Javascript must be enabled to continue!
Coverage breach problems in bandwidth-constrained sensor networks
View through CrossRef
Recent research in sensor networks highlights the low-power mode operation of sensor networks. In wireless sensor networks, network lifetime can be extended by organizing sensors into mutually exclusive subsets and alternatively activating each subset. Coverage breach occurs when a subset fails to cover all the targets. In bandwidth-constrained sensor networks, coverage breach is more likely to happen because when active sensors periodically send data to the base station, contention for channel access must be considered. Channel bandwidth imposes a limit on the cardinality of each subset. To make efficient use of both energy and bandwidth with minimum coverage breach requires optimal arrangement of sensor nodes.
This article addresses three coverage breach problems related to the low-power operation of wireless sensor networks where channel bandwidth is limited. The three coverage breach problems are formulated using integer linear programming models. A greedy approximation algorithm and a heuristic based on the LP-relaxation method are proposed. Effects of changing different network resources on sensor network coverage are studied through simulations. One consistent result is that when the number of sensors increases, network lifetime can be improved without loss of network coverage only if there is no bandwidth constraint; with bandwidth constraints, network lifetime may be improved further at the cost of coverage breach.
Association for Computing Machinery (ACM)
Title: Coverage breach problems in bandwidth-constrained sensor networks
Description:
Recent research in sensor networks highlights the low-power mode operation of sensor networks.
In wireless sensor networks, network lifetime can be extended by organizing sensors into mutually exclusive subsets and alternatively activating each subset.
Coverage breach occurs when a subset fails to cover all the targets.
In bandwidth-constrained sensor networks, coverage breach is more likely to happen because when active sensors periodically send data to the base station, contention for channel access must be considered.
Channel bandwidth imposes a limit on the cardinality of each subset.
To make efficient use of both energy and bandwidth with minimum coverage breach requires optimal arrangement of sensor nodes.
This article addresses three coverage breach problems related to the low-power operation of wireless sensor networks where channel bandwidth is limited.
The three coverage breach problems are formulated using integer linear programming models.
A greedy approximation algorithm and a heuristic based on the LP-relaxation method are proposed.
Effects of changing different network resources on sensor network coverage are studied through simulations.
One consistent result is that when the number of sensors increases, network lifetime can be improved without loss of network coverage only if there is no bandwidth constraint; with bandwidth constraints, network lifetime may be improved further at the cost of coverage breach.
Related Results
Dynamic stochastic modeling for inertial sensors
Dynamic stochastic modeling for inertial sensors
Es ampliamente conocido que los modelos de error para sensores inerciales tienen dos componentes: El primero es un componente determinista que normalmente es calibrado por el fabri...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Exact and Approximate Digraph Bandwidth
Exact and Approximate Digraph Bandwidth
Abstract
Note: Please see pdf for full abstract with equations.
In this paper, we introduce a directed variant of the classical BANDWIDTH problem and study it from the view...
IMPLEMENTASI HOTSPOT DENGAN PENGELOLAAN USER MANAGER DAN BANDWIDTH MENGGUNAKAN MIKROTIK RB941-2ND (STUDI KASUS SMK KESEHATAN BHAKTI KENCANA JATIWANGI)
IMPLEMENTASI HOTSPOT DENGAN PENGELOLAAN USER MANAGER DAN BANDWIDTH MENGGUNAKAN MIKROTIK RB941-2ND (STUDI KASUS SMK KESEHATAN BHAKTI KENCANA JATIWANGI)
SMK Kesehatan Bhakti Kencana Jatiwangi merupakan sekolah kejuruan swasta yang berada di Kecamatan Jatiwangi Kabupaten Majalengka, SMK Kesehatan Bhakti Kencana Jatiwangi sudah memil...
Estimasi Kebutuhan Bandwidth Internet di Jurusan Teknik Elektro Politeknik Negeri Lhokseumawe
Estimasi Kebutuhan Bandwidth Internet di Jurusan Teknik Elektro Politeknik Negeri Lhokseumawe
Bandwidth internet merupakan salah satu parameter utama yang menjadi ukuran oleh pengguna dalam mengakses jaringan internet. Bandwidth yang bagus akan membuat pengguna nyaman dalam...
Link-Based Signalized Arterial Progression Optimization with Practical Travel Speed
Link-Based Signalized Arterial Progression Optimization with Practical Travel Speed
Bandwidth is defined as the maximum amount of green time for a designated movement as it passes through an arterial. In most previous studies, bandwidth has been referred to arteri...
Mapping the effective coverage of modern contraceptive services in Ethiopia
Mapping the effective coverage of modern contraceptive services in Ethiopia
Introduction
Modern contraceptive services are vital for reducing maternal and infant morbidity and mortality. However, in Ethiopia, the effective coverage (quality-adjusted covera...
Implementation of Faulty Sensor Detection Mechanism using Data Correlation of Multivariate Sensor Readings in Smart Agriculture
Implementation of Faulty Sensor Detection Mechanism using Data Correlation of Multivariate Sensor Readings in Smart Agriculture
Through sensor networks, agriculture can be connected to the IoT, which allows us to create connections among agronomists, farmers, and crops regardless of their geographical diffe...

