Multihop Routing In Self-Organizing Wireless Sensor Networks
第六讲 Ad Hoc网络
Ad Hoc网络的概念和特征
(2)自组织。Ad hoc网络相对常规通信网络而言, 最大的区别就是可以在任何时刻、任何地点不需要 现有信息基础网络设施(包一种体现形式。
(3)多跳路由。当节点要与其覆盖范围之外的节点 进行通信时,需要中间节点的多跳转发。与固定网 络的多跳不同,Ad hoc网络中的多跳路由是由普 通的网络节点完成的,而不是由专用的路由设备 (如路由器)完成。网络中的每一个网络节点扮演着 多个角色,它们可以是服务器、终端,也可以是路 由器。
Ad Hoc网络的概念和特征
(4)动态变化的网络拓扑结构。拓扑结构中代表移 动终端顶点的增加或消失,代表无线信道的有向边 的增加和消失,网络拓扑结构的分割和合并等等。
(5)移动终端的局限性。Ad hoc网络中,用户终端 通常以PDA(个人数字助理)、掌上型电脑或手持式 电脑为主要形式。相对于台式机而言,在带来移动 性、灵巧、轻便等好处的同时,其固有的特性,例 如依靠电池这样的可耗尽能源提供电源(车载终端 的电源相对而言较有保障)、内存较小、CPU性能 较低等,给Ad hoc网络环境下的网络协议和应用 程序设计开发带来一定的难度。
当网络的规模较小时,可以采用简单的平面 式结构;而当网络的规模增大时,应采用分 级结构。美军在其战术互联网中使用近期数 字电台NTDR(Near Term Digital Radio组 网时采用的就是如图c所示的双频分级结构。
三、移动Ad Hoc网络MAC协议
1、Ad Hoc MAC协议面临的问题
在分级结构的网络中,簇成员的功能比较简的一, 不需要维护复杂的路由信息,这大大减少了网络中 路由控制信息的数量,因此具有很好的可扩充性。 由于簇头结点可以随时选举产生,分级结构也具有 很强的抗毁性。分级结构的缺点是:维护分级结构 需要结点执行簇头选举算法,簇头结点可能会成为 网络的瓶胫。
多频段多系统MR合并,预测频率重耕后5G多频组网覆盖效果
I G I T C W技术 分析Technology Analysis54DIGITCW2024.020 引言移动通信网络普遍使用MR 测量进行网络覆盖评估,传统的MR 覆盖评估方法一般仅使用同频MR 数据,对单系统网络评估结果较为准确,但对于多频段多系统组网的网络,受不同频段及异系统互操作驻留策略影响,存在“幸存者偏差”问题,只能评估用户在当前网络上的覆盖水平,较高的驻留门限会导致覆盖评估结果不准确,不能呈现真实的网络覆盖情况。
此外,传统的方法只能评估已建成的网络,不能预测频率重耕后5G 多频组网下的覆盖情况,不能精准指导网络规划及建设。
针对传统MR 评估方法存在的问题,根据MR 测量原理,本文提出了一种基于多频段多系统的MR 测量(同频、异频、异系统)数据进行网络覆盖评估的方法,通过合并异频、异系统MR 测量数据,弥补驻留策略导致的MR 覆盖评估数据缺失的不足,可以对单一频率覆盖进行还原,有效避免了目前同频MR 覆盖评估存在的“幸存者偏差”问题,提高了网络覆盖评估准确性,并可以提前对频率重耕后的5G 多频组网覆盖效果进行预测,提供数据支撑网络规划与建设。
通过在中国联通L900M +L1800M 网络及5G 网络中按本方法进行评估并进行实测验证,实测结果基本与MR 评估结果一致,证明了本方法的准确性。
1 整体方案概述(1)通过采集L900M 同频MR 数据、L1800M 异频MR 测量L900M 数据,进行数据处理和栅格数据合作者简介:田 超(1978-),男,安徽马鞍山人,中级工程师,学士,主要从事无线网规划和建设工作。
戴 廷(1983-),男,江苏徐州市人,中级工程师,学士,主要从事无线网运营管理工作。
多频段多系统MR合并,预测频率重耕后5G多频组网覆盖效果田 超,戴 廷(中国联合网络通信有限公司安徽省分公司,安徽 合肥 230071)摘要:传统MR覆盖评估方法只能评估现网单系统网络的覆盖效果,无法评估频率重耕后的多频段网络覆盖效果,而且存在“幸存者偏差”问题,导致评估数据不完整。
爱默生智能无线网关-产品数据表说明书
Product Data SheetApril 201300813-0200-4420, Rev FA⏹Gateway connects wireless self-organizing networks with any host system ⏹Easy configuration and management of self-organizing networks⏹Easy integration into control systems and data applications through serial and Ethernet LAN connections⏹Seamless integration into AMS Device Manager and DeltaV™ automation system ⏹Greater than 99% reliability with industry proven security⏹Smart Wireless capabilities extends the full benefit of PlantWeb ® architecture to previously inaccessible locationsSmart Wireless GatewaySmart Wireless Gateway April 2013Emerson Smart Wireless GatewayGain real-time process information with greater than 99% wireless data reliability⏹The Smart Wireless Gateway automatically manages wireless communications in constantly changing environments⏹Native integration with DeltaV and Ovation automation systems provides simple and fast commissioning for wireless field networks⏹Connect to data historians, legacy host systems, and other via a LAN applications through Ethernet, Modbus, Serial, OPC, EtherNet/IP, and HART outputsGuarantee system availability withredundant Smart Wireless Gateways⏹Never lose the wireless network with hot standby capabilityand automatic fault detection⏹Smart Wireless Gateways function as a single system,eliminating the need for duplicate host integration⏹One click configuration and plug-and-play architectureComplete wireless network configuration toolsprovided with each Gateway⏹The integrated web interface allows easy configuration of thewireless network and data integration without the need to installadditional software⏹Complimentary AMS Wireless Configurator software providesEmerson Device Dashboards to configure devices and viewdiagnostic dataDrag and Drop device provisioning enables asecure method to add new wireless devices tothe wireless field networkContentsEmerson’s Smart Wireless Solution .. . . . . . . . . page3IEC 62591 (WirelessHART®)... The Industry Standard page3Ordering Information . . . . . . . . . . . . . . . . . . . . . page4Accessories and Spare parts . . . . . . . . . . . . . . . . page5 Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . page6 Product certifications . . . . . . . . . . . . . . . . . . . . . page8 Dimensional drawings . . . . . . . . . . . . . . . . . . . . . page9Smart Wireless Gateway April 2013Emerson’s Smart Wireless SolutionIEC 62591 (Wireless HART®)... The Industry StandardSelf-Organizing, Adaptive Mesh Routing⏹No wireless expertise required, network automatically finds the best communication paths⏹The self-organizing, self-healing network manages multiple communication paths for any given device. If an obstruction is introduced into the network, data will continue to flow because the device already has other established paths. The network will then lay in more communication paths as needed for that device.Reliable Wireless Architecture⏹Standard IEEE 802.15.4 radios⏹2.4 GHz ISM band sliced into 15 radio-channels⏹Time Synchronized Channel Hopping to avoid interference from other radios, WiFi, and EMC sources and increase reliability⏹Direct sequence spread spectrum (DSSS) technology delivers high reliability in challenging radio environment Emerson’s Smart WirelessSeamless Integration via a LAN to All Existing Host Systems ⏹Native integration into DeltaV and Ovation is transparent and seamless⏹Gateways interface with existing host systems via a LAN, using industry standard protocols including OPC, Modbus TCP/IP, Modbus RTU, and EtherNet/IPLayered Security Keeps Your Network Safe⏹Ensures that data transmissions are received only by the Smart Wireless Gateway⏹Network devices implement industry standard Encryption, Authentication, Verification, Anti-Jamming, and Key Management⏹Third party security verification including Achilles andFIPS197- User based login and enforced password strength. Password strength monitoring, user based log in, password reset requirements, automatic lockout, password expiration requirements. Based on guidelines from ISA99.03.03 standard approved level two. SmartPower™ Solutions⏹Optimized Emerson instrumentation, both hardware and software, to extend power module life⏹SmartPower technologies enable predictable power lifeSmart Wireless Gateway April 2013 Ordering InformationTable 1. Smart Wireless Gateway Ordering Information★ The Standard offering represents the most common options. The starred options (★) should be selected for best delivery.The Expanded offering is subject to additional delivery lead time.Model Product Description1420Smart Wireless GatewayPower InputStandard StandardA24 VDC Nominal (10.5-30 VDC)★Ethernet Communications - Physical ConnectionStandard Standard1(1)(2)Ethernet★2(3)(4)Dual Ethernet★Wireless Update Rate, Operating Frequency, and ProtocolStandard StandardA3User Configurable Update Rate, 2.4 GHz DSSS, Wireless HART★Serial Communication]Standard StandardN None★A(5)Modbus RTU via RS485★Ethernet Communication - Data ProtocolsStandard Standard2Webserver, Modbus TCP/IP, AMS Ready, HART-IP★4Webserver, Modbus TCP/IP, AMS Ready, HART-IP, OPC★5(6)DeltaV Ready★6(6)Ovation Ready ★8Webserver, EtherNet/IP, AMS Ready, HART-IP★9Webserver, EtherNet/IP, Modbus TCP/IP, AMS Ready, HART-IP★Options (Include with selected model number)Product CertificationsStandard StandardN5FM Division 2, Non-incendive★N6CSA Division 2, Non-incendive★N1ATEX Type n★ND ATEX Dust★N7IECEx Type n★NF IECEx Dust★KD FM & CSA Division 2, Non-incendive and ATEX Type n★N3China Type n★N4TIIS Type n★Redundancy OptionsStandard Standard RD(7)(8)(9)Gateway Redundancy★AdaptersStandard StandardJ1CM 20 Conduit Adapters★J2PG 13.5 Conduit Adapters★J33/4 NPT Conduit Adapters★Antenna Options(10)Standard Standard WL2Remote Antenna Kit, 50 ft. (15.2 m) cable, Lightning Arrestor★Smart Wireless GatewayApril 2013Accessories and Spare partsWL3Remote Antenna Kit, 20 ft. (6.1 m) and 30 ft. (9.1 m) cables, Lightning Arrestor ★WL4Remote Antenna Kit, 10 ft. (3.0 m) and 40 ft. (12.2 m) cables, Lightning Arrestor ★Expanded WN2(11)High-Gain, Remote Antenna Kit, 25 ft. (7.6m) cable, Lightning ArrestorTypical Model Number:1420A2A3 A 2 N5(1)Single active 10/100 baseT Ethernet port with RJ45 connector.(2)Additional ports disabled.(3)Dual active 10/100 baseT Ethernet ports with RJ45 connectors.(4)Multiple active ports have separate IP addresses, firewall isolation, and no packet forwarding.(5)Convertible to RS232 via adaptor, not included with Gateway.(6)Includes Webserver, Modbus TCP, AMS Ready, HART-IP, and OPC.(7)Requires the selection of Dual Ethernet option code 2.(8)Not available with DeltaV Ready option code 5.(9)Not available with EtherNet/IP option codes 8 and 9(10)The WL2, WL3, WL4, and WN2 options require minor assembly.(11)Not available in all countriesTable 1. Smart Wireless Gateway Ordering Information★ The Standard offering represents the most common options. The starred options (★) should be selected for best delivery.The Expanded offering is subject to additional delivery lead time. Table 2. AccessoriesItem DescriptionPart Number AMS® Wireless SNAP-ON™, 1 Gateway License 01420-1644-0001AMS Wireless SNAP-ON, 5 Gateway Licenses 01420-1644-0002AMS Wireless SNAP-ON, 10 Gateway Licenses 01420-1644-0003AMS Wireless SNAP-ON, 5-10 Upgrade Licenses 01420-1644-0004Serial Port HART Modem and Cables only 03095-5105-0001USB Port HART Modem and Cables only03095-5105-0002Table 3. Spare PartsItem DescriptionPart Number Spare Kit, WL2 Replacement (1), Remote Antenna, 50 ft. (15.2 m) Cable, and Lightning Arrestor01420-1615-0302Spare Kit, WL3 Replacement (1), Remote Antenna, 20/30 ft. (6.1/9.1 m) Cables, and Lightning Arrestor01420-1615-0303Spare Kit, WL4 Replacement (1), Remote Antenna, 10/40 ft. (3.0/12.2 m) Cables, and Lightning Arrestor 01420-1615-0304Spare Kit, WN2 Replacement (1), High Gain, Remote Antenna, 25 ft. (7.6 m) Cable, and Lightning Arrestor (2)01420-1615-0402(1)Can not upgrade from integral to remote antenna.(2)Not available in all countries.Smart Wireless GatewayApril 2013SpecificationsFunctional SpecificationsInput Power10.5 - 30 VDCCurrent DrawRadio Frequency Power Output from AntennaMaximum of 10 mW (10 dBm) EIRPMaximum of 40 mW (16 dBm) EIRP for WN2 High Gain optionEnvironmentalOperating Temperature Range: -40 to 158 °F (-40 to 70 °C)Operating Humidity Range: 10-90% relative humidityEMC PerformanceComplies with EN61326-1:2006.Antenna OptionsIntegrated Omnidirectional AntennaOptional remote mount Omnidirectional AntennaPhysical SpecificationsWeight10 lb (4.54 kg)Material of ConstructionHousingLow-copper aluminum, NEMA 4X PaintPolyurethaneCover GasketSilicone Rubber AntennaIntegrated Antenna: PBT/PC Remote Antenna: Fiber Glass CertificationsClass I Division 2 (U.S.)Equivalent WorldwideCommunication SpecificationsIsolated RS4852-wire communication link for Modbus RTU multidrop connectionsBaud rate: 57600, 38400, 19200, or 9600Protocol: Modbus RTUWiring: Single twisted shielded pair, 18 AWG. Wiring distance up to 4,000 ft. (1,524 m)Ethernet10/100base-TX Ethernet communication portProtocols: EtherNet/IP Modbus TCP, OPC, HART-IP, HTTPS (for Web Interface)Wiring: Cat5E shielded cable. Wiring distance 328 ft. (100 m).ModbusSupports Modbus RTU and Modbus TCP with 32-bit floating point values, integers, and scaled integers.Modbus Registers are user-specified.OPCOPC server supports OPC DA v2, v3EtherNet/IPSupports EtherNet/IP protocol with 32 bit Floating Point values and Integers.EtherNet/IP Assembly Input-Output instances are user configurable.EtherNet/IP specifications are managed and distributed by ODVA.Self-Organizing Network SpecificationsProtocolIEC 62591 (Wireless HART), 2.4 - 2.5 GHz DSSS.Maximum Network Size100 wireless devices @ 8 sec or higher.50 wireless devices @ 4 sec.25 wireless devices @ 2 sec.12 wireless devices @ 1 sec.Supported Device Update Rates1, 2, 4, 8, 16, 32 seconds or 1 - 60 minutesNetwork Size/Latency100 Devices: less than 10 sec.50 Devices: less than 5 sec.Data Reliability>99%C u r r e n t (m A )Operating Current Draw is based on 3.6 Watts average powerconsumption. Momentary startup Current Draw up to twice Operating Current Draw.Smart Wireless Gateway April 2013System Security SpecificationsEthernetSecure Sockets Layer (SSL)- enabled (default) TCP/IPcommunicationsSmart Wireless Gateway AccessRole-based Access Control (RBAC) including Administrator,Maintenance, Operator, and Executive. Administrator hascomplete control of the gateway and connections to hostsystems and the self-organizing network.Self-Organizing NetworkAES-128 Encrypted Wireless HART, including individual sessionkeys. Drag and Drop device provisioning, including unique joinkeys and white listing.Internal FirewallUser Configurable TCP ports for communications protocols,including Enable/Disable and user specified port numbers.Inspects both incoming and outgoing packets.Third Party CertificationWurldtech: Achilles Level 1 certified for network resiliency.National Institute of Standards and Technology (NIST):Advanced Encryption Standard (AES) Algorithm conforming toFederal Information Processing Standard Publication 197(FIPS-197)Smart Wireless Gateway April 2013 Product certificationsApproved Manufacturing LocationsRosemount Inc. – Chanhassen, Minnesota, USAEmerson Process Management GmbH & Co. - Karlstein, GermanyEmerson Process Management Asia Pacific Private Limited - SingaporeBeijing Rosemount Far East Instrument Co., Limited - Beijing, ChinaTelecommunication ComplianceAll wireless devices require certification to ensure that they adhere to regulations regarding the use of the RF spectrum. Nearly every country requires this type of product certification. Emerson is working with governmental agencies around the world to supply fully compliant products and remove the risk of violating country directives or laws governing wireless device usage.FCC and ICThis device complies with Part 15 of the FCC Rules. Operation is subject to the following conditions. This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operation. This device must be installed to ensure a minimum antenna separation distance of 20 cm from all persons. Ordinary Location Certification for FMAs standard, the Gateway has been examined and tested to determine that the design meets basic electrical, mechanical, and fire protection requirements by FM, a nationally recognized testing laboratory (NRTL) as accredited by the Federal Occupational Safety and Health Administration (OSHA).North American CertificationsN5FM Division 2, Non-IncendiveCertificate Number: 3028321Nonincendive for Class I, Division 2, Groups A, B, C, and D.Suitable for Class II, III, Division 1,Groups E, F, and G; Indoors/outdoor locations;Type 4XTemperature Code: T4 (-40 °C < T a < 60 °C)Canadian Standards Association (CSA)N6CSA Division 2, Non-IncendiveCertificate Number: 1849337Suitable for Class I, Division 2, Groups A, B, C, and D.Dust Ignition-proof for Class II, Groups E, F, and G;Suitable for Class III Hazardous Locations.;Install per Rosemount drawing 01420-1011.Temperature Code: T4 (-40 °C < T a < 60 °C)CSA Enclosure Type 4X European Union Directive InformationThe EC declaration of conformity for all applicable European directives for this product can be found on the Rosemount websiteat . A hard copy may be obtained by contacting your local sales representative.European CertificationN1ATEX Type nEx nA nL IIC T4 (-40 °C < T a< 60 °C)Special condition for safe use (X):The surface resistivity of the antenna is greater than onegigaohm. To avoid electrostatic charge build-up, it mustnot be rubbed or cleaned with solvents or a dry cloth.The Apparatus is not capable of withstanding the 500Vinsulation test required by Clause 9.4 of EN 60079-15:2005. This must be taken into account when installing the apparatus.ND ATEX DustCertificate Number: Baseefa 07ATEX0057Ex tD A 22 IP66 T135 (-40 °C < T a < 60 °C)Maximum working Voltage = 28 VN7IECEx Type nCertificate Number: IECEx BAS 07.0012XEx nA nL IIC T4 (-40 °C < T a < 60 °C)Maximum working voltage = 28 VSpecial condition for safe use (X):The surface resistivity of the antenna is greater than onegigaohm. To avoid electrostatic charge build-up, it mustnot be rubbed or cleaned with solvents or a dry cloth.The Apparatus is not capable of withstanding the 500 Vinsulation test required by Clause 9.4 of EN 60079-15:2005. This must be taken into account when installing the apparatus.NF IECEx DustCertification Number: IECEx BAS 07.0013Ex tD A22 IP66 T135 (-40 °C < T a < 60 °C)Maximum working voltage = 28 VCombinations of CertificationsKD Combination of N5, N6, and N1.Smart Wireless Gateway April 2013Dimensional drawingsFigure 1. Smart Wireless Gateway Dimensions are in inches (millimeters)Smart Wireless Gateway April 2013 Remote Antenna KitThe Remote Antenna kit includes sealant tape for remote antenna connection, as well as mounting brackets for the antenna, Lightning Arrestor, and the Smart Wireless Gateway.Lightning protection is included on all the options.*Note that the cables lengths on the remote antenna options WL3 and WL4 are interchangeable for installation convenience.Smart Wireless Gateway April 201311Standard Terms and Conditions of Sale can be found at \terms_of_sale The Emerson logo is a trade mark and service mark of Emerson Electric Co.Rosemount and the Rosemount logotype are registered trademarks of Rosemount Inc.PlantWeb is a registered trademark of one of the Emerson Process Management group of companies.HART and WirelessHART are registered trademarks of the HART Communication Foundation Modbus is a trademark of Modicon, Inc.All other marks are the property of their respective owners.© 2012 Rosemount Inc. All rights reserved.Emerson Process Management Rosemount Inc.8200 Market Boulevard Chanhassen, MN 55317 USA T (U.S.) 1-800-999-9307T (International) (952) 906-8888F (952) Emerson Process Management Blegistrasse 23P.O. Box 1046CH 6341 Baar Switzerland T +41 (0) 41 768 6111F +41 (0) 41 768 Emerson Process Management Asia Pacific Pte Ltd 1 Pandan Crescent Signapore 128461T +65 6777 8211F +65 6777 0947Service Support Hotline: +65 6770 8711Email:***************************.comSmart Wireless Gateway00813-0200-4420, Rev FAProduct Data Sheet April 2013Emerson Process Management Latin America 1300 Concord Terrace, Suite 400Sunrise Florida 33323 USA Tel + 1 954 846 5030。
物联网核心技术之新型无线网络技术
物联网核心技术之新型无线网络技术Wireless Mesh Network,中文名无线mesh网络, 别名“多跳(multi-hop)”网络,它是一种与传统无线网络完全不同的新型无线网络技术。
无线mesh网络,由mesh routers(路由器)和mesh clients(客户端)组成,其中mesh routers 构成骨干网络,并和有线的internet网相连接,负责为mesh clients提供多跳的无线网络连接。
在传统的无线局域网(WLAN)中,每个客户端均通过一条与AP(Access Point)相连的无线链路来访问网络,形成一个局部的BSS(Basic Service Set)。
用户如果要进行相互通信的话,必须首先访问一个固定的接入点(AP),这种网络结构被称为单跳网络。
而在无线Mesh网络中,任何无线设备节点都可以同时作为AP和路由器,网络中的每个节点都可以发送和接收信号,每个节点都可以与一个或者多个对等节点进行直接通信。
这种结构的最大好处在于:如果最近的AP由于流量过大而导致拥塞的话,那么数据可以自动重新路由到一个通信流量较小的邻近节点进行传输。
依此类推,数据包还可以根据网络的情况,继续路由到与之最近的下一个节点进行传输,直到到达最终目的地为止。
这样的访问方式就是多跳访问。
其实人们熟知的Internet就是一个Mesh网络的典型例子。
例如,当我们发送一份E-mail 时,电子邮件并不是直接到达收件人的信箱中,而是通过路由器从一个服务器转发到另外一个服务器,最后经过多次路由转发才到达用户的信箱。
在转发的过程中,路由器一般会选择效率最高的传输路径,以便使电子邮件能够尽快到达用户的信箱。
无线Mesh网络具有分布式网络所提供的冗余机制和重新路由功能。
在无线Mesh网络里,如果要添加新的设备,只需要简单地接上电源就可以了,它可以自动进行自我配置,并确定最佳的多跳传输路径。
添加或移动设备时,网络能够自动发现拓扑变化,并自动调整通信路由,以获取最有效的传输路径。
Ad hoc路由算法(文献综述)
Ad-hoc路由算法1 前言为满足信息社会对资源共享及信息传递的需求,计算机网络技术和无线通讯技术在近几十年得到了极大的发展。
20世纪50年代诞生的利用导线传输数据的有线网络经过几十年的发展,从双绞线、同轴电缆发展到如今的光纤通讯网络,网络的性能和覆盖范围虽然得到了很大的提升但是仍然无法满足人们在移动场景中对网络接入的需求。
在一些场合如抢险救灾、数字化战场、野外勘探及临时会议等场合无法快速高效的建立这常用无线网络,因此需要一种新型网络满足这些应用需求。
为满足在上述场合下快速高效组网的需求,无需基础设施的移动自组织网络(Mobile Ad-hoc Network)应用而生[2]。
Ad Hoc网络是一种不需要任何基站或固定基础设施的多跳无线网络,具有独立组网、自组织、动态拓扑、无约束移动、多跳路由等众多特点,能够快速地布设局部通信网络。
近年来,Ad Hoc网络研究得到了很大的发展,尤其是对网络路由协议的研究已经逐步成熟。
自二十世纪七十年代开始,由美国国防部所属的国防先进研究项目局推动了移动自组织网络方面最初的研究项目“战场环境中的数据包无线网络”(Packet Radio Networking),并在此后对多项相关研究进行支持。
最初由军方推动的移动自组织网主要应用在军事领域,然而随着微电子技术、嵌入式系统技术、无线通信技术等的发展和相关硬件成本的降低,移动自组织网络技术开始在民用领域推广[1]。
尤其在近十年,一些新技术与移动自组织网络的结合产生了许多新的研究热点如无线传感网络(Wirless Sensor Network)、车载自组网(Vehicular Ad hoc Network)、无线个人局域网(Wireless Personal Area Networks)以及无线Mesh网(Wireless Mesh Network)等[5]。
2 正文2.1、Ad-hoc网络的优点(1)无中心Ad hoc网络没有严格的控制中心。
Ad_Hoc_Network英文简介PPT教学课件
There is no central control node in this network, the hosts complete interconnection through a distributed protocol. Once one or more nodes of the network fails, the remaining nodes are still able to work properly .
hosts all through wireless transmission to
complete. Because of the physical characteristics
of the wireless channel, the network bandwidth is
much lower than the cable channel. In addition,
2020/12/12
3
❖ Ad Hoc network is a Multi-hop, no center, selforganizing wireless network,also known as Multi-hop Network(多跳网 ) Infrastructureless Network(无基础设施网 ) Self-organizing Network(自组织网)
??adhocnetworkisamultihopnocenterselforganizingwirelessnetworkalsoknownasmultihopnetwork多跳网infrastructurelessnetwork无基础设施网selforganizingnetwork自组织网selforganizingnetwork自组织网?adhocmodeisap2pconnectionitwillnotbeabletocommunicatewithothernetworksthewirelessterminal无线终端devicesuseadhocmodesuchasthepmppersonalmultimediaplayer个人多媒体播放器psppl体播放器pspplaystationportable掌上游戏机dmadirectmemoryaccess存储器直接访问控制器
无线网络信道建模及其参数估计
无线网络信道建模及其参数估计在现代无线通信领域,无线信道是一个十分关键的概念。
而建立和掌握无线信道模型是实现无线通信系统最基础和必要的一步。
具体来说,无线信道模型是对无线信号在传播过程中受到的各类干扰和衰减的描述,而无线信号的发射和接收都需要借助于信道模型。
因此对无线信道的建模及其参数估计具有非常重要的现实意义。
1. 无线信道建模一般地,对于无线信道,我们可以将其概括为两部分:一是多径信道,在信道中,一个信号可能存在多条不同的路径,在接收端信号总能量的分布形成“多径分布”;另一是干扰信号,信号在传到接收设备时,在传输过程中会受到多种干扰,如衍射、反射、多径、噪声等等,因此会出现信号混杂的情况。
针对上述情况,我们可以建立多种信道模型。
当然,根据实际情况的不同,会有多种不同的模型应用。
下面简单介绍几个代表模型。
1.1. AWGN信道模型AWGN即Additive White Gaussian Noise,也就是加性白高斯噪声信道。
该模型的基本假设就是:所传输的信号在各种环境干扰下,能以高斯分布表示的随机过程。
因此该模型是在平稳信道模型上加入了噪声信号的一个模型。
在无线通信信道中,由于大量的干扰和噪声都能够被用此模型来描述,也是在很多研究工作中用作基础模型。
1.2. Rayleigh信道模型Rayleigh信道模型是对于具有经典多径干扰情形的情况下进行建模的一种信道模型。
可以说Rayleigh信道模型是对多径效应的最基础描述。
其中,Rayleigh fading是单边指数衰落,而这种衰落也可以用及其干扰的形式得到体现。
Rayleigh信道模型是以高斯分布为基础进行推导的,这种模型可以被广泛应用于各种无线通信通道。
1.3. Rician信道模型另一个比较流行的信道模型是Rician信道模型。
这种信道模型假设在接收到主要路径之后,还会收到一个定向性指向同一个基准发射装置波束的反射波。
另一方面,Rician信道模型也可以描述在局部的直视链和多条反射路径的交汇处,导致接收信号中会有丰富的多径干扰的物理环境。
基于博弈论的多跳认知无线网络协作路由算法
基于博弈论的多跳认知无线网络协作路由算法刘觉夫;王建旭;王作航【摘要】For the problem of routing selection with selfish nodes in multi-hop cognitive radio network, a duplicate data forwar-ding cooperative game model was established based on evolutionary game theory, the effective incentive mechanism of selfish nodes was designed, which made the whole network reach the state that all nodes had good collaboration.On this basis, accor-ding to the different utility functions of primary and secondary users, a distributed multi-hop cognitive radio network cooperative routing algorithm was proposed.Results of simulation show that the algorithm can improve the throughput of the primary user effectively, increase the opportunity of secondary user accessing to the licensed spectrum.%针对存在自私节点的多跳认知无线网络路由选择问题,建立一个重复数据转发合作博弈模型,借鉴演化博弈理论,设计有效的自私节点激励机制,让整个网络达到拥有良好协作性的状态.根据主次用户不同的效用函数,提出一种分布式的多跳认知无线网络协作路由算法.仿真结果表明,该算法能有效提高主用户的吞吐量,增加次级用户使用授权频谱机会.【期刊名称】《计算机工程与设计》【年(卷),期】2017(038)005【总页数】7页(P1136-1141,1166)【关键词】认知无线网络;合作博弈;自私节点;激励机制;路由选择【作者】刘觉夫;王建旭;王作航【作者单位】华东交通大学信息工程学院,江西南昌 330013;华东交通大学信息工程学院,江西南昌 330013;华东交通大学信息工程学院,江西南昌 330013【正文语种】中文【中图分类】TP393FCC的研究报告指出,静态的分配策略是导致频谱资源利用率低下的重要原因[1]。
复杂动态网络的合作控制
:81/cnc/webpage/cooperative%20control.htm复杂动态网络的合作控制Cooperative Control of Complex Dynamic Networks⏹问题描述 Problem Description在过去的二十年中,网络和分布式计算的迅猛发展造就了从大型集成电路计算机到分布式网络工作站的一个跃变。
在工业应用中,我们期望能够应用许多价格低廉的小型设备之间的相互协调合作来替代原来造价昂贵,设计复杂的大型集成电路设备。
多智能体网络的分布式协调合作控制问题近年来引起了越来越多学者的关注,这主要归因于多智能体系统在各行各业的广泛应用,这其中包括无人驾驶飞行器的合作控制(UAVS), 形成控制(formation control), flocking, 群集(swarming), 分布式传感器网络(distributed sensor networks),卫星的姿态控制(attitude alignment of clusters of satellites), 以及通讯网络当中的拥塞控制(congestion control).⏹典型例子 Typical Examples☐Flocking在一个多智能体系统中,所有的智能体最终能够达到速度矢量相等,相互间的距离稳定,我们称为Flocking问题。
Flocking算法最早是由Reynolds在1986年提出。
当时为了在计算中模拟Flocking,他提出了三条基本法则: (1) separation;(2) cohesion;(3) alignment。
Vicsek于1995年提出并研究了Reynolds模型的一个简化模型。
在它的模型中,所有的主体保持相同的速度运行,这个仅仅体现了Reynolds算法中的alignment。
近年来,许多控制学者也在研究Flocking问题,他们通过构建微分方程组将Flocking问题进行抽象化,利用人工势能结合速度一致(consensus)的方法来实现Flocking算法。
无线多跳网络分簇协作路由算法谢鲲
小型微型计算机系统Journal of Chinese Computer Systems 2013年2月第2期Vol.34No.22013收稿日期:2011-08-24收修改稿日期:2011-10-28基金项目:国家自然科学基金项目(61003305,61070194)资助;博士点基金项目(20100161120022)资助;湖南省自然科学基金项目(11JJA003)资助;湖南大学“青年教师成长计划”项目资助.作者简介:谢鲲,女,1978年生,博士,博士后,副教授,CCF 会员,研究方向为无线网络与移动计算、可信系统与网络等;孙家奇,男,1985年生,硕士研究生,研究方向为无线网络、协作通信;龚闯,男,1985年生,硕士研究生,研究方向为无线网络;文吉刚,男,1978年生,博士,研究方向为无线网络、分布式计算、P2P 流媒体.无线多跳网络分簇协作路由算法谢鲲,孙家奇,龚闯,文吉刚(湖南大学信息科学与工程学院,长沙410082)E-mail :cskxie@gmail.com摘要:协作路由将物理层的协作通信技术和网络层的路由选择技术相结合是一种提高网络性能的跨层路由设计方案.现有的协作路由算法没有充分利用网络拓扑结构的特点,难以获得最优的协作路由.基于无线网络节点分布概况,提出一种分簇协作路由算法,以提高网络性能并增强网络的可靠性.该算法的分为三个阶段,簇的形成,簇间路由和簇内路由.算法的每个阶段都从节点分布对协作通信的影响出发优化协作路由设计,充分利用了无线网络中物理介质的广播优势和周围节点协作的优势.仿真结果表明,本文所提出的协作路由算法能够显著降低路由的中断概率,提高网络的可靠性.关键词:协作通信;分簇协作路由;无线多跳网络;协作分集中图分类号:TP393文献标识码:A文章编号:1000-1220(2013)02-0210-06A Cluster Cooperative Routing Algorithm in Wireless Multi-hop NetworksXIE Kun ,SUN Jia-qi ,GONG Chuang ,WEN Ji-gang(School of Information Science and Engineering ,Hunan University ,Changsha 410082,China )Abstract :Cooperative routing is a cross-layer routing design scheme which combines the physical layer cooperative communication tech-nology and the network layer routing technology to improve network performance.However ,the existing cooperative routing mechanism doesn't make good use of the characteristics of network topology and can hardly achieve optimal cooperative routing performance.Based on node distribution of the wireless multi-hop network ,this paper proposes a cluster cooperative routing algorithm to improve the trans-mission reliability.The algorithm includes three phases :the phase of cluster formation ,the phase of routing between clusters and the phase of routing in the cluster.To utilize the broadcast characteristics of wireless transmission and cooperative ability of neighbor nodes in wireless networks ,each phase in the algorithm takes the impact of node distribution on cooperative communication into consideration to optimize the algorithm design.Simulation results show that the proposed algorithm can significantly reduce the outage probability of the route ,increase the reliability of the network.Key words :cooperative communication ;cluster cooperative routing ;wireless multi-hop networks ;cooperative diversity1引言协作通信技术是一种物理层的无线通信技术,其实质是利用无线信号的广播特性,通过中继转发信号,并在接收端联合处理源信号和中继信号,使得接收端获得空间分集增益[1-3].换句话说,它是中继(即多跳)通信与直接通信并行融合的一种方案.它具有高分集增益和高能量效率的优点,不但能提高网络的吞吐量和可靠性,而且可以扩大网络的覆盖范围,被认为是增强无线通信系统性能的一项重要技术,越来越受到学术界的广泛关注.近年来,协作通信技术在物理层的优势已经被充分的探索和利用,但是,它在高层设计中产生的影响还没有被很好的理解和运用.协作路由是将物理层协作通信的思想运用到网络层的路由设计中,以提高网络性能的跨层路由设计方案.协作路由中,每个节点既作为数据源又协助其它节点转发数据包.即使在信道条件比较恶劣的情况下,协作路由仍然能够保证网络的高可靠性,保持良好的网络性能.现有的协作路由算法大多通过发现一条最短路径路由,然后在此最短路径的基础上建立一条协作路由.但最优的协作路由可能完全不同于最短路径路由,因此这些路由算法并没有充分利用协作通信在物理层的优势.另外,现有的大部分协作路由算法没有充分挖掘无线网络的节点分布、拓扑结构对协作路由算法的影响,没有根据这些网络特征对算法进行优化.虽然存在少数分布式协作路由算法,但是这些算法仍然存在路由效率低下,可扩展性差的缺点.作为挖掘网络节点分布和拓扑结构的路由算法,分簇路由的优点已经在无线传感器网络和Ad hoc 网络得到了广泛的证实[4].将分簇结构和协作路由相结合,设计无线多跳网络分簇协作路由算法,有利于提高无线多跳网络的稳定性和可靠性.以增加网络传输可靠性为目标,本文首次将分簇路由和协作路由结合,提出一种无线多跳网络分簇协作路由算法.该算法从节点分布对协作通信的影响的角度出发优化协作路由设计,以充分利用了无线网络中物理介质的广播的优势和周围节点的协作能力.该算法分为3个步骤:在分簇过程中,从最大化利用周围节点的协作能力出发来选举簇头,使得所选出的簇头周围有较多的邻居节点,从而可以使得簇头之间能最大化利用协作通信优化传输性能;寻找簇间路由时首先根据簇头之间的信道中断概率选择最小中断的路径,然后使用协作通信来进一步减少簇间路由的中断概率,提高传输可靠性;最后是根据协作节点的最优选择算法来确定簇内路由.仿真结果表明,该算法能够显著降低路由的中断概率,提高网络的可靠性.2相关研究工作由于节点间的信道状态差或者网络比较繁忙,数据包可能会丢失.而在无线网络中,由于无线信道的物理特性(信道传播的开放性、信道参数的时变性以及无线多径衰落等)使得无线信道更加的不稳定,数据包丢失的现象更加严重,最终导致网络性能的急剧下降甚至网络的崩溃.协作路由是联合物理层协作通信技术和网络层路由选择的跨层路由方案,网络中的节点可以作为数据源直接产生和发送数据包,也可以协助其它节点转发数据包,这样即使在信道条件比较恶劣的情况下仍然能够保证网络的高可靠性,保持良好的网络性能.协作路由作为探索协作通信技术在路由设计中的一种尝试,已越来越引起研究人员的重视.文献[5]中Khandani等通过动态规划的方法寻找最优的协作路由,证明能量节省的协作路由是NP难问题,提出了CAN-L(cooperation along the minimum energy non-cooperative path)和PC-L(progressive cooperation)两种集中式的启发式算法,并仿真证实了非协作路径上采用协作策略后传输能量效率的改善.Li等则证明了最小能量路由是NP完全问题,提出了协作最短路径(cooperative shortest path)算法的次优方案[6],Li的算法要求任何节点的通信范围覆盖所有的节点,这在实际的无线网络中几乎是不可能的.文献[7]提出了一种Ad hoc网络中中继选择的协作路由算法,该算法利用网络的路由包获得信道的信息,通过计算从候选中继集合中选择出一个最佳中继转发数据,并且在网络层通过跨层方法自适应地调整重传次数以达到减小时延的目的.文献[8]研究仅根据平局信号状态信息(CSI)的情况下,如何设计逐跳路由策略以减少端到端的协作路由传输中断率.文献[9]研究了无线传感器网络中协作通信对于最大化网络寿命的影响.文献[10]考虑了三种协作路由算法:洪泛中继路由、辅助中继路由和增强型中继路由.在洪泛中继路由中,信息通过洪泛和多跳的方式进行传播.辅助中继路由利用现有路由中的协作节点进行数据的传输,而增强型中继路由则向现有的路由中增加协作节点.这些路由模式都是以一条没有协作的确定性的路由开始的.为了找到一条在总功率约束下的从源节点到目标节点的最短传输时延路由,文献[11]提出一种迭代的线性规划的方法.基于节点分层的网络模型,文献[12]研究最小化端到端中断率的协作路由,提出了不同的路由选择策略.文献[13]研究多流情况下联合协作节点分配和协作路由的最优化问题,将这个问题进行数学建模成mixed integer linear program(MILP)问题,并提出了基于branch-and-cut解法.文献[14]则提出了一种基于协作的最小功率分布式协作路由算法(MPCR),该算法每一跳只有一个协作节点,它在建立最小功率路由的过程中充分利用了协作通信的优势.文献[15]提出一种竞争相关的协作路由指标,基于该指标设计无线多跳网络的协作路由算法.文献[16]在协作传输最优功率分配的基础上,提出了分布式分离路由和功率分配算法,与分布式联合路由和功率分配算法两种算法.通过分析现有的协作路由算法,我们发现大部分协作路由算法首先寻找一条最短路径路由,然后再在此最短路由的基础上建立协作路由.因为最短路径路由不一定就是最优的协作路由,所以这些路由算法并没有充分利用协作通信在物理层的优势.研究表明,采用传统的最短路径准则设计无线多跳网络的路由协议已不足以构造良好的路由,即传输延时、吞吐量和可靠性等性能无法达到理想的指标.原因在于最短路径准则没有考虑到其下层物理信道特性的变化对MAC层接入性能的影响等因素,造成所选路径无法适应底层性能的变化,也可能造成传输层性能的较大波动.此外,就无线信道的特点而言,即使信道环境在通信期间没有产生变化,最短路径也未必意味着最优路径.而且,我们还发现大部分的路由算法没有充分挖掘无线网络的节点分布、无线网络拓扑结构对路由算法的影响,很少根据拓扑结构对算法进行优化.虽然有研究提出过一些分布式协作路由算法,但是这些算法仍然存在路由效率低下,可扩展性差的缺点.作为挖掘网络结构的路由算法,分簇路由的优点已经在无线传感器网络和Ad hoc网络得到了广泛的证实[4],并具有下述优点,1)采用基于簇的路由可以减少参与路由计算的节点数目和路由表尺寸,从而降低交换路由信息所需的通信开销和维护路由表所需的内存开销,可扩展性较好;2)簇头融合了成员节点的数据之后再进行转发,减少了数据通信量,从而节省了网络能量;3)分簇拓扑结构便于管理,有利于分布式算法的应用,可以对系统变化作出快速反应,具有较好的可扩展性,适合于大规模网络.因此,将分簇结构和协作路由相结合,设计无线多跳网络分簇协作路由算法,有利于提高无线多跳网络的性能,增强可靠性.但是,挑战在于,如何将分簇路由和协作路由结合,来设计分簇的多跳无线网络协作路由?3协作通信协议和性能指标协作通信的目的就是充分利用网络中的节点资源来帮助有通信需求的节点进行高速、可靠的通信,保证网络性能的稳定性和可靠性.其中的一个关键点在于中继节点对于从源节点接收到的信号如何进行处理.不同的处理方案会导致不同的协作通信协议,这里我们只考虑在网络中只能有一个中继节点帮助用户即信源节点转发信息的情形,如下页图1是一个典型的单点中继协作模型,它分为两个独立的阶段:在第一个阶段中,源节点将信息发送到目标节点,与此同时信息也会被中继节点接收到.在第二阶段中继可以帮助信源节点转发1122期谢鲲等:无线多跳网络分簇协作路由算法或者重传信息到目标节点.协作通信协议一般分为固定中继和自适应中继两种模式.在固定中继模式下,信道资源以一种确定性的方式在源节点和中继节点之间进行分配.在放大转发的协作模式中,中继图1协作通信模型Fig.1Cooperative communication model节点只是简单地将接收到的信号进行放大,然后将其发送到目标节点.另外一种处理方式是中继节点将接收到的信号进行解码,重新编码之后再转发给接收节点,这种方式称为解码转发中继协议.固定中继模式具有容易布署的优点,不足之处是带宽效率低.这是因为信道资源的一半被分配给中继节点用于传输,降低了源节点的发送速率.这个问题在当源节点和目标节点之间信道状况比较好的情况下尤为突出,因为在这种情况下源节点到目标节点的包传输成功率大大增加,此时中继节点的传输就显得没有必要,浪费了宝贵的带宽资源.自适应中继技术尝试去解决这个问题,现有的自适应中继技术包括了选择性中继和增量中继.在选择性中继模式中,转发节点根据信道条件采取自适应的转发策略,只有当中继节点接收到信号的信噪比超过一定的门限值的时候,中继节点才会转发其从信源节点所接收到的信息至接收端.另一方面,如果源节点和中继节点之间的信道严重衰落使得信噪比低于门限值,那么中继节点就不再执行任何操作,此时系统等同于非协作系统.在固定中继和选择性中继两种协作通信协议中,由于转发节点重发信源节点所发送的信息,导致系统的带宽资源被浪费.增量中继协作通信策略能够利用从接收端所提供的反馈信息来提高系统的带宽利用率,从目标节点到源节点和中继节点分别有一条反馈信道,如果信源节点收到接收端已经正确接收到信息的反馈,中继节点就不需要再重发信息;否则,中继节点便将其从信源节点所接收到的信息转发至接收端.不同的通信协议,其中断概率性能也各不相同.从信息论的观点来看,当信道状况无法支持数据以速率R可靠传输的时候,即信道的交互信息量I小于实际的传输速率R的时候,就会发生中断事件.中断概率就是指中断事件发生的概率,可以用P r[I<R]表示.如果链路信道发生中断,就认为数据丢失.假设任意的信道衰落模型都是瑞利衰落模型,那么由文献[14],节点i和j之间的链路(i,j)的中断概率可以表示为Pout =1-exp-(2R-1)Ndαi,j()P(1)这里P是信号传输功率,R代表传输速率,d i,j是节点i和j之间的距离,α是路径损耗指数,N0是噪声变量,Pd-αi,j|h|2N代表信噪比,|h|2代表信道系数.而对于协作传输模式,总的中断概率则为P Ox,y,z=1-exp(-gdαx,z)-exp(-g(dαx,y+dαy,z))+exp(-g(dαx,y+dαy,z+dαx,z))(2)这里g=(2R C-1)NP C,其中R C代表每个时隙的协作传输速率,P C代表协作传输功率,N0仍然是噪声变量,d x,y,d y,z,dx,z分别为发送节点和协作节点,协作节点和接收节点,发送节点和接收节点之间的距离,α是路径损耗指数.文献[17]的研究结果表明,增量中继、选择性中继、固定中继几种协作通信策略的性能依次递减.如图2显示的是不同的中继协议中信道的中断概率性能与信噪比的比较的情况.从图2中可以看出,在信噪比相同的情况下,增量中继模式的中断概率最小,而且随着信噪比的增大,中断概率也会相应地下降.图2不同协作通信协议中的中断概率比较Fig.2Outage probability comparison of differentcooperative communication protocol由以上分析可知,和其他几种协作通信协议相比,增量中继协作通信策略拥有最好的中断概率性能,比其他中继协议有更高的频谱效率,并且实现了二阶分集增益,而中断概率是评价通信系统性能和可靠性的一项重要指标.因此在本文中采用增量中继的模式作为信道的协作通信协议.4系统模型和问题描述考虑一个由多个网络接入节点AP(Access Point)组成的固定的无线网络,多个AP通过无线相连形成无线多跳网络.其中一个或多个AP通过有线连接到因特网,作为网关GN (Gateway Node)和中心控制器.接入方式为TDMA(Time Divi-sion Multiple Access),各节点间的数据传输是帧同步的,一帧由若干时隙组成.假设所有AP均为单射频,发射功率相同,且工作在瑞利平坦慢衰落信道下的OFDM(Orthogonal Fre-quency Division Multiplexing)系统,每个节点配备一副全向天线,工作在半双工模式,一个节点发出的信息能够被其所有邻居节点在很短的时间内收到.每个节点都具有唯一的ID,在网络初始化时,每个节点可以通过交互控制信息知道邻居节点的信息.上述网络可以用图G=(V,E)来表示,其中V为顶点集,E为边集.节点Vi∈V代表AP i.(i,j)对应节点i和j之间的链路,每个节点的发射功率都相同.对于任意的一个源目标节点对(S,D),以中断概率为性能指标,我们的目标是找到一条从S到D的中断概率最小的路径,保证网络的高可靠性.212小型微型计算机系统2013年对于一个给定的源目标对,用Ω代表可能的路由集合,对于其中的一条路径w ∈Ω,使用w i 代表路径的第i 跳,Pr out wi表示该跳的中断概率.定义路径中断概率最大一跳数值(这个数值限制了整条路径的中断概率)代表该路径的中断概率值,即Pr w =max Pr outwi(w i ∈w ,ηωi ≥η0)(3)这里ηw i 是第i 跳信道信噪比,η0是信噪比的期望最低门限值,ηw i ≥η0用以保证每跳链路的最低信噪比,从而确保每跳都能达到最基本的传输可靠性.并用路径的中断概率评估路由传输的可靠性.我们的目标是找到所有可能的路径中中断概率值最小的那条路径.本文的问题可以形式化表示为min w ∈Ω[max Pr out w i](ηw i ≥η0)(4)5算法设计在进行具体算法设计之前,我们首先进行协作路由设计分析,以确定本文分簇协作路由的设计思路.如图3所示,S 要发数据包到D ,比较三条路由,一条是从S →4→3→D ,一条是从S →1→2→3→D ,最后一条是S →5→1→15→2→8→3→D.虽然第一条是从S 到D 的最短路径,但是在第一条路由中,没有充足的协作节点,将无法利用协作通信技术提高网络性能;在第二条路由中,每一跳都有协作节点存在,如果走第二条路,可以利用协作通信技术来提高网络性能;在第三条路由中,每跳虽然只需要极少的功率,但是由于每跳没有充裕的协作节点,也无法利用协作通信技术提高网络性能.因此,在无线多跳网络中研究协作路由,无线网络拓扑结构、协作节点的分布密度将直接影响协作通信技术可以提高无线多跳网络性能的程度.现有的协作路由算法没有充分挖掘无线网络的节点分布,仍然存在路由效率低下,可扩展性差的缺点,而本文将立足节点的分布来设计优化的协作路由方案.现有的利用节点分布的路由方案中,分簇路由机制具有低计算量高可扩展性的优点[4]而使其在无线传感网和Ad hoc 网络中得以广泛应用.图3协作路由Fig.3Cooperativerouting图4无线多跳网络分簇协作路由Fig.4A cluster cooperative routing in wireless multi-hopnetworks 图5簇的形成Fig.5Formation ofclusters为了降低路由选择的复杂性,本文将无线多跳网络进行分簇处理,在保证每个簇头周围有足够多的协作资源(如协作的邻居节点)情况下,寻找中断概率最小的协作路径,如图4所示.具体思路如下:为了利用无线网络的广播特点,在路由设计中最大化协作通信能力,本文所设计的分簇协作路由算法分为三个阶段:第一阶段最大化利用周围节点进行协作通信能力为目的来选择簇头节点,完成分簇路由的簇形成;第二阶段是利用协作通信来寻找路径中断概率最小化的簇间路由;第三阶段是基于最优协作节点选择算法来设计簇内路由.5.1簇的形成在基于分簇的结构中,节点分为两种类型:普通节点和簇头节点.位于同一簇的簇头节点和普通节点共同维护簇内部的路由信息,这里簇头节点负责和其它簇头节点交换所辖簇的拓扑信息.这样就可以通过减少参与路由计算的节点数目来减少路由的开销,同时也减少了拓扑结构的变化对网络的影响.我们在簇头选举的过程中综合考虑了三种因素:节点度数、节点的传输功率和节点的可用剩余带宽,并且各因素的权重因子可以根据系统的要求进行动态调整.因为若簇头节点旁有足够多的邻居节点可进行数据转发,则其邻居节点可以当做协作通信的中继节点来提高簇头之间数据传输性能.在这里,为了使簇头节点有足够的邻居节点进行数据的协作转发,我们给予节点度数较大的权重来选择簇头节点.簇头形成原理如图5所示,具体流程如下:1)通过周期性交互Hello 信息,每个节点可以确定各自的邻居节点数作为它的节点度数D ,每个节点计算其到所有邻居节点的距离之和P n ,可用剩余带宽B n ;2)然后每个节点计算组合权值I n =aD n +bB n -cP n 其中a ,b ,c 为权重因子,a +b +c =1.每个节点将得到的I n 和节点ID 放在周期性的Hello 信息中向邻居节点广播.3)相邻节点中具有最大I n 值的节点作为簇头,簇头向所有节点广播自己身份确认的消息,收到消息的节点通过广播一个分簇消息宣布自己是该簇的成员节点,这里我们采用一个节点可以同时属于多个相邻簇的交叠的分簇结构.4)重复以上步骤,直到所有的节点属于某个簇,分簇完成.5)分簇稳定之后,簇头之间发送Hello 消息广播,簇头收集到其它簇的簇头信息之后形成簇间拓扑,这样簇形成阶段结束.5.2簇间路由分簇形成之后,当某个簇内的节点S 有要发送到目标簇中节点D 的数据时,发送节点需要首先寻找簇间路由,即该图6簇间路由Fig.6Routing between clusters信息要经过哪几个簇进行转发.簇间协作路由如图6(直线代表直接传输,虚线代表协作传输)所示.3122期谢鲲等:无线多跳网络分簇协作路由算法在进行簇间路由设计时,为了简化设计难度,同时有效的利用协作通信技术优化传输性能,我们将簇间路由选择算法分为2个步骤:1)簇间基准路径选择a)发送节点所在簇的簇头首先根据分簇阶段形成的簇间拓扑信息找到所有到目标簇头的路径;b)然后在每条路径上使用公式(1)计算每条路径中相邻两个簇头节点之间信道的中断概率;c)最后按照公式(3)确定每条路径的中断概率值,选取中断概率值最小的那条路径(这里假设A→B→C为所选取的路径);2)协作通信优化簇间路由a)在选取的簇间基准路径上A→B→C确定每一跳可用于传输的备选协作节点,如A→B的通信半径重叠区域的节点,该区域的节点可以同时接收到A的信号和B的反馈信号;b)簇头之间可以采用直接传输和协作传输两种传输方式.因为根据公式(1)和公式(2),不能直接判断协作传输模式是否优于直接传输模式,因此在簇间路由过程要最小化传输中断率,需要确定簇间路由的传输模式.对于多个备选协作节点,分别使用公式(1)和公式(2)计算出的簇头之间直接传输和使用该节点协作传输模式下的中断概率,以中断概率最小值作为两个簇头节点之间传输信道的中断概率,并确定簇头之间的传输模式(如果最小权值对应的是一个特定的中继节点,那么就在这一跳使用这个节点协作传输,否则就使用直接传输模式.)经过上述步骤簇头形成一条从源簇头节点到目标簇头节点的簇间路由信息,并储存到簇间路由表中.5.3簇内路由在确定簇间路由后,当源节点S向目标节点D传输数据时,还需要设计算法确定簇内路由,如图7所示.传输源节点S需要通过簇内路由将数据从S传输到对应簇头节点A.簇头节点C也需要通过簇内路由将数据从簇头节点C传输到目的节点D.簇内路由也可以采用两种传输模式,由于簇内有图7簇内路由Fig.7Routing in a cluster多个可用于辅助从S到A的备选中继节点,因此簇内路由选择过程是协作节点的最优选择过程,具体如下:发送节点(如S)首先通过公式(1)计算出到簇头节点(如A)采用直接传输模式时的中断概率,通过公式(2)计算出不同协作节点作为中继协作传输时的中断概率,比较计算结果,如果最小中断概率对应一个特定的中继节点,就使用这个节点作为中继协作转发数据(虚线表示协作传输),否则使用直接传输;分簇协作路由算法由于采用了分簇的网络结构,节点只需在簇内维护完整的路由信息,簇间的路由信息由簇头负责进行维护,这样就减少了节点间交换路由信息所需的通信开销和内存开销,采用协作传输技术则提高了带宽的利用效率,增加了网络的可靠性.6仿真实验实验设定的仿真环境如下:网络拓扑的范围为200mˑ200m的仿真区域,节点随机地分布在网络区域中.假设任意两个节点之间的信道是瑞利平坦慢衰落信道,信道系数是0均值,方差为1的独立同分布的循环对称复高斯随机变量.数据速率都设为R=2Mbit/s,噪声变量设为-70dbm,路径损耗指数设为2,功率分配系数为0.5,即协作模式下源节点和中继节点平分发射功率.在仿真中,我们将本文设计的分簇协作路由算法和未分簇的协作路由算法进行比较.分簇协作路由算法则是按照第五节算法设计中所描述的:首先对节点进行分簇,分簇完成之后首先在确定的簇头之间找到一条簇间路由,然后在源节点所在的簇和目标节点所在的簇对使用单点中继的协作传输和直接传输两种模式下的中断概率值进行比较,确定中断概率值较小的传输方式同时也确定数据传输的最终路径.未分簇的协作路由算法首先遍历所有从源节点到目标节点的路径,按照公式(3)和公式(4)的原则确定一条非协作模式下的中断概率值最小的路径,然后在这条路径上的每一跳使用公式(1)和公式(2)计算采用直接传输方式时和协作传输方式时的中断概率值,比较两个值的大小并选择概率值较小的传输方式直到最终路径确定.如图8中给出了未分簇的协作路由算法和分簇的协作路由算法的最大中断概率性能对比图.这里的最大中断概率是指路由中所有链路中断概率最大的那个值,因为整条路径的中断概率值由单跳路径的最大中断概率确定.图8最大中断概率性能Fig.8Performance of maximum outage probability从图中可以看出,在节点个数较少的情况下,分簇协作路由算法的性能优势并不明显,这是因为在节点个数较少的时候簇头节点和未分簇时相比并没有很多可选的中继节点来帮助它协作传输数据.但是随着网络中节点个数的增多,本文提出的分簇协作路由算法的中断概率性能优势有了显著的提升.因为未分簇的协作路由算法无法对网络规模逐渐增大的情况做出很好的反应,而且不能充分利用邻居节点进行协作通信,传输可靠性较低;而分簇协作路由算法不仅可以在节点增多的情况下可412小型微型计算机系统2013年。
multilayernetwork 使用 和 训练
multilayernetwork 使用和训练
多层网络是一种深度学习模型,由多个节点层组成,各层之间通过连接权重进行信息传递。
每个节点接收上一层的输出并通过激活函数进行非线性转换后输出到下一层。
多层网络可以用于各种任务,如图像分类、自然语言处理等。
使用多层网络可以通过以下步骤:
1. 定义网络结构:确定网络的层数和每层的节点数。
选择适当的激活函数以及其他超参数。
2. 初始化参数:对网络的连接权重和偏置进行初始化,可以使用随机初始化方法。
3. 前向传播:将输入数据输入到网络中,通过多层的计算得到输出值。
4. 计算损失:将网络的输出与实际的标签进行比较,计算损失函数的值。
5. 反向传播:根据损失函数的值,计算每个参数对损失的梯度,并根据梯度更新参数。
6. 重复步骤3至5,直到达到停止条件或训练次数。
训练多层网络可以使用梯度下降算法或其变种进行优化。
常用的优化算法包括随机梯度下降(SGD)、动量法、Adam等。
在训练过程中,可以使用批量训练或小批量训练的方式进行参数更新。
为了提高多层网络的泛化能力,还可以采用一些正则化技术,如L1、L2正则化、dropout等。
此外,还可以使用交叉验证、
早停法等技术进行模型选择和调优。
训练多层网络可能需要大量的计算资源和时间,特别是在深层网络中。
因此,通常使用图形处理器(GPU)进行并行计算来加速训练过程。
OLSR协议基本原理
TC分组格式
Message Seq. No:TC 分组序列号。用来识别是否为重复接收的TC分组 MSSN:MPR Selector 序列号。与MPR Selector 集合相对应,当MPR Selector 集合有变化时,MSSN 随之更新。 Hop Count:跳数。TC分组转发的最大跳数,当为“0”时,不再转发。 Originator Address:生成该TC分组的节点地址。 Reserved:保留字节。必为“000000000000000000000000”。 MPR Selector Address:多点中继选择节点地址。该字段包含节点的多点中继选择节点的地址列表。
1
OLSR 协 议 简 介
*
1
自组网应用
1
OLSR 协 议 简 介
*
1
OLSR协议
1
OLSR 协 议 简 介
*
最优链路状态路由协议(Optimized Link State Routing) 特点: 多点中继节点(MPR)机制,优化泛洪算法,降低了协议的开销; 先应式路由计算,查找路由时延小; 最短路径,路由计算选择最短路径作为最优路径。
MPR Selector 表格式
1
2
OLSR 协 议 内 容
*
2.3.3 拓扑表
网络中的每一个节点维护一张拓扑表,记录从TC分组中得到的拓扑信息,并由此信息计算路由。节点将网络中其他节点的多点中继信息作为拓扑条目记录在拓扑表中。
拓扑条目格式
此条目说明了T_dest已经选择T_last作为MPR,而且T_last已经发布了序列号为T_seq的MPR Selector 集信息。T_time作为保持时间,过期就删除该条目。
基于帕累托解的无线Mesh网络多QoS遗传自适应路由(IJCNIS-V10-N9-1)
I. J. Computer Network and Information Security, 2018, 9, 1-9Published Online September 2018 in MECS (/)DOI: 10.5815/ijcnis.2018.09.01A Multi QoS Genetic-based Adaptive Routing in Wireless Mesh Networks with Pareto SolutionsIbraheem Kasim IbraheemDepartment of Electrical Engineering, Baghdad University, Baghdad, IraqE-mail: ibraheemki@.iqAlyaa Abdul-Hussain Al-HussainyDepartment of Electrical Engineering, Baghdad University, Baghdad, IraqE-mail: alyaaalhussainy79@Received: 26 January 2018; Accepted: 16 July 2018; Published: 08 September 2018Abstract—Wireless Mesh Networks(WMN) is an active research topic for wireless networks designers and researchers. Routing has been studied in the last two decades in the field of optimization due to various applications in WMN. In this paper, Adaptive Genetic Algorithm (AGA) for identifying the shortest path in WMN satisfying multi- QoS measure is introduced. The proposed algorithm is adaptive in the sense that it uses various selection methods during the reproduction process and the one with the best multi- QoS measure is adopted in that generation. The multi-objective QoS measure defined as the combination of the minimum number of hops, minimum delay, and maximum bandwidth. The multi-objective optimization has been formulated and solved using weighted sum approach with Pareto optimal solution techniques. The simulation experiments have been carried out in MATLAB environment with a wireless network modeled as weighted graph of fifty nodes and node coverage equals to 200 meter, and the outcomes demonstrated that the proposed AGA performs well and finds the shortest route of the WMN proficiently, rapidly, and adapts to the dynamic nature of the wireless network and satisfying all of the constraints and objective measures imposed on the networks.Index Terms—Quality-of-Service (QoS), wireless routing, end-to-end delay, network bandwidth, wireless mesh networks, number of hops.I.I NTRODUCTIONThe routing in multi-hop mobile networks has been considered one of the outstanding design matters, which significantly affects their attainable achievement. Subsequently, proficient routing methods ought to be intended for guaranteeing that the information packets proliferate in an "ideal" way regarding a few measures, for example, packet loss ratio, defer-jitter, delay, and bandwidth. All the preferred goals are improved all together in the conventional multi-hop mobile networks. However, in certain commonsense applications, to find the different solutions, each of which is ideal regarding an individual QoS measure might be superior to finding a solitary worthy arrangement, which incurs a balance among a few different variables [1]. A few Shortest Path (SP) search algorithms like Bellman-Ford and Dijkstra perform successfully for settled framework wireless or wired networks. In any case, they experience the ill effects of high computational complexities in networks with quickly changing topology as well as system status. Classically, SP routing problem has been formulated to combinatorial optimization that seeks to find the single best solution in one run. Routing in mobile networks involves simultaneous optimization of multiple QoS parameters such as the delay, the bandwidth, hops number, losses, etc. These objectives compete and conflict with each other. Such competition among conflicting objectives gives rise to a set of optimal solutions instead of a single solution [2].This paper is organized as follows. Related work is presented in section II. Section III introduces a concise introduction to the GA. Multi-Objective optimization and Pareto Solutions are reviewed in section IV. In section V, a detailed description of the proposed AGA for routing in WMN is presented and discussed. The effectiveness of our proposed algorithm and the discussion of the simulation results are given in section VI. Finally, the conclusions are mentioned in section VII.II.R ELATED W ORKSMany works have been focused on routing in WMN. In [3], authors Proposed a multi-objective traffic engineering procedure utilizing various distribution trees to several multicasting flows. The purpose is to combine into a single united measure the bandwidth, hop count, supreme link utilization, and total delay. The work in [4] studied the performance of several algorithms for multi-objective Pareto optimization. These algorithms were tested on a set of standard benchmark problems. Where in [5] researchers proposed a novel technique for resembling the Pareto front of a Multi-Objective Optimization (MOOP) problem, where explicit forms of the objectivefunctions are not available. The method iteratively approximates each objective function using a meta-modeling scheme and employs a weighted sum method to convert the MOOP into a set of single objective optimization problems. A new alternate for the routing problem in WMN has been presented, which considers the QoS measure [6]. The actual case study includes several design objectives which conflict with each other. The new approach is tried to improve the routing solutions and proposes the use of Multi-Objective Evolutionary Algorithms (MOEA), specifically the Nondominated Sorting GA (NSGA). A mathematical model is introduced for this problem, which includes QoS parameters such as bandwidth, packet loss rates, and delay and power consumption. Jitter mechanisms can dramatically improve reactive routing protocols, in [7], jitter mechanisms are proposed which enforce wireless nodes to postpone their transmission for a random amount of time so as to reduce probability of simultaneous transmission. The work in [8] proposed a centralized MultiPAth QoS-driven Routing (MPAR) protocol for industrial WMN which included the end-to-end reliability requirements of the available paths. On the other hand, stability of wireless mesh networks is an important issue; instability in these networks is caused mainly by link quality fluctuations and frequent route flapping.Authors in [9] addressed the stability problem of wireless mesh networks. A routing protocol which applied Software Defined Networks (SDN ) to multi-hop wireless network has been studied in [10]. The proposed protocol is implemented using OPNET simulation. For Hybrid WMNs, [11] proposed a load-aware cooperative hybrid routing protocol (LA-CHRP). This protocol is not only adapted to cover the peculiarities of routers and clients, but also considers load in routing. GA-based Multi-Path QoS Routing (MPQR) scheme is proposed for Polar-orbit Low earth orbit satellite networks [12].An extensive research has been accomplished on routing in mobile Ad hoc networks (MANET) [13]–[18], where a work utilizing GA and multi-objective optimization for QoS Routing in Wireless Ad-hoc Networks was proposed in [13]. To limit the searching field of the GA, a technique for reducing the searching has been implemented, which reduced the search space to find a new route. In [14] the target was to provide a stable routing protocol with high efficiency for these kinds of networks, by improving the DSR routing protocol. To tackle the shortcomings of the existing routing protocols, authors in [15] have proposed a new trust based on-demand routing protocol that can adapt to the specific energy conditions of nodes in a MANET. It uses the concept of fidelity which varies depending on packet drops. Since Mobile Ad-hoc Network is mostly decentralized and self-adjustable network system. It is significant to optimize the overall network energy utilization and improve packet sending performance. By introducing m-minimum (membership value as m) triangular fuzzy number at interval based cost and energy of the network, [16] to handle the atmospheric, environmental change and varying distance for topological change. They generated both fuzzy minimum spanning tree (FMST) for a given n- nodes network and p-node fuzzy multicast minimum spanning tree (pFMMST), in fuzzy interval based format and concluded that, pFMMST is better FMST based packet routing approach. The work in [17] presented, relative experimental analysis of proactive routing protocols, Optimized Link State Routing Protocol (OLSR) and its variant with Cooperative Multi-Point Relay (MPR) Selection on Network Simulator NS - 2.35 to carry out numerous simulations, on arbitrary scenarios, by varying the number of network nodes & mobility of nodes. The work in [18] utilized GA to identify an optimal reliable ordered routing paths between source and destination nodes in mobile Ad hoc networks. In [19], authors developed a new energy efficient routing protocol using Fuzzy logic inspired by Ant Colony Optimization (ACO). Performance Evaluation of AODV, DSDV, OLSR Routing Protocols using NS-3 Simulator has been achieved in [20].The work presented in this paper is an extension for our previous works in [21]–[24]. In this paper, a new approach called Adaptive Genetic Algorithm (AGA) has been proposed by implementing the reproduction process with variable selection methods. The algorithm called adaptive because it chooses the selection method adaptively according to the best value of the fitness function that each of the six selections methods produces. Then the proposed Adaptive GA has been applied to obtain the shortest route in wireless networks where the nodes of the wireless networks are mobile with time.III.A G ENETIC A LGORITHMS (GA)GAs are an evolutionary optimization approach, they are especially appropriate for applications which are vast, nonlinear and potentially discrete in nature. In GA, a population of strings called chromosomes (or individuals) which represent the candidate solutions to an optimization problem is evolved to the better population. It is more common to state the objective of GA as the minimization of some cost function rather than the maximization of some utility or fitness function[25],F(t) = 11+f(t)(1)where f(t) is the cost function to be maximized. While the fitness is set to F(t) = f(t) when the problem needs f(t) to be minimized. GA consists of main three steps, these are: selection process, crossover, and mutation. The Selection process refers to the mechanism of choosing a set of chromosomes from the population that will contribute to the creation of the offsprings for the next generation [26]. Many methods have been proposed for mate selection in the literature, some of the important methods are described in our previous works [24], [27], these include Roulette Wheel Selection (RWS), Tournament selection (TS), Rank selection (RS), Steady-state selection (SSS),Sigma scaling selection (SigSS) and Boltzmann selection (BS). On the other hand, crossover operation, or mating, is the creation of one or more offspring from the parents selected in the pairing process. The final step of the GA is the mutation operator, it is another way of the GA to investigate the cost-surface and it can introduce individualities that never exists in the principal population and preserve the GA from converging too fast before searching the complete cost-surface [28], [29]. Fig.1. WS is unable to generate the Non-convex Part of the Pareto Front IV.P ARETO A PPROACH FOR M ULTI-OBJECTIVEO PTIMIZATIONFor sound-organized mathematical problems, the weighted sum (WS) strategy achieves well and has decent scientific properties, for example, convergence. Nonetheless, the WS technique cannot create any point in the non-convex region of the Pareto front as illustrated in Fig.1. Point C, D, and E are not on the Pareto frontier because it is dominated by both point A and point B. Points A and B are not strictly dominated by any other, and hence do lie on the frontier. Additionally, WS technique may copy solutions with various weighting factors [5].The second general approach for multi-objective optimization is to find whole Pareto optimal solutions or a typical subset. A Pareto optimal solution is a set of solutions that are non-dominated with each other. While traveling from one Pareto solution onto the next, there must be a sacrifice in one of the objective(s) to accomplish a specific improvement in the other(s) [30]–[32]. Genetic algorithms (GAs) work with a population of points, a number of Pareto-optimal solutions may be captured using GAs. A new algorithm called Nondominated Sorting Genetic Algorithm (NSGA) is presented in this work. This algorithm eliminates the bias in Vector Evaluated Genetic Algorithm (VEGA) [31], [32] and thereby distributes the population over the entire Pareto-optimal regions [33], [34]. In this work three objectives: an end-to-end delay, bandwidth, and a number of hops will be utilized as multi-objective measures using NSGA algorithm to test their convergence through the generations of the GA.Definition1[35]: A solution x(1) is said to dominate the other solution x(2) if both conditions 1 and 2 are true:1.The solution x(1)is no worse than x(2)in allobjectives: that is,f j(x(1))⋫f i(x(2)) for all j= 1, 2, 3, …., M2.The solution x (1) is strictly less than x (2) in at leastone objective, orf j̅(x(1))⊲f j̅(x(2)) for at least one j̅ ∈{1,2,…..,M} Operator ⊲ between two solutions i and j as ⊲to denote that solution i is better than solution j on a particular objective. Similarly, i⊳j for a particular objective implies that solution i is worse than solution j on this objective. If either of the above conditions is violated, the solution x(1) does not dominate the solution x(2). If x(1) dominates the solution x(2)(or mathematically x(1)≼x(2)), it is also customary to write any of the following:•x(2) is dominated by x(2),•x(1)is non-dominated by x(2), or x(1)is non-inferior to x(2)The set of all feasible solutions that are non-dominated by any other solution is called the Pareto- optimal or non-dominated set. If the non-dominated set is within the entire feasible search space, it is called globally Pareto-optimal set. In other words, for a given MOOP, the Pareto-optimal set P ∗, is defined as:P∗={x ∈ Ω|¬∃ x ′ ∈ Ω ⇒f(x ′ )≤ f(x)}The values of objective functions related to each solution of a Pareto-optimal set in objective space are called Pareto-front. In another word for a given MOOP, f(x), and Pareto-optimal set, PF ∗, the Pareto front( PF ∗) is given by:PF∗ = {u = f(x)| x ∈ P∗}V.T HE P ROPOSED AGA F OR R OUTING I N WMNA Dynamic network under consideration represented as a connected graph with N nodes. The metric of optimization is the multi objective QoS (delay, bandwidth, no.of hops) of a path. The goal is to find the path with minimum total delay, maximum bandwidth, and minimum no. of hops as QoS between source node s and destination node d. The details of the algorithm are given in the following; while the investigation of the performance is achieved via a simulation work in the next section. Our contribution in this work lies in two points: the first is that the proposed algorithm deals with dynamic topology network where nodes are mobile, and the second contribution is t he adaptive selection method used in the proposed AGA with proposedselectionmethods deals with 6 selection criteria, each generation is obtained using one selection method with best fitness. The proposed AGA consists of the following steps:A.Priority-Based EncodingWhen utilizing GA based routing in wireless networks, each candidate solution called a chromosome. The chromosome consists of sequences of positive integers that represent the IDentification (ID) of nodes through which a routing path passes. Each locus of the chromosome represents an order of a node in a routing path. A certain gene in a specific chromosome is described by the variables: allele, the value for that gene, and loci, the gene’s position. The gene’s position is utilized to characterize a node, while the priority for that node for developing a path from competitors is represented by the value of the gene. This strategy is signified as Priority Based Encoding as illustrated below (see Fig. 2).Fig.2. Representation of Priority based EncodingB.RepresentationIn this case-study, the wireless routing scheme is represented as the GA chromosome. A route list interprets the routing chromosome, such as P = (P1, P2…, P k), which characterizes the complete network. Every route is a particular path between the source and destination nodes i and j. A route is coded by concatenating the nodes from the start node to the target node depending on the network topology. For example, a route starting from node number one to node number fifty can be denoted as a node vector along the route: {1, 2, 4, 12, 34, 50}, see Fig. 3. If a route cannot be achieved on the network, it cannot be coded into the chromosome.Fig.3. Example of Routing Path and its Encoding SchemeC.Initial PopulationsThis underlying procedure is utilized to create the routing table in the present generation. Every chromosome incorporates an arbitrary routing table for the particular topology of the mobile network under study.D.Multi-Objective OptimizationDifferent QoS criteria characterize routing in mobile wireless meshed networks, some of these criteria are a number of hops, an end-to-end delay, and bandwidth which are adopted in this work. Clearly, it can be fit into multi-objective optimization. In this work, we propose the design of a Multi-Objective GA (MOGA) through the Weighted Sum (WS) approach. This method is used in MOGA to attain the above three objectives through a single-objective measure by utilizing the convex combination of the design measures. Minimizing the fitness function means minimization of the weighted sum function F given by the following formula:F=α1F1+α2F2+α3F3 (2) Where F1, F́2, and F3 are the delay, the bandwidth, and the number of hops, given by,F1=min Delay(P(s ,d)) (3) F̅2=max Bandwidth(P(s ,d)) (4)F2(t) = 11+F̅2(5)F3= min Hop(P(s ,d)) (6) Subject toDelay(P(s ,d))<=DmaxBandwidth(P(s ,d))>=BminHops(P(s ,d))<=Hopsmaxwhere P(s ,d)=P1,……..P n, is the collection of all the potential routes from source node s to destination node d, where a certain source-node s∈V and destination-node d∈V, V is the network nodes set (vertices), Delay(P(s ,d))=∑Delay(V) is the total delay along the entire path P1,……..P n, Bandwidth(P(s ,d))= max Bandwidth(V) is the maximum bandwidth along the entire path P1,……..P n, Hops(P(s ,d))=∑Hops(V) is the total number of hops along the entire path P1,……..P n, Dmax represents the maximum limit on end-to-end delay along each path, Bmin represents the lower bound on the acceptable bandwidth along each path from a source s to the destination d, Hopsmax represents the upper bound on the acceptable number of hops along every route from the start s to the terminating node d. the weights α1, α2, α3 are understood as the relative importance of one objective function relative to the others. The values of α1, α2, α3 are selected to increase the selection weight on any of the three objectives, such that,∑αi=1ni=1(7)E.Proposed Selection ProcessSelection is an operator to select two (i.e., routing tables) for generating new chromosomes. To be selected as a parent chromosome, the chromosomes are competing each other during selection process based on thefitnessvalue. Each chromosome has its fitness value calculated according to (2), more explanations on different selection operators used in this work can be found in our previous works [24], [27]. A chromosome with a high fitness value (i.e. minimum cost) subject to the delay, maximum bandwidth, and minimum number of hops has more chance to be selected as one of the parents using one of the six selection methods that had the minimum fitness value.F.Path CrossoverTo carry out the crossover operator, the chromosomes must have the same start and target nodes. The points in the chromosomes are constrained to the nodes that are common in both chromosomes. The most common and the simplest form of crossover is single point crossover.A crossover site is randomly selected on both chromosomes and exchanging the sub-routes when carrying out this operator to both chromosomes as depicted in Fig. 4.Fig.4. An Example of Single Point Crossover Selecting node number 11 as a cross-node results in the child pair of chromosomes given as P1’ and P2’. The Procedure of the path crossover can be summarized in the following:1.Create list of nodes NC which exist in both P1 andP2(excluding source s and destination d nodes) as possible a cross-point.2.From the list NC, pick a certain node i as a cross-point.3.Exchange all the nodes for the parent chromosomesbeyond the cross-point i to achieve the crossover process.G.Path MutationThe operator of the route mutation means generating another chromosome from the chromosome. To apply the mutation operator, firstly a single node is arbitrarily chosen from each chromosome, it is denoted the mutation’s site. At that point, another node is arbitrarily chosen from the set of nodes that are directly connected to the mutation site. In accordance with the shortest path problem, a second path is determined through linking starting node to chosen mutation node and from the chosen node to target node. As illustrated in Fig. 5, where the offspring P' signifies the route obtained by the mutation operator. The path mutation operator procedure is described as follows: 1.From all nodes in parent P, randomly pick a node ias a mutation node.2.From the neighbors (B) of the mutation node i,select a node j ∈ B.3.Create two paths r1 and r2 with shortest distance,the first (r1) from the mutation node j to the sourcenode (s) and the second(r2) from the destination node (d) to node j.4.If nodes replication occurs between shortest paths(r1 and r2), cancel the paths and stop mutation, elsejoin the path to create a mutation node.Fig.5. An example of MutationVI.M AIN R ESULTSIn this section the simulation results of applying Adaptive Genetic Algorithm (AGA) on path routing in mobile wireless networks for triple objectives are presented. AGA has two features. First it is adaptive with the dynamic topology of the wireless network nodes, second the proposed AGA uses a new technique in the selection operator, selection of proper parents to produced new individuals, it uses six selection methods working simultaneously, and the fitness value for each selection method is calculated; depending upon the best value of the fitness, we choose the selection method which gives best parents to produce new offsprings. The proposed algorithm applied on multi objectives of QoS measures, measuring all of the three objectives together, i.e. end-to-end delay, bandwidth, and the number of hops, the results are presented using weighted-sum approach with the aid of Pareto analysis.A network model is obtained by G (V, E), where G is a graph and V is the collection of the nodes of the network, and E is the collection of the connected linked edges. The simulation network parameters are chosen as follows: Number of nodes = 50, as shown in Fig. 6. Topology-area: Nodes are distributed randomly on 1000*1000 m2, the area of the node coverage equals to 200 m, node 1 is the source node (s), while the destination node (d) is node 50. Population size equals to 50, selection method used in this project are {RS, SSS, BS, RWS, SigSS, TS}, number of generations equals to 100, the crossover probability equals is Pc = 0.75, mutation probability is Pm = 0.01. We have fifty routes from s to d, and each route has a fitness number depends on its delay, bandwidth, and number of hops from s to d. We have to find oneoptimum path among the fifty paths (50 paths) availablewith minimum delay, maximum bandwidth, and minimum no. of hops. The values of α1, α2, α3 are 0.5, 0.15, 0.35 respectively. The values of the fitness functions with each selection technique are represented by their minimum and maximum values, as illustrated in Table 1. They are applied at the same time. Our experiment concerns about the maximum value of the path bandwidths, minimum values of end-to-end path delays, and minimum path hops.Fig.6. The Network Model of 50 NodesTable 1. Selection Method of Multi-Objectives QoSThe outcomes of implementing our proposed AGA are illustrated as next, the shortest path from the starting node s to the destination node d was {1 24 26 46 50} as depicted in Fig. 7. The end-to-end delay was {8 msec}, bandwidth was 1.9932 Mbps and a number of hops was 4. The best fitness value was (10.2968) resulted from selection method 3, namely, the SSS selection method. Therefore, the SSS selection method gives the best fitness. Fig. 8 showed the variation of the fitness values during iterations of the AGA. Additional results for the multi-objective QoS experiment were presented in Figs. 9 and 10, where Fig. 9 shows the values of the QoS parameters of some paths, P1, P2, P3, P4. It can be concluded that P4 is the best optimum path among them. Fig. 10 showed the fitness values for the multi-objective QoS for various paths, P1, P2, P3, P4knowing that path four P4is the optimum path. To solve multi-objective optimization using AGA with Pareto solution approach, two main goals must be attained. The first goal is to converge to a set of the solution as close as possible to true Pareto-optimal set, and the second goal is the diversity in the obtained Pareto-optimal set. With a more diverse set ofsolutions that covers all parts of the Pareto-front in objective space, the decision making the process at thenext level using the higher level information is easier.The diversity in the two-dimensional space is often symmetric, however in three -dimensional space (threeobjectives problem) and the non-linear problem thediversity is more difficult to obtain. Fig.11 (a) illustrated the Pareto optimal solutions of the three objectivesoptimization, where f(x1), f(x2), f(x3) represent an end-to-end delay, bandwidth, and a number of hops respectively. The population size was 50 and the number ofgenerations were 100, 200, 4000, and 10000. Thediversity and the convergence of the Pareto solutions were very obvious.The weighted-sum approachrepresented the Pareto solution to the multi-objectiveoptimization; this was clear from Fig. 12.There are fifty potential paths from the starting node sto the destination node d as an initial population. Sixdifferent selection methods are used in every generation in the suggested AGA. The extreme values of the fitnessfunction are computed using these measures and are listed in Table 1. The best selection method is chosen forwhich the fitness function is the lowest because our workis of minimization type. The algorithm is ended when a maximum number of generations reached which isconsidered to be 100. From the above simulations, it canbe seen that with the optimum path P4, the bandwidth is less than in the remaining paths, this is true because ofthe weighting factors that the WS approach adopts, where the weight α2=0.15 has been used for optimizing the bandwidth. On the other hand, the end-to-end delay andthe minimum number of hops in the optimum path P4 were less than from the other paths, this is due to the highvalues of the weighting factors that have been used to optimize these objectives (α1=0.5 for the delay,α3= 0.35 for the number of hops). To discuss how the WS approach can represent the Pareto Solutions, we proceed as follows, the general formula of the WS approach to MOGA is represented by (2). The values of α1, α2, α3 arechosen to increase the selection pressure on any of the two objective functions. In order to represent the Pareto technique, the weights α1, α2, α3 play a key role in this process. Which can take random values. So the WS approach can almost represents all solutions as shown in Figure 12. In this Figure, the poin, ts in red color represent the solution produced by letting α1, α2, α3 take values of 0.5, 0.15,0.35 respectively, which are used in our design. The other points of blue color represent random values of α1, α2, α3. The total (red and blue) points represent the Pareto solutions. We conclude that the weighed-sum solution is a part of the whole possible Pareto solutions. Finally, When the results obtained from this work compared with another traditional technique, like dynamic programming techniques, we found that our proposed AGA performs better, where the total no. of hops and end-to-end delay obtained from our proposed AGA are 8 msec and 5 respectively as compared to 21 msec and 7 in [22]–[24], [27].。
ba无线模块
Configurable FlexPower™ MultiHop radio module with discrete and analog I/OFeaturesSureCross MultiHop embeddable board devices were specifically designed for the needsof industrial users to provide connectivity where traditional wired connections are not pos-sible or cost prohibitive.•Wireless industrial module with two sinking discrete inputs, two NMOS discrete out-puts, two 0 to 20 mA analog inputs, and two switch power outputs•Selectable transmit power levels of 250 mW or 1 Watt and license-free operation up to4 watt EIRP, with a high-gain antenna, in the U.S. and Canada for 900 MHz•Flex Power™ power options allows for +10 to 30V dc, solar, and battery power sour-ces for low power applications.•Self-healing, auto-routing RF network with multiple hops extended the network’s range•Serial and I/O communication on a Modbus platform•Message routing improves link performance•DIP switches select operational modes: master, repeater, or slave•Switched power outputs provide 5 to 24V dc power to external sensors•Plastic housing and DIN rail mounting accessories are available•FHSS radios operate and synchronize automatically; selectable network IDs reduceinterference from collocated networksFor additional information, the most recent version of all documentation, and a complete list of accessories, refer to Banner Engineering's website, /surecross.ModelsWARNING: Not To Be Used for Personnel ProtectionNever use this product as a sensing device for personnel protection. Doing so could lead to serious injuryor death. This product does NOT include the self-checking redundant circuitry necessary to allow its use inpersonnel safety applications. A sensor failure or malfunction can cause either an energized or de-ener-gized sensor output condition.CAUTION: Electrostatic Discharge (ESD) WarningESD Sensitive Device. Use proper handling procedures to prevent ESD damage to these devices. Themodule does not contain any specific ESD protection beyond the structures contained in its integrated cir-cuits. Proper handling procedures should include leaving devices in their anti-static packaging until readyfor use; wearing anti-static wrist straps; and assembling units on a grounded, static dissipative surface.Important: Never Operate 1 Watt Radios Without Antennas.SureCross MultiHop Radio Module with I/OP/N 154365 rev. -6/20/201101543650To avoid damaging the radio circuitry, never power up SureCross Performance or SureCross MultiHop (1Watt) radios without an antenna.MultiHop Radio OverviewMultiHop networks are made up of one master radio and many repeater and slave radios. The MultiHop networks are self-forming and self-healing networks constructed around a parent-child communication relationship. The MultiHop Radio architecture creates a hierarchi-cal network of devices to solve the most challenging wireless applications. A MultiHop Radio is either a master radio, a repeater radio, or a slave radio.•The single master device controls the overall wireless network.•The repeater mode allows for range extension of the wireless network.•The slave radios are the end point of the wireless network.At the root of the wireless network is the master radio. All repeater or slave radios within range of the master radio connect as children of the master radio, which serves as their parent. After repeater radios synchronize to the master radio, additional radios within range of the repeater can join the network. The radios that synchronize to the repeater radio form the same parent/child relationship the repeater has with the master radio: the repeater is the parent and the new radios are children of the repeater.The network formation continues to build the hierarchical structure until all MultiHop radios connect to a parent radio. A MultiHop radio can only have one designated parent radio. If a radio loses synchronization to the wireless network it may reconnect to the network through a different parent radio.For the simple example network shown below, the following relationships exist:43•Radio 1 is the master radio and is parent to radio 2 (repeater).•Radio 2 (repeater) is child to radio 1 (master), but is parent to radios 3 (slave) and 4 (repeater).SureCross MultiHop Radio Module with I/O2 - tel: 763-544-3164P/N 154365 rev. -•Radio 4 (repeater) is child to radio 2 (repeater), but is parent to radios 5 and 6 (both slaves).On the LCD of each device, the parent device address (PADR) and local device address (DADR) are shown.MultiHop Master Radio. Within a network of MultiHop data radios, there is only one master radio. The master radio controls the overall timing of the network and is always the parent device for other MultiHop radios. The host system connects to this master radio. MultiHop Repeater Radio. When a MultiHop radio is set to repeater mode, it acts as both a parent and a child. The repeater receives data packets from its parent, then re-transmits the data packet to the children within the repeater’s network. The incoming packet of information is re-transmitted on both the radio link and the local serial link.MultiHop Slave Radio. The slave radio is the end device of the MultiHop radio network. A radio in slave mode does not re-transmit the data packet on the radio link, only on the local serial (wired) bus.MultiHop Configuration ToolBanner’s MultiHop Configuration Tool offers an easy way to configure and view your MultiHop radio network. The MultiHop Configuration Tool requires that you connect your master radio to your computer using either a USB to RS-485 (for RS-485 radios) or a USB to RS-232 (for RS-232 radios) converter cable. These adapter cables pass information between your computer and a MultiHop Radio operating at250 mW.Cable Model No.: BWA-HW-006Adapter cable, USB to RS-485. This cable cannot power a Multi-Hop radio operating at 1 Watt.Cable Model No.: BWA-HW-026Splitter cable, wall plug for external power split to 5-pin Euro-stylemale and 5-pin Euro female (to power a M-H at 1 Watt while con-figuring it through the MHCT)Use this power supply cable together with the USB to RS-485adapter cable to configure a MultiHop radio in 1 Watt mode.When the MultiHop Configuration Tool launches, it automatically checks to see if a newer version of the software is available. If a newer version is available, a dialog box displays on the screen to ask you if you want to download the new version or ignore the new version. If you select download, the newer version automatically downloads, installs, and relaunches the program for you.Wiring DiagramsSureCross MultiHop Radio Module with I/OP/N 154365 rev. - tel: 763-544-31643Additional InformationFor additional information, including installation and setup, weatherproofing, device menu maps, troubleshooting, and a list of accesso-ries, refer to one of the following product manuals•SureCross Performance and SureCross DX80 (Star Network) Quick Start Guide: Banner part number 128185•SureCross Performance and SureCross DX80 (Star Network) Wireless I/O Network Manual: 132607•DX70 (Point to Point) Wireless Pairs Manual and Data Sheet: 133214•MultiHop Radio Quick Start Guide: 152653•MultiHop Radio Product Manual:151317•Web Configurator Manual (used with "Pro" and DX83 models): 134421SureCross MultiHop Radio Module with I/O - tel: 763-544-3164P/N 154365 rev. -Modbus Register TableInputsOutputs Modbus Addressing ConventionAll Modbus addresses refer to Modbus holding registers. When writing your own Modbus scripts, use the appropriate commands for interfacing to holding registers. (Because Modbus numbering begins at 1, users need to subtract 1 from the register address given to form the numeric value entered into the “address” field of the Modbus RTU protocol command string.) Parameter description headings refer to addresses in the range of 40000 as is customary with Modbus convention.Device ConfigurationDIP Switch ChangesBefore making any changes to the DIP switch positions, disconnect the power. For devices with batteries integrated into the housing,remove the battery for at least one minute.DIP switch changes will not be recognized if power isn't cycled to the device.SureCross MultiHop Radio Module with I/OP/N 154365 rev. - tel: 763-544-31645SureCross MultiHop Radio Module with I/O DIP Switch Settings (MultiHop)* Default configuration** For 2.4 GHz radios, the transmit power is fixed at 0.063 Watts (18 dBm). DIP switch 5 is used instead to set the frame size. Application ModeThe multi-hop data radio operates in either Modbus mode or transparent mode. Use the internal DIP switches to select the mode of operation. All multi-hop data radios within a wireless network must be in the same mode.In transparent application mode, all incoming packets are stored, then broadcast to all connected data radios. The data communication is packet based and not specific to any protocol. The application layer is responsible for data integrity. For one to one data radios it is possible to enable broadcast acknowledgement of the data packets to provide better throughput.Modbus mode uses the Modbus protocol for routing packets. In Modbus mode, a routing table is stored in each parent device to optimize the radio traffic. This allows for point to point communication in a multiple data radio network and acknowledgement/retry of radio pack-ets.Baud Rate and ParityUse the DIP switches to select the baud rate and the parity. The options for baud rate are: 19200, 38400, or 9600. The default is 19200. Select None, Even, or Odd parity. The default parity is None.Disable SerialIf the local serial connection is not needed, disable it to reduce the power consumption of a data radio powered from the solar assembly or from batteries. All radio communications remain operational. - tel: 763-544-3164P/N 154365 rev. -Receiver SlotsThe number of receiver slots indicates the number of times out of 128 slots/frames the radio can transmit to its parent radio. Setting a slave’s receiver slots to 4 reduces the total power consumption by establishing that the slave can only transmit to its parent four times per 128 slots.Transmit Power Levels/Frame SizeThe 900 MHz data radios can be operated at 1 watt (30 dBm) or 0.250 watt (24 dBm). The default setting is 1 watt.For 2.4 GHz radios, the transmit power is fixed at 0.063 watt (18 dBm) and DIP switch 5 is used to set the frame size. The defaultposition (OFF) sets the frame to 40 milliseconds. To increase throughput, set the frame size to 20 milliseconds. Note that increasing the throughput will decrease the battery life.Forming the MultiHop NetworkSetting the MultiHop Radio (Slave) IDOn a MultiHop radio, use the rotary dials to set the device’s MultiHop Radio ID. By factory default, Modbus Slave IDs 01 through 10 are reserved for slaves directly connected to the host (local I/O). Polling messages addressed to these devices are not relayed over the wireless link.Use Modbus Slave IDs 11 through 61 for MultiHop master, repeater, and slave radios. Up to 50 devices (local slaves and remote slaves)may be used in this system.With the left dial acting as the left digit and the right dial acting as the right digit, the MultiHop Radio ID can be set from 01 through 61.Binding MultiHop Radios to Form NetworksTo create your MultiHop network, bind the repeater and slave radios to the designated master radio.Binding MultiHop radios ensures all MultiHop radios within a network communicate only with other radios within the same network. The MultiHop radio master automatically generates a unique binding code when the radio master enters binding mode. This code is then transmitted to all radios within range that are also in binding mode. After a repeater/slave is bound, the repeater/slave radio accepts data only from the master to which it is bound. The binding code defines the network, and all radios within a network must use the same binding code.For Q45 Wireless Sensors, refer to the Q45 datasheet for binding and Slave ID instructions. For MultiHop M-HE models, refer to the M-HE datasheet to set the Slave ID before following the binding instructions.Step 1. Apply power to all MultiHop radios and place the MultiHop radios configured as slaves or repeaters at least two meters away from the master radio.Step 2. On the MultiHop master radio, triple click button 2. For MultiHop master radios with only one button, triple click the button.For the two LED/button models, both LEDs flash red and the LCD shows *BINDNG and *MASTER. For single LED/button models, the LED flashes alternatively red and green.Step 3. On the MultiHop repeater or slave radio, triple click button 2. For repeaters or slaves with only one button, triple click the button.The child radio enters binding mode and searches for any Master radio in binding mode. While searching for the Master radio, the two red LEDs flash alternately. When the child radio finds the Master radio and is bound, both red LEDs are solid for four seconds, then both red LEDs flash simultaneously four times. For M-GAGE Nodes, both colors of the single LED are solid (looks orange), then flash. For Q45 radios, both the green and red are solid, then flash. After the slave/repeater receives the binding code transmitted by the master, the slave and repeater radios automatically exit binding mode.Step 4. Set the Slave ID. On MultiHop radios with rotary dials, use both rotary dials to assign a decimal MultiHop Radio ID between 01and 99. The left rotary dial represents the tens digit (0–9) and the right dial represents the ones digit (0–9) of the MultiHop Radio ID.For MultiHop M-HE* models, see the Setting the Slave ID instructions.Step 5. Repeat steps 3 through 4 for as many slave or repeater radios as are needed for your network.Step 6. When all MultiHop radios are bound, exit binding mode on the master by double-clicking button 2. All radio devices begin to form the network after the master data radio exits binding mode.SureCross MultiHop Radio Module with I/OP/N 154365 rev. - tel: 763-544-31647SureCross MultiHop Radio Module with I/O Child Radios Synchronize to the Parent RadiosThe synchronization process enables a SureCross radio to join a wireless network formed by a master radio. After power-up, synchroni-zation may take a few minutes to complete. First, all radios within range of the master data radio wirelessly synchronize to the master radio. These radios may be slave radios or repeater radios.After repeater radios are synchronized to the master radio, any radios that are not in sync with the master but can "hear" the repeater radio will synchronize to the repeater radios. Each repeater “family” that forms a wireless network path creates another layer of synchro-nization process. The table below details the process of synchronization with a parent. When testing the devices before installation, verify the radio devices are at least two meters apart or the communications may fail.Slave and Repeater LED BehaviorAll bound radios set to slave or repeater modes follow this LED behavior after powering up.Master LED BehaviorAll bound radios set to operate as masters follow this LED behavior after powering up.Modbus Register ConfigurationThe factory default settings for the inputs, outputs, and device operations can be changed by the user through the device Modbus regis-ters. To change parameters, the data radio network must be set to Modbus mode and the data radio must be assigned a valid Modbus slave ID. - tel: 763-544-3164P/N 154365 rev. -Generic input or output parameters are grouped together based on the device input or output number: input 1, input 2, output 1 etc.Operation type specific parameters (discrete, counter, analog 4 to 20 mA) are grouped together based on the I/O type number: analog 1,analog 2, counter 1, etc.Not all inputs or outputs may be available for all models. To determine which specific I/O is available on your model, refer to the Modbus Input/Output Register Maps listed in the device's data sheet.For more information about registers, refer to the MultiHop Product Manual, Banner part number 151317.Factory Default ConfigurationsDiscrete InputsAnalog InputsDiscrete OutputsSwitch PowerSpecificationsRadioRange900 MHz: Up to 9.6 kilometers (6 miles) *2.4 GHz: Up to 3.2 kilometers (2 miles) *Transmit Power900 MHz: 30 dBm conducted (up to 36 dBm EIRP)Spread Spectrum TechnologyFHSS (Frequency Hopping Spread Spectrum)Antenna Connection Hinse U.FL-R-SMT.(01)Use cable BWA-HW-030 (U.FL to RP-SMA) or the equivalentSureCross MultiHop Radio Module with I/OP/N 154365 rev. - tel: 763-544-316492.4 GHz: 18 dBm conducted, less than or equal to 20dBm EIRP900 MHz Compliance (1 Watt Radios)FCC ID UE3RM1809: This device complies with FCC Part 15, Subpart C, 15.247IC: 7044A-RM18092.4 GHz ComplianceFCC ID UE300DX80-2400 - This device complies with FCC Part 15, Subpart C, 15.247ETSI/EN: In accordance with EN 300 328: V1.7.1(2006-05)IC: 7044A-DX8024* With the standard 2 dB antenna. High-gain antennas are availa-ble, but the range depends on the environment and line of sight. To determine the range of your wireless network, perform a Site Survey.Notice: This equipment must be professionally installed. The output power must be limited, through the use of firmware or a hardware attenuator, when using high-gain antennas such that the +36 dBm EIRP limit is not exceeded.GeneralPower*Requirements: +10 to 30V dc (For European applica-tions: +10 to 24V dc, ± 10%). (See UL section below for any applicable UL specifications) or 3.6 to 5.5V dc.Supply must tolerate loads in excess of 1000 mA.InterfaceOne red/green LEDOne push button* For European applications, power the DX80 from a Limited Pow-er Source as defined in EN 60950-1.InputsDiscrete InputsRating: 3 mA max current at 30V dcSample Rate: 40 millisecondsON Condition: Less than 0.7VOFF Condition: Greater than 2V or open Analog InputsRating: 24 mASample Rate: 1 secondAccuracy: 0.1% of full scale +0.01% per °C Resolution: 12-bitOutputsDiscrete Output Rating (MultiHop NMOS) Less than 1 A max current at 30V dcON-State Saturation: Less than 0.7V at 20 mA Discrete Output ON Condition Less than 0.7VDiscrete Output OFF Condition OpenCommunicationHardware (RS-485)Interface: 2-wire half-duplex RS-485Baud Rates: 9.6k, 19.2k (default), or 38.4kData Format: 8 data bits, no parity, 1 stop bitNote, the MultiHop models also support 2400 baud communication via Modbus register parameters.Packet Size (MultiHop)900 MHz: 175 bytes2.4 GHz: 125 bytes Intercharacter Timing (MultiHop)3.5 millisecondsEnvironmentalOperating EnvironmentTemperature: −40 to +85° CHumidity: 95% max. relative (non-condensing)Radiated Immunity10 V/m, 80-2700 MHz (EN61000-6-2)SureCross MultiHop Radio Module with I/O - tel: 763-544-3164P/N 154365 rev. -Refer to the SureCross™ MultiHop product manual, Banner p/n 151317, for installation and waterproofing instructions. Operating the devices at the maximum operating conditions for extended periods can shorten the life of the device.CertificationsAccessories for the Board ModelsEnclosuresThese accessories are used with the M-HB1, M-HB2, and M-HB9 MultiHop radio devices.Model No.DescriptionPlastic housingDIN Rail Mount, PlasticAntenna CableThis U.FL to RP-SMA cable may be used with the M-HEx and M-HBx MultiHop radio devices.Model No.DescriptionBWA-HW-030U.FL to RP-SMA, 50 Ohm CoaxWarningsThe manufacturer does not take responsibility for the violation of any warning listed in this document.Make no modifications to this product. Any modifications to this product not expressly approved by Banner Engineering could void the user’s authority to operate the product. Contact the Factory for more information.All specifications published in this document are subject to change. Banner reserves the right to modify the specifications of prod-ucts without notice. Banner Engineering reserves the right to update or change documentation at any time. For the most recent version of any documentation, refer to our website: . © 2006-2010 Banner Engineering Corp. All rights reserved. Antenna InstallationAlways install and properly ground a qualified surge suppressor when installing a remote antenna system. Remote antenna configura-tions installed without surge suppressors invalidate the manufacturer's warranty.Always keep the ground wire as short as possible and make all ground connections to a single-point ground system to ensure no ground loops are created. No surge suppressor can absorb all lightning strikes. Do not touch the SureCross™ device or any equipment connec-ted to the SureCross device during a thunderstorm.Exporting SureCross RadiosIt is our intent to fully comply with all national and regional regulations regarding radio frequency emissions. Customers who want to re-export this product to a country other than that to which it was sold must ensure the device is approved in the destination country. A list of approved countries appears in the Agency Certifications section of the product manual. The SureCross wireless prod-ucts were certified for use in these countries using the antenna that ships with the product. When using other antennas, verify you are not exceeding the transmit power levels allowed by local governing agencies. Consult with Banner Engineering if the destination country is not on this list.SureCross MultiHop Radio Module with I/OP/N 154365 rev. - tel: 763-544-316411Banner Engineering Corp Limited WarrantyBanner Engineering Corp. warrants its products to be free from defects in material and workmanship for one year following the date of shipment. Banner Engineering Corp. will repair or replace, free of charge, any product of its manufacture which, at the time it is returned to the factory, is found to have been defective during the warranty period. This warranty does not cover damage or liability for misuse, abuse, or the improper application or installation of the Banner product.THIS LIMITED WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES WHETHER EXPRESS OR IMPLIED (IN-CLUDING, WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE), AND WHETHER ARISING UNDER COURSE OF PERFORMANCE, COURSE OF DEALING OR TRADE USAGE.This Warranty is exclusive and limited to repair or, at the discretion of Banner Engineering Corp., replacement. IN NO EVENT SHALL BANNER ENGINEERING CORP. BE LIABLE TO BUYER OR ANY OTHER PERSON OR ENTITY FOR ANY EXTRA COSTS, EXPEN-SES, LOSSES, LOSS OF PROFITS, OR ANY INCIDENTAL, CONSEQUENTIAL OR SPECIAL DAMAGES RESULTING FROM ANY PRODUCT DEFECT OR FROM THE USE OR INABILITY TO USE THE PRODUCT, WHETHER ARISING IN CONTRACT OR WAR-RANTY, STATUTE, TORT, STRICT LIABILITY, NEGLIGENCE, OR OTHERWISE.Banner Engineering Corp. reserves the right to change, modify or improve the design of the product without assuming any obligations orliabilities relating to any product previously manufactured by Banner Engineering Corp.Contact UsFor more information: Contact your local Banner representative or Banner Corporate Offices around the world.Banner Corporate Head-quartersBanner Engineering Corp. 9714 Tenth Ave. North Mpls., MN 55441Tel: 763-544-3164 sensors@Asia — ChinaBanner Engineering China Shanghai Rep OfficeRm. G/H/I, 28th Flr.Cross Region PlazaNo. 899, Lingling Road Shanghai 200030 CHINA Tel: 86-21-54894500, Fax: 86-21-54894511sensors@ EuropeBanner Engineering EuropePark LaneCulliganlaan 2FDiegem B-1831BELGIUMTel: 32-2 456 07 80, Fax:32-2 456 07 89mail@Asia — TaiwanBanner Engineering Taiwan8F-2, No. 308Section 1, Neihu RoadTaipei 114Tel: 886-2-8751-9966, Fax:886-2-8751-2966www.bannerengineer-info@bannerengineer-Latin AmericaContact Banner EngineeringCorp. (US) or e-mail:Mexico:mexico@banneren-Brazil: brasil@bannerengin-Asia — JapanBanner Engineering JapanCent-Urban Building 3053-23-15, Nishi-NakajimaYodogawa-Ku, Osaka532-0011 JAPANTel: 81-6-6309-0411, Fax:81-6-6309-0416www.bannerengineering.co.jpmail@bannerengineer-ing.co.jpAsia — IndiaBanner Engineering IndiaPune Head QuartersOffice No. 1001Sai Capital Opp. ICCSenapati Bapat RoadPune 411016 INDIATel: 91-20-66405624, Fax:91-20-66405623www.bannerengineering.co.inindia@SureCross MultiHop Radio Module with I/O。
基于自组织聚类的结构化P2P语义路由改进算法
基于自组织聚类的结构化P2P语义路由改进算法刘业;杨鹏【期刊名称】《软件学报》【年(卷),期】2006(17)2【摘要】结构化P2P网络是构建于物理网络拓扑之上的一层Overlay网络,两层之间的唯一联系是Hash散列函数,这种Hash关系使得节点的逻辑ID号与物理位置之间不存在任何联系.从分析Hash散列函数的性质入手,归纳出目的节点、传统(chord)语义路由中继节点序列、聚类邻居节点集三者之间的逻辑关联特性,并将其应用于所提出的基于自组织聚类的语义路由改进算法SCSRAA(self-organizing clustering semantic routing advarced algorithm)中,从而达到提高语义路由效率的研究目的.针对自组织模式下聚类节点仅存在局部视图的特性,详细讨论了聚类算法及节点获取其他节点物理位置信息的各种规则,给出了SCSRAA路由算法详尽的描述及理论分析.仿真实验表明,该算法具有较强的语义路由效率提升能力.【总页数】10页(P339-348)【作者】刘业;杨鹏【作者单位】计算机网络和信息集成教育部重点实验室,东南大学,江苏,南京,210096;计算机网络和信息集成教育部重点实验室,东南大学,江苏,南京,210096【正文语种】中文【中图分类】TP393【相关文献】1.结构化P2P网络上语义发布/订阅事件路由算法 [J], 尹建伟;施冬材;钱剑锋;董金祥;熊乃学2.基于Chord结构化P2P网络路由算法的改进 [J], 程亚维;田江丽3.自组织聚类的P2P语义路由算法 [J], 向永生;张颖;陈曦4.基于Chord的结构化P2P路由改进算法 [J], 成培;胡峰松;粟智5.SOSC:一种基于自组织语义聚类的P2P查询路由算法 [J], 朱桂明;金士尧;郭得科;韦海亮因版权原因,仅展示原文概要,查看原文内容请购买。
无线传感器网络知识
多跳(multi-hop)网络:无线通信中,信息不是直接从信源到信宿的一次传输,而是经过从信源到信宿之间的多个天线节点的转发,即信息的传输是通过链路上的多个节点转发完成的。
每个节点都可以与一个或者多个对等节点进行直接通信。
多跳就是多次转发。
另外,跳频通信中,由于使用多个频点频移进行通信,因此也多跳有时也指跳频通信。
这种技术的传输方式不是传统意义下的基站和移动用户间的直接通信,而是信源借助一个或多个固定的或移动的中继节点来传输它的信息到目的节点(信宿),它的主要特点是把传统意义下的直接传输路径分成多个短小的路径来传递信源信息的。
有关文献研究表明,这种多跳传输与传统单跳传输相比具有降低系统的发送功率、延伸覆盖和提高系统的容量及吞吐量等特点。
由于在无线传播中路径损耗正比于传播距离2~4次方,多跳链路比单跳链路减少了发送功率,相应地降低了干扰,也潜在地增加了系统容量。
它也可为处于死区或深衰落的用户建立可靠的多跳通信链路,从而延伸覆盖。
多跳合作分集就是通过合作节点间的分集发送,在接收端实现分集增益以克服多径衰落。
多个用户间相互合作可构成一个虚拟的分布式天线阵列,具有分布式MIMO的特性。
多跳合作编码是多跳技术和编码的结合,也可实现分集增益以提高通信的可靠性。
多跳技术在传统意义上讲仅仅是中继转发,即参与中继的各终端没有协议上的控制,如微波中继和卫星中继;而从发展意义上说它是一种合作中继技术,及参与中继活动的终端有一种协议上支配,如Ad Hoc网络中的中继节点,它必须遵循一定的路由协议才能进行接收和转发信息。
在无线多跳网络中,源结点到目的结点之间的典型路径是由多跳组成的,该路径上的中间结点充当转发结点。
因此,无线多跳网络中一个结点具有两种功能,首先结点可以充当端结点产生或接受数据分组,其次结点可以充当路由器对来自其它结点的数据分组进行转发。
在现有的无线网络中,无线Ad Hoc网络,无线传感器网络以及无线Mesh网络均属于无线多跳网。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Multihop Routing In Self-Organizing Wireless SensorNetworksRajashree.V.Biradar 1 , Dr. S. R. Sawant 2 , Dr. R. R. Mudholkar 3, Dr. V.C .Patil 41 Department of Information Science and Engineering, Ballari Institute of Technology and Management,Bellary-583104, Karnataka, India.2 Department of Electronics, Shivaji University, Kolhapur-416004, Maharashtra, India.3 Department of Electronics, Shivaji University, Kolhapur-416004, Maharashtra, India.4Department of Electronics and Communication Engineering, Ballari Institute of Technology and Management,Bellary-583104, Karnataka, India.AbstractWireless sensor networks have emerged in the past decade as a result of recent advances in microelectronic system fabrication, wireless communications, integrated circuit technologies, microprocessor hardware and nano-technology, progress in ad-hoc networking routing protocols, distributed signal processing, pervasive computing and embedded systems. As routing protocols are application specific, recent advances in wireless sensor networks have led to many new protocols specifically designed for routing. Efficient routing in a sensor network requires that the routing protocol must minimize energy dissipation and maximize network life time. In this paper we have implemented several multihop flat based routing protocols like Flooding, Gossiping and a cluster based protocol Multihop-LEACH which does inter-cluster and intra-cluster multihopping using TinyOs and TOSSIM simulator. Evaluation and comparison reveals that Multihop-LEACH protocol utilizes less power and least delay compared to other protocols. We further evaluated the Multihop-LEACH protocol with varying probability of clustering to extend the network life time. Keywords:Multihop, Flooding, Gossiping, Multihop-LEACH, TinyOS, nesC, TOSSIM and Probability.1. IntroductionSensor networks have emerged as a promising tool for monitoring (and possibly actuating) the physical worlds, utilizing self-organizing networks of battery-powered wireless sensors that can sense, process and communicate. Wireless sensor networks [1,2] consist of small low power nodes with sensing, computational and wireless communications capabilities that can be deployed randomly or deterministically in an area from which the users wish to collect data. Typically, wireless sensor networks contain hundreds or thousands of these sensor nodes that are generally identical. These sensor nodes have the ability to communicate either among each other or directly to a base station (BS). The sensor network is highly distributed and the nodes are lightweight. Intuitively, a greater number of sensors will enable sensing over a larger area. As the manufacturing of small, low-cost sensors become increasingly technically and economically feasible, a large number of these sensors can be networked to operate cooperatively unattended for a variety of applications. The features of sensor networks [3] are as depicted below.Varying network size: The size of a sensor network can vary from one to thousands of nodes.Low cost: For the deployment of sensor nodes in large numbers, a sensor node should be inexpensive.Long lifetime network: An important characteristic of a sensor network is to design and implement efficient protocols so that the network can last as long as possible.Self-organization: Sensor nodes should be able to form a network automatically without any external configuration.Query and re-tasking: The user should be able to query for special events in a specific area, or remove obsolete tasks from specific sensors and assign them with new tasks. This saves a lot of energy when the tasks change frequently.Cooperation/Data aggregation: Sensor nodes should be able to work together and aggregate their data in a meaningful way. This could improve the network efficiency.Application awareness: A sensor network is not a general purpose network. It only serves specific applications.Data centric: Data collected by sensor nodes in an area may overlap, which may consume significant energy. Toprevent this, a route should be found in a way that allows in-network consolidation of redundant data.Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture [4]. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. Even though sensor networks are primarily designed for monitoring and reporting events, since they are application dependent, a single routing protocol cannot be efficient for sensor networks across all applications. Multihop routing, clustering and data aggregation are important techniques in minimizing the energy consumption in sensor networks [12, 13, 14].In this paper we describe and implement several multihop routing protocols for sensor networks and present a critical analysis and evaluation of these protocols. The performance comparison considering all the characteristics that should be possessed by routing protocols reveals the important features that need to be taken into consideration while designing new routing protocols for sensor networks. The remainder of this paper is organized as follows. Section 2 contains classification of routing protocols, section 3 contains description of routing protocols implemented, Section 4 contains implementation and simulation, section 5 contains simulation matrices and results and, finally section 6 contains conclusion and future work.2. Classification of routing protocolsBroadly speaking, almost all of the routing protocols can be classified according to the network structure; as flat, hierarchical or location-based. Further, these protocols can also be classified according to operation mode; multipath-based, query-based, negotiation-based, QoS-based, and coherent-based [5]. Figure 1 illustrates classification of WSN routing protocols.Fig. 1: Classification of WSN Routing Protocols2.1 Network StructureBased on the structural orientation of a network, which includes structural orientation of base stations and the structural orientation of sensor nodes we classify routing protocols as flat based, hierarchical based and location based.Flat based: In these networks, all nodes play the same role and there is absolutely no hierarchy. Flat routing protocols distribute information as needed to any reachable sensor node within the sensor cloud [6]. No effort is made to organize the network or its traffic, only to discover the best route hop by hop to a destination by any path.Hierarchical based: This class of routing protocols sets out to attempt to conserve energy by arranging the nodes into clusters as shown in Figure 2. Nodes in a cluster transmit to a head node within close proximity which aggregates the collected information and forward this it to the base station [6, 7].Fig. 2: Clustering NodesGood clustering protocols play an important role in network scalability as well as energy efficient communication. On the negative side of it, clusters may lead to a bottleneck. This is because only one head communicate on behalf of the entire cluster. Energy depletion will be strongest in that head.Location based: Most of the routing protocols for sensor networks require location information for sensor nodes. In most cases location information is needed to calculate the distance between two particular nodes so that energy consumption can be estimated. Since there is no addressing scheme for sensor networks like IP-addresses, location information can be utilized in routing data in an energy efficient way [6].2.2 Protocol OperationIt describes the main operational characteristics of a routing protocol; in terms of communication pattern, hierarchy, delivery method, computation, next- hop. Multipath based: In this case, the network derives benefit from the fact that there may be multiple paths between a source node and the destination. Using different paths ensures that energy is depleted uniformly and no single node bears the brunt [12, 13].Query based: Here the focus lies on propagation of queries throughout the network by the nodes which require some data. Any node which receives a query and also has the requested data, replies with the data to the requesting node. This approach conserves energy by minimizing redundant or non-requested data transmissions [8]. Negotiation based: The nodes here exchange a number of messages between themselves before transmission of data [9, 10]. The benefit of this is that redundant data transmissions are suppressed. It should however be ensured that the negotiation transmissions are not allowed to exceed an extent that the energy saving benefit is offset by the negotiation overhead.QoS-based: QoS based protocols have to find a trade-off between energy consumption and the quality of service [11]. A high energy consumption path or approach may be adopted if it improves the QoS. So when interested in energy conservation, these types of protocols are usually not very useful.Coherent-based : Coherence based protocols focus on how much data processing takes place at each node[11]. In coherent protocols, data is sent to an aggregator node after minimum possible processing, and processing is then done at the aggregator. Coherent processing is usually adopted for energy efficient routing because they reduce the computation steps per node. However, the aggregator nodes must have more energy than the other ordinary nodes, or else they will be depleted rapidly.3. Description of routing protocolsimplemented3.1FloodingFlooding [1] starts with a source node sending its data to all of its neighbors. Upon receiving a piece of data, each node then stores and sends a copy of the data to all of its neighbors. Only packets which are destined for the node itself or packets whose hop count has exceeded a preset limit are not forwarded. This is therefore a straight forward protocol requiring no protocol state at any node, and it disseminates data quickly in a network where bandwidth is not scarce and links are not loss-prone. The main benefit of Flooding is that it requires no costly topology maintenance or route discovery. Once sent a packet will follow all possible routes to its destination. If the network topology changes sent packets will simply follow the new routes added. Flooding does however have several problems. One such problem is implosion. Implosion is where a sensor node receives duplicate packets from its neighbors. Figure 3 illustrates the implosion problem. Node A broadcasts a data packet ([A]) which is received by all nodes in range (nodes B and C in this case). These nodes then forward the packet by broadcasting it to all nodes within range (nodes A and D). This results in node D receiving two copies of the packet originally sent by node A. This can result in problems determining if a packet is new or old due to the large volume of duplicate packets generated when flooding. Overlap is another problem which occurs when using Flooding. If two nodes share the same observation region both nodes will witness an event at the same time and transmit details of this event. This results in nodes receiving several messages containing the same data from different nodes. Figure 4 illustrates the overlap problem. Nodes A and B both monitor geographic region Y. When nodes A and B flood the network with their sensor data node C receives two copies of the data for geographic region Y as it is included in both packets. Another problem with Flooding is that the protocol is blind to available resources. Messages are sent and received by a node regardless of how much power it has available. In addition to this the number of packets generated by the Flooding protocol causes a lot of network traffic and causes a large network wide energy drain across the network. This can shorten the life of the network.Fig. 3: Implosion problemFig. 4: Overlap problem3.2GossipingThe Gossiping protocol is based on the Flooding protocol. Gossiping is proposed to address some critical problems of the Flooding scheme [1, 2]. Instead of broadcasting each packet to all neighbors the packet is sent to a single neighbor chosen at random from a neighbor table. Having received the packet the neighbor chooses another random node to send to. This can include the node which sent the packet. This continues until the packet reaches its destination or the maximum hop count of the packet is exceeded.Gossiping avoids the implosion problem experienced by Flooding as only one copy of a packet is in transit at any one time. However, it may cause another problem, the long packet delay. Because the sender randomly selects the subset of the result in a router neighbors to transmit data, the selected sensors may result farther than the shortest path between the sender and the sink. Hence, this may extend the packet delay time. While gossiping distributes information slowly, it dissipates energy at a slow rate as well. Consider the case where a single data source disseminates data using gossiping. Since the source sends to only one of its neighbors, and that neighbor sends to only one of its neighbors, the fastest rate at which gossiping distributes data is 1 node/round. Finally, we note that, although Gossiping largely avoids implosion, it does not solve the overlap problem.3.3Multihop Low Energy Adaptive Clustering(Multihop-LEACH)Multihop-LEACH is a cluster based routing algorithm in which self-elected cluster heads collect data from all the sensor nodes in their cluster, aggregate the collected data by data fusion methods and transmit the data through an optimal path between the cluster head (CH) and the base station(BS) through other intermediate CHs and use these CHs as a relay station to transmit data through them as shown in figure 5.Fig. 5: Nodes communicate to Base Station through an optimal path ofCluster Heads These self elected cluster heads continue to be cluster heads for a period referred to as a round.At the beginning of each round, every node determines if it can be a cluster head during the current round by the energy left at the node. In this manner, a uniform energy dissipation of the sensor network is obtained. If a node decides to be a cluster head for the current round, it announces its decision to its neighbors. Other nodes which choose not to be cluster heads determine to which cluster they want to belong by choosing the cluster head that requires the minimum communication energy. Multihop-LEACH was mainly proposed for routing data in wireless sensor networks which have a fixed base station to which recorded data needs to be routed. All the sensor nodes are considered static, homogenous and energy constrained. The sensor nodes are expected to sense the environment continuously and thus have data sent at a fixed rate. These assumptions make it unsuitable for sensor networks where a moving source needs to be monitored.The operation of Multihop-LEACH is separated into two phases: the setup phase and the steady state data transfer phase. In the set up phase, the clusters are organized and cluster heads selected. During the setup phase, the cluster heads are selected based on the suggested percentage of probability of clustering for the network and the number of times the node has been a cluster-head so far. This decision is made by each node n choosing a random number between 0 and 1. If the number is less than a threshold T(n), the node becomes a cluster-head for the current round. The threshold is set as follows:Where P is the desired cluster-head probability, r is the number of the current round and G is the set of nodes that have not been cluster-heads in the last 1/P rounds.Once the nodes have elected themselves to be cluster heads they broadcast an advertisement message (ADV). Each non cluster-head node decides its cluster for this round by choosing the cluster head that requires minimum communication energy, based on the received signal strength of the advertisement from each cluster head.After each node decides to which cluster it belongs, it informs the cluster head by transmitting a join request message (Join-REQ) back to the cluster head. After receiving all the messages from the nodes that would like to be included into the cluster and based on the number of nodes in the cluster, the cluster head creates and announces a TDMA schedule, assigning each node a time slot when it can transmit. Each cluster communicatesusing different CDMA codes to reduce interference fromnodes belonging to other clusters. The CDMA code to be used in the current round is transmitted along with the TDMA schedule.In the steady state phase, the actual data transfer to the base station takes place. Upon receiving all the data, the cluster head node aggregates it before sending it to the other cluster head nodes. After a certain time, determined a priori, the network goes back to the set up phase and enters another round of selecting new cluster heads.Inter-cluster and intra-cluster multi-hop communication are the two major concepts considered in Multihop-LEACH protocol.Multihop inter-cluster operation: In this model network is grouped into different clusters. Each cluster is composed of one cluster head (CH) and cluster member nodes. The respective CH gets the sensed data from its cluster member nodes, aggregates the sensed information and then sends it to the Base Station through an optimal multihop tree formed [21] between cluster heads (CHs) with base station as root node as shown in figure 5. Multihop intra-cluster operation: However, we note that in general using single hop communication within a cluster for communication between the sensor nodes and the cluster heads may not be the optimum choice. When the sensor nodes are deployed in regions of dense vegetation or uneven terrain, it may be beneficial to use multi-hop communication among the nodes in the cluster to reach the cluster head. As it is possible for nodes to remain disconnected from the network due to a cluster head not being in range, each node is able to request another connected node to become a cluster head. This occurs after a timeout period and is done through a normal advertisement message.4. Implementation and simulationAll routing protocols are implemented with TinyOS [17] using the nesC [16] programming language. A complete application utilizing the library components of TinyOS is developed to test the protocol. The TOSSIM [15] simulator, which builds directly from the TinyOS components is used to simulate implemented protocols. TOSSIM is provided free with TinyOS. It is designed to emulate a sensor network running TinyOS on a PC. TOSSIM also provides a graphical front end to a TinyOS simulation through the TinyViz program written in Java. 4.1 Introduction to TinyOSTinyOS is an event driven operating system designed for sensor networks, where demands on concurrency and low power consumption are high but the hardware resources are limited [17]. The main strength of TinyOS is that it has a very small footprint – the kernel which occupies approximately 100kb of memory. This means that most of the precious available memory can be allocated to application needs. TinyOS can also be executed on microprocessors that support clock speeds of 5MHz or less as is the case wireless sensor network hardware. Aside from the kernel, TinyOS comes equipped with many support tools, library routines and sample applications and full source is provided. This archive contains the following components:TinyOS core:Operating System Kernel and Run-time routines.nesC compiler:An extension to the GNU compiler system.Sample Applications inc. nesC source code): Applications written in nesC which demonstrate the capabilities of the system and provide a base for extension and adaptation to specific requirements.Library Routines and System Components (inc. nesC source code):Most importantly, the TinyOS package contains a well-defined hierarchy of system library components. These components provide an abstraction layer for communication and components such as sensors etc.TOSSIM (TinyOS Simulator):This program is a WSN simulator allowing the simulation of 1000’s of motes (discussed in more detail later)Debugging Tools: There are a number of debugging tools available, including TOSSIM which allow the programs to be interrogated during execution and program states and system calls to be echoed to a PC terminal screen. Documentation:Documentation is provided for all components although fairly limited. The nesC compiler can also be invoked to produce documentation from source code.Tutorial:A tutorial in HTML format is also available within the TinyOS downloadable archive and on the web. 4.2Introduction to nesCThe Network embedded system C (nesC) is an open source programming language is specialized for sensor networks [16]. It is an extension of the C programming language which was designed to facilitate the implementation of the structuring concepts and execution model of TinyOS. nesC was primarily designed for use with embedded systems such as sensor networks. nesC defines a component based model in order to make it possible to split applications into separate parts which communicates with each other using bidirectional interfaces. nesC does not permit separate compilation as C does. This is because nesC uses whole program analysis toimprove the performance and make the source code safer. Because the size of the application often is relatively small the need for separate compilation is not very critical.In nesC there is a separation of construction and composition. Programs are built out of components which are 'wired' together to form whole programs. In nesC components provide and use bidirectional interfaces which are the only way to access a component. An interface declares a set of commands which must be implemented by the interface provider and a set of events which must be implemented by the user of that interface. If a component wishes to call a command in an interface it must implement the events associated with that interface. The only communication between components is by commands and events. Commands and events are similar to functions and methods in other languages and are used in the same way.4.3Introduction to TOSSIMTOSSIM is a discrete event simulator for TinyOS sensor networks [15]. Instead of compiling a TinyOS application for a mote, users can compile it into the TOSSIM framework, which runs on a PC. This allows users to debug, test, and analyze algorithms in a controlled and repeatable environment. As TOSSIM runs on a PC, users can examine their TinyOS code using debuggers and other development tools.The main aim of TOSSIM is to provide a high fidelity simulation of TinyOS applications. In order to achieve this, the focus of TOSSIM is to simulate the execution of TinyOS as opposed to simulating the real world. TOSSIM is very flexible and allows the simulation of thousands of motes with differing behavior in a variety of environments.The advantage of TOSSIM over alternative simulators is that it is native to TinyOS and nesC source code. TinyViz is a Java visualization and actuation environment for TOSSIM. TinyViz provides an extensible graphical user interface for debugging, visualizing, and interacting with TOSSIM simulations of TinyOS applications. Using TinyViz, we can easily trace the execution of TinyOS apps, set breakpoints when interesting events occur, visualize radio messages, and manipulate the virtual position and radio connectivity of motes. TinyViz supports a simple "plugin" API that allows us to write our own TinyViz modules to visualize data in an application-specific way, or interact with the running simulation.4.4ImplementationImplementation is carried out in two stages. In the first stage two flat based multihop routing protocols namely Flooding & Gossiping and one cluster based protocol Multihop-LEACH are implemented, analyzed and compared. The results clearly show that cluster based protocol Multihop-LEACH is more energy efficient than Flooding and Gossiping. In the second stage Multihop-LEACH is further modified and evaluated with varying probability of clustering to improve success rate and to extend network life time. It is proved that increasing the probability of clustering will improve the energy consumption of Multihop-LEACH routing protocol.As all protocols use multihop routing technique as shown in figure 6, they use MHEngine (multiop engine) module of TinyOS to broadcast and route packets. Selected routing protocol will enable route select module and Path Selection Module (PSM) to select route for data forwarding between sensor nodes. The selected path is sent to MHEngine. The multihop component architecture is shown below.Fig. 6: Multihop component architecture5. Simulation metrics and results5.1 Evaluation metrics [18, 19, 20]Latency: This performance metric is used to measure the average End-to-End delay of data packet transmission. The End-to-End delay implies the average time taken between a packet initially sent by the source, and the time for successfully receiving the message at the destination. Measuring this delay takes into account the queuing and the propagation delay of the packets. The time taken to deliver a packet to the base station from the origin node will be looked at when evaluating the protocols. In addition the per hop time delay will also be looked at. Lower latency is preferable to higher latency.Battery usage:The power consumption is the sum ofused power of all the nodes in the network, where the usedpower of a node is the sum of the power used for communication, including transmitting (Pt), receiving (Pr), and idling (Pi). The amount of power used during the simulation will be monitored and used for evaluating the protocols. Batteries have a finite amount of power and nodes die once power runs out. For this reason lower power usage is preferable to higher power usage. In addition the distribution of power usage across the network will be looked at. Uniform drain is preferable. Success rate: The number of packets received from a node at the base station will be compared with the number of packets sent by a node in order to calculate the Success rate.Connectivity: The number of nodes that have a route to the base station will be used to assess the node connectivity provided by a particular routing protocol. More connected nodes in a network are preferable to fewer connected nodes.5.2Simulation and implementation parametersThe parameters used in simulating the protocols are given below in table 1.Table 1: Summary of the parameters used in the simulation5.3Simulation test casesThe various simulation test cases used in evaluating the three routing protocols that are implemented in two stages are given below in table 2. Multihop-LEACH with 50 nodes is evaluated by varying the probability of clustering.Table 2: Simulator test cases5.3ResultsSimulated results obtained using TOSSIM can be viewed and tested in two ways. One way of visualizing the output by using a graphical tool TinyViz and the other way is by storing the results in a output text file.Output from graphical tool TinyViz: A sample graphical display depicted in figure 7 shows that all the cluster head nodes send a packet to the base station using Multihop-LEACH protocol with a network of 50 nodes.Fig. 7: Cluster head nodes send a packet to the base station.。