Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電信工程學研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55522
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor周俊廷(Chun-Ting Chou)
dc.contributor.authorI-Wu Luen
dc.contributor.author盧奕吾zh_TW
dc.date.accessioned2021-06-16T04:07:14Z-
dc.date.available2014-09-03
dc.date.copyright2014-09-03
dc.date.issued2014
dc.date.submitted2014-08-29
dc.identifier.citation[1] Wei Ye; Heidemann, J.; Estrin, D., “An energy-efficient MAC protocol for wireless sensor networks,” INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE , vol.3,
no., pp.1567,1576 vol.3, 2002 doi: 10.1109/INFCOM.2002.1019408
[2] Yessad, S.; Nai’t-Abdesselam, F.; Taleb, T.; Bensaou, B., “R-MAC: Reservation Medium Access Control Protocol for Wireless Sensor Networks,” Local Computer
Networks, 2007. LCN 2007. 32nd IEEE Conference on , vol., no., pp.719,724, 15-
18 Oct. 2007 doi: 10.1109/LCN.2007.159
[3] Tijs van Dam and Koen Langendoen. 2003. “An adaptive energy-efficient MAC
protocol for wireless sensor networks,” In Proceedings of the 1st international
conference on Embedded networked sensor systems (SenSys ’03). ACM, New
York, NY, USA, 171-180. doi: 10.1145/958491.958512
[4] Michael J. McGlynn and Steven A. Borbash. 2001. “Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks,” In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (MobiHoc ’01). ACM, New York, NY, USA, 137-145. DOI=10.1145/501431.501435
[5] Desheng Zhang, Tian He, Yunhuai Liu, Yu Gu, Fan Ye, Raghu K. Ganti, and
Hui Lei. 2012. “Acc: generic on-demand accelerations for neighbor discovery in mobile applications,” In Proceedings of the 10th ACM Conference on Embedded
Network Sensor Systems (SenSys ’12). ACM, New York, NY, USA, 169-182.
DOI=10.1145/2426656.2426674
[6] Zheng, Rong; Hou, Jennifer C.; Sha, Lui; , “Asynchronous wakeup for ad hoc networks” , MobiHoc ’03, Proceedings of the 4th ACM international symposium on Mobile ad hoc networking , pp. 35-45, 2003.
[7] Yu-Chee Tseng; Chih-Shun Hsu; Ten-Yueng Hsieh; , “Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks,” INFOCOM 2002. Twenty-
First Annual Joint Conference of the IEEE Computer and Communications So-
cieties. Proceedings. IEEE , vol.1, no., pp. 200- 209 vol.1, 2002 doi: 10.1109/IN-FCOM.2002.1019261
[8] J.-R. Jiang; Y.-C. Tseng; C.-S. Hsu; T.-H. Lai ; “Quorum-based asynchronous power-saving protocols for IEEE 802.11 ad hoc networks,” Mobile Networks and Applications, February 2005.
[9] Dutta, P.; Culler, D.; Shenker, S.; “Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time,” Information Processing in Sensor Networks, 2008. IPSN ’08. International Conference on , vol., no., pp.531-532, 22-24 April 2008 doi: 10.1109/IPSN.2008.60
[10] C. J. Colbourn and E. J. H. Dinitz. The CRC Handbook of Combinatorial Designs. CRC Press, 1996.
[11] Wai-Shing Luk; Tien-Tsin Wong; “Two new quorum based algorithms for distributed mutual exclusion,” Distributed Computing Systems, 1997., Proceedings of the 17th International Conference on , vol., no., pp.100-106, 27-30 May 1997. doi: 10.1109/ICDCS.1997.597862
[12] Nosovic, W.; Todd, T.D., “Scheduled rendezvous and RFID wakeup in embedded wireless networks,” Communications, 2002. ICC 2002. IEEE International Con-
ference on , vol.5, no., pp.3325,3329 vol.5, 2002 doi: 10.1109/ICC.2002.997447
[13] Arvind Kandhalu, Karthik Lakshmanan, and Ragunathan (Ra j) Ra jkumar. “U-connect: a low-latency energy-efficient asynchronous neighbor discovery protocol,” 2010 In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN ’10). ACM, New York, NY,
USA, 350-361. doi: 10.1145/1791212.1791253
[14] S. D. Lang and L. J. Mao. “A Torus Quorum Protocol for Distributed Mutual Exclusion,” Proc. of the 10th Conference on Parallel and Distributed Computing and Systems, pages 635638, 1998.
[15] Mamoru Maekawa. 1985. “A N algorithm for mutual exclusion in decen-
tralized systems,” ACM Trans. Comput. Syst. 3, 2 (May 1985), 145-159.
DOI=10.1145/214438.214445
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55522-
dc.description.abstractM2M communication is an enabling solution for many applications, including industrial control and smart buildings.
Take the temperature monitoring system for machinery in a factory as an example. The temperature sensors send back the readings to a central controller. The controller will shut down the system if the readings are over a predefined threshold.
In smart buildings, lighting control systems consist of different sensors such as light sensors and motion sensors. These sensors detect the behaviors of human beings and turn on/off the lights accordingly.
A common problem among the above applications is that many machines, especially the sensors, are usually battery-powered. Therefore, they have extremely limited energy budget. Given that it is also very inconvenient to replace or recharge the battery, how to maintain an M2M network in an energy-saving manner becomes a critical issue in the design of M2M networks. Turning the radio off whenever possible (i.e., duty cycling the machines) is one of the most common methods for energy management. Duty-cycle control, however, results in a longer latency of message dissemination. Although longer latency is not a serious problem for non-time critical messages such as regular temperature readings, it will lead to devastating results for time-critical messages such as fire alarms.
Most of the existing researches focused on minimizing the latency of non-time critical messages or time-critical messages seperatedly. A joint design to make tradeoff between the latency of these two types of messages is still missing. In this thesis, a set of specially designed sequences that control the duty cycle of machines is developed to make a better tradeoff. Our simulation results show that the end-to-end latency of time-critical messages is shortened by 13% to 42% depending on the duty cycle, while that of non-time critical message is only increased by less than 7%. The proposed solution is also implemented in an IEEE 802.15.4 network. The result shows that our sequences can prolong the lifetime of machines by 22% to 333% and reduce the end-to-end delay by 26%.
en
dc.description.provenanceMade available in DSpace on 2021-06-16T04:07:14Z (GMT). No. of bitstreams: 1
ntu-103-R01942113-1.pdf: 9828709 bytes, checksum: 4f19417240cc082dd2f4180d82d69110 (MD5)
Previous issue date: 2014
en
dc.description.tableofcontentsABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
CHAPTER 1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . 1
1.1 An introduction to the low duty-cycle M2M network . . . . . . . . . 1
1.2 Problems in low duty-cycle networks . . . . . . . . . . . . . . . . . . 3
1.3 Asynchronous approaches . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3.1 The tradeoff between minimizing the latency of non-time crit-
ical messages and time-critical messages . . . . . . . . . . . . 7
1.4 The ob jective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.5 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
CHAPTER 2 RELATED WORK . . . . . . . . . . . . . . . . . . . . . 10
2.1 Probabilistic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2 Deterministic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
CHAPTER 3 SYSTEM SETTINGS AND ASSUMPTIONS . . . . 16
3.1 Network topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.2 Node behaviors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.3 Message transmitted in this network . . . . . . . . . . . . . . . . . . 17
CHAPTER 4 THE PROPOSED SEQUENCE DESIGN . . . . . . . 18
4.1 Basic rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.2 Proposed sequence design . . . . . . . . . . . . . . . . . . . . . . . . 19
4.2.1 Where to start . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.2.2 Where to end . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.3 The generalization of alignment of slot boundaries . . . . . . . . . . 24
CHAPTER 5 SIMULATION RESULTS . . . . . . . . . . . . . . . . . 27
5.1 Simulation parameters . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.2 Simulation results and performance evaluation . . . . . . . . . . . . 29
5.2.1 Topology 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.2.2 Topology 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
CHAPTER 6 TEST BED . . . . . . . . . . . . . . . . . . . . . . . . . . 33
6.1 End nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.1.1 The packet format of hello messages . . . . . . . . . . . . . . 37
6.2 Sniffers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
6.3 The Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
6.4 Evaluation of the end-to-end delay . . . . . . . . . . . . . . . . . . . 41
6.5 Evaluation of the power saving performance . . . . . . . . . . . . . . 42
CHAPTER 7 CONCLUSIONS . . . . . . . . . . . . . . . . . . . . . . 44
dc.language.isoen
dc.subject機器對機器網路zh_TW
dc.subject時間嚴格的訊息傳輸zh_TW
dc.subject節電zh_TW
dc.subject非同步zh_TW
dc.subjectAsynchronous networken
dc.subjecttime-critical messagesen
dc.subjectpower saving protocolen
dc.subjectM2M networken
dc.subjectlow duty cycleen
dc.title低工作週期機器對機器網路中時間嚴格之信息傳輸zh_TW
dc.titleTransmission of Time-critical Messages in Low Duty-cycle Machine-to-machine networksen
dc.typeThesis
dc.date.schoolyear102-2
dc.description.degree碩士
dc.contributor.oralexamcommittee王晉良(Chin-Liang Wang),林宗男(Tsung-Nan Lin),黃仁竑(Ren-Hung Hwang)
dc.subject.keyword節電,機器對機器網路,非同步,時間嚴格的訊息傳輸,zh_TW
dc.subject.keywordAsynchronous network,low duty cycle,M2M network,power saving protocol,time-critical messages,en
dc.relation.page46
dc.rights.note有償授權
dc.date.accepted2014-08-29
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電信工程學研究所zh_TW
顯示於系所單位:電信工程學研究所

文件中的檔案:
檔案 大小格式 
ntu-103-1.pdf
  未授權公開取用
9.6 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved