, and J. Zunic, “Dominating Sets and Neighbor Elimination Based Broadcasting Algorithms in Wireless Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 13, no. 1, pp. 14-25, Jan. 2002.
[26] Peyman Teymoori and Nasser Yazdani, “Local Reconstruction of Virtual Backbone to Support Mobility in Wireless Ad Hoc Networks,” IEEE International Symposium on Telecommunication, pp.382-387, Aug. 2008.
[27] P. J. Wan, K. Alzoubi and O. Frieder, “Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks,” in Proceedings of the IEEE INFOCOM, vol. 3, pp. 1597-1604, June 2002.
[28] P.-J. Wan, L. Wang, F. Yao, and C.-W. Yi, “Two-Phased Approximation Algorithms for Minimum CDS in Wireless Ad Hoc Networks,” the 28th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 337-344, June 2008.
[29] J. Wu, F. Dai, and S. Yang, “Iterative local solutions for connected dominating set in ad hoc wireless networks,” IEEE Transactions on Computers, vol. 57, no. 5, pp. 702–715, May 2008.
[30] J. Wu, and H. Li, “On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks,” in Proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Comm. (DIALM), pp. 7-14, Aug. 1999.
[31] W. Wu, H. Du, X. Jia, Y. Li and S. Huang, “Minimum Connected Dominating Sets and Maximal Independent Sets in Unit Disk Graphs,” Theoretical Computer Science, vol. 352, pp.1-7, Mar. 2006.
[32] Y. Wu, and Y. Li, “Construction Algorithms for k-Connected m-Dominating Sets in Wireless Sensor Networks,” in Proceedings of the ACM MobiHoc, pp. 83-90, May 2008.
[33] Y. Wu, F. Wang, M.T. Thai, and Y. Li, “Constructing Algorithms for k-Connected m-Dominating Sets in Wireless Sensor Networks,” in Proceedings of the IEEE Military Comm. Conf. (MILCOM), pp. 29-31, Oct. 2007.
[34] H. Y. Yang, C. H. Lin and M. J. Tsai, “Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 7, no. 4, pp. 444-457, Apr. 2008.
[35] The UCB/LBNL/VINT Network Simulator-ns (Version 2). VINT Project. Available: http://www.isi.edu/nsnam/ns/
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外完全公開 unrestricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code