請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55522
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 周俊廷(Chun-Ting Chou) | |
dc.contributor.author | I-Wu Lu | en |
dc.contributor.author | 盧奕吾 | zh_TW |
dc.date.accessioned | 2021-06-16T04:07:14Z | - |
dc.date.available | 2014-09-03 | |
dc.date.copyright | 2014-09-03 | |
dc.date.issued | 2014 | |
dc.date.submitted | 2014-08-29 | |
dc.identifier.citation | [1] Wei Ye; Heidemann, J.; Estrin, D., “An energy-efficient MAC protocol for wireless sensor networks,” INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE , vol.3,
no., pp.1567,1576 vol.3, 2002 doi: 10.1109/INFCOM.2002.1019408 [2] Yessad, S.; Nai’t-Abdesselam, F.; Taleb, T.; Bensaou, B., “R-MAC: Reservation Medium Access Control Protocol for Wireless Sensor Networks,” Local Computer Networks, 2007. LCN 2007. 32nd IEEE Conference on , vol., no., pp.719,724, 15- 18 Oct. 2007 doi: 10.1109/LCN.2007.159 [3] Tijs van Dam and Koen Langendoen. 2003. “An adaptive energy-efficient MAC protocol for wireless sensor networks,” In Proceedings of the 1st international conference on Embedded networked sensor systems (SenSys ’03). ACM, New York, NY, USA, 171-180. doi: 10.1145/958491.958512 [4] Michael J. McGlynn and Steven A. Borbash. 2001. “Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks,” In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (MobiHoc ’01). ACM, New York, NY, USA, 137-145. DOI=10.1145/501431.501435 [5] Desheng Zhang, Tian He, Yunhuai Liu, Yu Gu, Fan Ye, Raghu K. Ganti, and Hui Lei. 2012. “Acc: generic on-demand accelerations for neighbor discovery in mobile applications,” In Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (SenSys ’12). ACM, New York, NY, USA, 169-182. DOI=10.1145/2426656.2426674 [6] Zheng, Rong; Hou, Jennifer C.; Sha, Lui; , “Asynchronous wakeup for ad hoc networks” , MobiHoc ’03, Proceedings of the 4th ACM international symposium on Mobile ad hoc networking , pp. 35-45, 2003. [7] Yu-Chee Tseng; Chih-Shun Hsu; Ten-Yueng Hsieh; , “Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks,” INFOCOM 2002. Twenty- First Annual Joint Conference of the IEEE Computer and Communications So- cieties. Proceedings. IEEE , vol.1, no., pp. 200- 209 vol.1, 2002 doi: 10.1109/IN-FCOM.2002.1019261 [8] J.-R. Jiang; Y.-C. Tseng; C.-S. Hsu; T.-H. Lai ; “Quorum-based asynchronous power-saving protocols for IEEE 802.11 ad hoc networks,” Mobile Networks and Applications, February 2005. [9] Dutta, P.; Culler, D.; Shenker, S.; “Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time,” Information Processing in Sensor Networks, 2008. IPSN ’08. International Conference on , vol., no., pp.531-532, 22-24 April 2008 doi: 10.1109/IPSN.2008.60 [10] C. J. Colbourn and E. J. H. Dinitz. The CRC Handbook of Combinatorial Designs. CRC Press, 1996. [11] Wai-Shing Luk; Tien-Tsin Wong; “Two new quorum based algorithms for distributed mutual exclusion,” Distributed Computing Systems, 1997., Proceedings of the 17th International Conference on , vol., no., pp.100-106, 27-30 May 1997. doi: 10.1109/ICDCS.1997.597862 [12] Nosovic, W.; Todd, T.D., “Scheduled rendezvous and RFID wakeup in embedded wireless networks,” Communications, 2002. ICC 2002. IEEE International Con- ference on , vol.5, no., pp.3325,3329 vol.5, 2002 doi: 10.1109/ICC.2002.997447 [13] Arvind Kandhalu, Karthik Lakshmanan, and Ragunathan (Ra j) Ra jkumar. “U-connect: a low-latency energy-efficient asynchronous neighbor discovery protocol,” 2010 In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN ’10). ACM, New York, NY, USA, 350-361. doi: 10.1145/1791212.1791253 [14] S. D. Lang and L. J. Mao. “A Torus Quorum Protocol for Distributed Mutual Exclusion,” Proc. of the 10th Conference on Parallel and Distributed Computing and Systems, pages 635638, 1998. [15] Mamoru Maekawa. 1985. “A N algorithm for mutual exclusion in decen- tralized systems,” ACM Trans. Comput. Syst. 3, 2 (May 1985), 145-159. DOI=10.1145/214438.214445 | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55522 | - |
dc.description.abstract | M2M communication is an enabling solution for many applications, including industrial control and smart buildings.
Take the temperature monitoring system for machinery in a factory as an example. The temperature sensors send back the readings to a central controller. The controller will shut down the system if the readings are over a predefined threshold. In smart buildings, lighting control systems consist of different sensors such as light sensors and motion sensors. These sensors detect the behaviors of human beings and turn on/off the lights accordingly. A common problem among the above applications is that many machines, especially the sensors, are usually battery-powered. Therefore, they have extremely limited energy budget. Given that it is also very inconvenient to replace or recharge the battery, how to maintain an M2M network in an energy-saving manner becomes a critical issue in the design of M2M networks. Turning the radio off whenever possible (i.e., duty cycling the machines) is one of the most common methods for energy management. Duty-cycle control, however, results in a longer latency of message dissemination. Although longer latency is not a serious problem for non-time critical messages such as regular temperature readings, it will lead to devastating results for time-critical messages such as fire alarms. Most of the existing researches focused on minimizing the latency of non-time critical messages or time-critical messages seperatedly. A joint design to make tradeoff between the latency of these two types of messages is still missing. In this thesis, a set of specially designed sequences that control the duty cycle of machines is developed to make a better tradeoff. Our simulation results show that the end-to-end latency of time-critical messages is shortened by 13% to 42% depending on the duty cycle, while that of non-time critical message is only increased by less than 7%. The proposed solution is also implemented in an IEEE 802.15.4 network. The result shows that our sequences can prolong the lifetime of machines by 22% to 333% and reduce the end-to-end delay by 26%. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T04:07:14Z (GMT). No. of bitstreams: 1 ntu-103-R01942113-1.pdf: 9828709 bytes, checksum: 4f19417240cc082dd2f4180d82d69110 (MD5) Previous issue date: 2014 | en |
dc.description.tableofcontents | ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii CHAPTER 1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . 1 1.1 An introduction to the low duty-cycle M2M network . . . . . . . . . 1 1.2 Problems in low duty-cycle networks . . . . . . . . . . . . . . . . . . 3 1.3 Asynchronous approaches . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3.1 The tradeoff between minimizing the latency of non-time crit- ical messages and time-critical messages . . . . . . . . . . . . 7 1.4 The ob jective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.5 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 CHAPTER 2 RELATED WORK . . . . . . . . . . . . . . . . . . . . . 10 2.1 Probabilistic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2 Deterministic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 CHAPTER 3 SYSTEM SETTINGS AND ASSUMPTIONS . . . . 16 3.1 Network topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.2 Node behaviors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.3 Message transmitted in this network . . . . . . . . . . . . . . . . . . 17 CHAPTER 4 THE PROPOSED SEQUENCE DESIGN . . . . . . . 18 4.1 Basic rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 4.2 Proposed sequence design . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2.1 Where to start . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2.2 Where to end . . . . . . . . . . . . . . . . . . . . . . . . . . 20 4.3 The generalization of alignment of slot boundaries . . . . . . . . . . 24 CHAPTER 5 SIMULATION RESULTS . . . . . . . . . . . . . . . . . 27 5.1 Simulation parameters . . . . . . . . . . . . . . . . . . . . . . . . . . 27 5.2 Simulation results and performance evaluation . . . . . . . . . . . . 29 5.2.1 Topology 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 5.2.2 Topology 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 CHAPTER 6 TEST BED . . . . . . . . . . . . . . . . . . . . . . . . . . 33 6.1 End nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 6.1.1 The packet format of hello messages . . . . . . . . . . . . . . 37 6.2 Sniffers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 6.3 The Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 6.4 Evaluation of the end-to-end delay . . . . . . . . . . . . . . . . . . . 41 6.5 Evaluation of the power saving performance . . . . . . . . . . . . . . 42 CHAPTER 7 CONCLUSIONS . . . . . . . . . . . . . . . . . . . . . . 44 | |
dc.language.iso | en | |
dc.title | 低工作週期機器對機器網路中時間嚴格之信息傳輸 | zh_TW |
dc.title | Transmission of Time-critical Messages in Low Duty-cycle Machine-to-machine networks | en |
dc.type | Thesis | |
dc.date.schoolyear | 102-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 王晉良(Chin-Liang Wang),林宗男(Tsung-Nan Lin),黃仁竑(Ren-Hung Hwang) | |
dc.subject.keyword | 節電,機器對機器網路,非同步,時間嚴格的訊息傳輸, | zh_TW |
dc.subject.keyword | Asynchronous network,low duty cycle,M2M network,power saving protocol,time-critical messages, | en |
dc.relation.page | 46 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2014-08-29 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
顯示於系所單位: | 電信工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-103-1.pdf 目前未授權公開取用 | 9.6 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。