KR101934156B1 - A Fast and Energy-Efficient Asynchronous Neighbor Discovery Protocol for Cooperative Video Surveillance of Vehicles - Google Patents
A Fast and Energy-Efficient Asynchronous Neighbor Discovery Protocol for Cooperative Video Surveillance of Vehicles Download PDFInfo
- Publication number
- KR101934156B1 KR101934156B1 KR1020160010798A KR20160010798A KR101934156B1 KR 101934156 B1 KR101934156 B1 KR 101934156B1 KR 1020160010798 A KR1020160010798 A KR 1020160010798A KR 20160010798 A KR20160010798 A KR 20160010798A KR 101934156 B1 KR101934156 B1 KR 101934156B1
- Authority
- KR
- South Korea
- Prior art keywords
- node
- search
- mode
- fend
- wake
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
- H04N7/185—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source from a mobile camera, e.g. for remote control
-
- G06K9/00624—
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
- G08B13/19645—Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
-
- H04N5/2257—
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A fast and energy efficient asynchronous neighbor node discovery protocol for cooperative video surveillance in a vehicle is provided for discovery of neighbor nodes in opportunistic mobile networks, n i the mode for selecting a parameter p i corresponding to the target duty cycle (target duty cycle); A periodic wake-up mode in which the node n i wakes up at a multiple of the selected prime number p i ; And an active search mode for changing the node n i to be activated to a consecutive slot c i after a neighbor search request is received.
Description
The present invention relates to an opportunistic network for cooperative video surveillance in a vehicle, and more particularly, to a neighbor node search method, which is an essential process prior to information exchange such as event notification, and more particularly, Efficient asynchronous protocol that searches for neighbors within a search range and reports quick and accurate search results.
Dashboard cameras (Dashcam) are becoming popular in order to collect evidence of traffic accidents on the road as well as to protect themselves from insurance fraud, as well as where many drivers are stationary.
However, since the dashboard camera has a limited viewing angle, it often occurs that the license plate of the vehicle or the driver's face related to various accidents of the parked car can not be recorded.
Accordingly, it is possible to consider cooperating with the dashboard cameras of the neighboring vehicles. By cooperating with the dashboard cameras of the neighboring vehicles, images can be obtained from various angles.
Collaboration of dashboard cameras In data transmission for a video surveillance network, neighbor node discovery is needed.
Recently, ad hoc networks such as opportunistic mobile networks have attracted much attention, and these networks can be applied to various services such as military, vehicle, medical, multimedia transmission have.
Conventional protocols, however, are designed to operate in such a manner that all nodes always search for all neighboring nodes regardless of whether a neighboring node needs to be searched. Therefore, when applied to an application such as a cooperative video surveillance of a vehicle, Consumption and a significant level of search delays.
A typical conventional protocol, a wake-up pattern of Disco, U-Connect, AARP and SearchLight is shown in FIG.
(A) is a wake-up slot, (b) is a U-Connect, (c) is an Adaptive Asynchronous Rendezvous Protocol (AARP) Pattern.
First, in the case of the Disco protocol, it is designed based on the Chinese-Remainder Theorem (CRT), where node n i selects a pair of prime p i1 and p i2 , and node n i wakes-up in each of the two prime numbers .
Referring to FIG. 1 (a),
In the case of the AARP protocol, it is designed based on the CRT, and the node n i selects the prime p i and the node n i , according to the conditions of n ≡ 0 (mod p i ) or n ≡ 1 (mod p i + 1) wake-up.
1 (b), the
For U-Connect protocol, designed on the basis of CRT, node n i is the selected prime number p i, and node n i is a prime number p i p-sheet, as well as a multiple of i 2 Each slot is waked up in all slots from the first slot to (p i +1) / 2.
Referring to FIG. 1 (c), a
That is, 0, 5, and 10 for a multiple of 5, and 0, 1, and 2 for slots from the
SearchLight is not designed on the basis of CRT, so it does not need a prime number. The node n i selects a number p i to be used as a period and wakes-up in
Referring to FIG. 1 (d), the position of the probe slot is determined by a counter starting from 1, increases every cycle, ends at pi / 2, and then starts at 1 again.
That is, n i is 0 and 1 for the first period and 0 and 2 for the second period are wake-up (probe slots).
Although various protocols as described above are disclosed, it is designed to operate in such a manner that all the nodes always search for all neighboring nodes regardless of whether the neighboring nodes need to be searched. Therefore, when applied to applications such as cooperative video surveillance , Unnecessary energy consumption and a significant level of search delays.
Thus, the present inventor has sought to develop a protocol that is faster and more efficient than the protocols disclosed in the prior art.
SUMMARY OF THE INVENTION The present invention has been made to solve the above problems.
Specifically, in opportunistic mobile networks, nodes have a different role in neighbor node discovery, searching for neighbors within a search range, and quickly and efficiently delivering protocols that are quicker and more accurate than previously disclosed protocols that report fast search results I would like to propose.
According to an aspect of the present invention, there is provided a method for discovering a neighbor node in opportunistic mobile networks, the method comprising the steps of: for i selects the parameters p i corresponding to the target duty cycle (target duty cycle) mode; Wherein the node n i is wake-up in a multiple of the selected parameter p i ; And an active search mode in which the node n i changes to be activated as a consecutive slot c i after a neighbor search request is received.
It is also preferred that half of the target duty cycle is used in the periodic wake-up mode and the other half is reserved for the active search mode.
Also, the active search mode is preferably performed when a wake-up ratio (WR) is established according to the following equation using the following equation.
WR < / RTI > 2 / pi where WR is the ratio of wake-up slots for the entire slot and pi is the randomly selected parameter.
Also, the active search mode is preferably performed after the delay until the WR is satisfied in the above equation when WR is not satisfied in the above equation.
The apparatus may further include a mode for returning to the periodic wake-up mode after the active search mode.
Also, when the active search mode is performed as frequently as possible in multiples of pi , it is preferable that the number of slots between the start points of two consecutive active search modes can be calculated by the following equation.
Equation, c i is the search of the node n i in a continuous slot, p i is a randomly selected parameter.
Also, the mode for selecting the parameter p i comprises: selecting a target duty cycle d (d low <d ≤ d high ); Selecting an inverse number of a parameter closest to a half of the selected target duty cycle; And using the selected parameter to specify a search range in a neighbor search request.
In addition, the parameter is preferably a prime number.
Node n search range of i c i may be a specified value to the neighboring search request, the node n i if there is no request, the target half of the duty cycle (1 / p i) as close as possible, to maintain the wake-up ratio in the have.
When the wake-up ratio is less than 2 / p i when the neighbor search request is received, the node n i is more accurate than the asynchronous neighbor search protocol for all neighbor n k in the case of p k ≤ c i Can be obtained.
In an application such as a cooperative video surveillance network of a dashboard camera, there is no need to search for a neighboring node while recording a video. Therefore, in an application such as a vehicle accident, In the case of a search request, the FEND according to the present invention is much superior to the conventional protocol in terms of search delay time and energy consumption.
The slot size used in the simulation is 10ms, which is acceptable for low-cost communication equipment.
Figure 1 shows a prior art wake-up pattern.
2 shows the concept of FEND according to the present invention.
FIG. 3 shows a wake-up schedule (or pattern) when p i = 7 and c i = 11 in FEND according to the present invention.
4 shows a change in the operation mode of the FEND according to the present invention.
Fig. 5 shows the wake-up ratio, the event-based search delay average, and the WR-delay product when nodes with a target duty cycle of 5% in the symmetric case search for adjacent nodes having the same target duty cycle.
FIG. 6 shows the event-based search delay average and WR-delay product when a node having a target duty cycle of 2% in the asymmetric case searches for adjacent nodes having a target duty cycle of 5% and 11%.
FIG. 7 shows the event-based search delay time and the WR-delay product when a node with a target duty cycle of 11% in the asymmetric case searches for adjacent nodes having 2% and 5% target duty cycles.
Hereinafter, the fast and energy efficient Asynchronous Neighbor Discovery Protocol of the present invention is referred to as " FEND " for convenience of explanation.
The time used in " FEND " is divided into fixed width slots, successive time slots are represented by continuous integers, and all nodes start counting the time slot progression by the number of slots under the assumption that start times may be different.
Also, the " periodic wake-up mode " means an operation mode in which a user or an application periodically wakes up before a neighbor search request is received.
The " active search mode " means an operation mode in which a neighbor search request is activated after a user or an application receives the neighbor search request.
Also, the " search delay time " means a delay time between when a node receives a neighbor search request and when it finds a neighbor node.
In addition, " symmetrical case " means that all nodes have the same duty cycle, and " asymmetrical case " means the remaining cases except for the symmetric case.
Also, p i is an arbitrarily selected parameter.
Since p i is a parameter, it is not limited to the dimension, and a preferable example is an integer. In the present invention, a prime number is used for the performance comparison with the conventional technique.
Definition of FEND
The FEND of the present invention includes a mode in which a node n i selects a parameter p i according to a target duty cycle, a periodic wake-up mode in which a wake-up occurs in a multiple of a selected parameter p i , i to be activated to the continuous slot c i , and a mode to return to the periodic wake-up mode after performing the active search mode.
Node n j in an active search mode and wake-up slots in a row c j, c j consecutive slots are specified in the parameters of the search range of the neighbor discovery request by the node n j of the user or an application with a number.
In active search mode, node n j can search all neighboring nodes n k that wake up in multiples of p k (p k ≤ c j ).
A preferred embodiment of the FEND will be described in detail with reference to FIG. In FIG. 2, the parameter p i is the wake-up interval of the node n i , and the continuous slot c i specifies the search range of the user or application of the node n i (the gray slot is the wake-up slot).
Node n i is wake-up from a multiple of the parameter p i (1 ≤ i ≤ 4 ),
Node n 5 can search for neighboring n 1 , n 2, and n 3 wake-up in multiples of p 1 , p 2, and p 3 that are less than or equal to search range c 5 .
Another preferred embodiment of FEND will now be described in more detail with reference to FIG. FIG. 3 shows a wake-up schedule (or pattern) when p i = 7 and c i = 11 in FEND.
Also, in FIG. 3, L A is the number of slots in the active search mode and L W is the number of slots in the periodic wake-up mode.
l is the number of slots between the first wake-up slot of the periodic wake-up mode from the end of the active search mode.
The contiguous slot c i is a search range parameter of node n i defined by the user or application and p i is a parameter that creates a wake-up schedule (or pattern) based on the target duty cycle of node n i .
FEND includes two modes: periodic wake-up mode and active search mode.
In Figure 3 (a) refer to To explain in detail, the periodic wake-up mode, the node n i is wake-up from a multiple of the parameter p i, the parameter p i is based on the target duty cycle of the node n i .
Node n i in the active search mode is specified in the search range of the continuous slot in the c i and wake-up, the continuous slot of the node n i c i is the user or the application of a neighbor discovery request (see Fig. 3 (b)).
At FEND, node n i starts periodic wake-up in periodic wake-up mode and changes its operating mode to active search mode whenever it receives a request from user or application.
Further, at the end of the active search mode, the operation mode is automatically returned to the periodic wake-up mode (see Fig. 3 (c)).
In FEND, half of the target duty cycle is used as the periodic wake-up mode and the other half is defined as reserved for the active seek mode.
Thus, the node n i selects the inverse of the parameter p i such that it is as close as possible to half of the target duty cycle.
With respect to the change condition of the operation mode, the node n i can start the active search mode whenever WR (Wake-up Ratio) is 2 / p i or less.
If WR is not less than 2 / p i , node n i should wait until WR is equal to or less than 2 / p i .
3 (c), assuming that the active search mode is activated as frequently as possible for a multiple of p i , the slot between the active search mode and the next active search mode is given by Equation (4) (4) will be described in detail in the proof part to be described later.
This will be described in detail with reference to FIG.
FIG. 4 shows an example of an operation mode change in FEND, in which the active search mode is activated as often as possible, so that WR at t 1 , t 4 and t 8 represents 2 / p i , (See Fig. 4 (a)).
Therefore, as shown in equation (4), L A + L W
.In the case of WR = 2 / p i at t 1 , the neighbor search request arrives at t 2 , t 3 and t 7 (see FIG. 4 (b)).
Since at t 2 WR = 2 / p i and an active search mode can be activated at t 2, adjacent search result is reported to the user or application to t 2 + A L.
t 3 and t 7 because the WR> is 2 / p i, the active search mode, and t 3 can not be activated at t 7.
Therefore, the start of the active search mode must be delayed until t 4 and t 8, respectively. In this case, the results are reported as t 4 + L A and t 8 + L A.
In the case of t 1 to WR = 2 / p i, the neighbor discovery requests to t 5 and t 6 arrives. the active search mode is activated at t 5 and t 6 , since t R 5 and t 6 are WR <2 / p i , resulting in t 5 + L A and t 6 + L A reported (see FIG. ).
Specifying the search scope of FEND
Hereinafter, the search range designation of the FEND will be described in detail.
When all nodes select their duty cycle according to the remaining battery level d low and d high , set the search range's default value as close as possible to the half of d low .
A method for an application of a node to discover nodes with a high amount of residual energy is to select a target duty cycle d (d low <d ≤ d high ), and determine whether the reciprocal of the parameter is closest to the half of the selected duty cycle And using the selected parameter to specify the search range in the neighbor search request.
The neighbor search request may include multiple search ranges and may include the minimum number of neighboring nodes to be searched.
For example, the case that contains the least number of neighbors will be the neighbor discovery request, the search node and a ≤ c 1 c 2 c 1 of the two search ranges, and c 2 are provided.
In this case, the node first tries to wake up continuously in consecutive slot c 1 after changing the mode of operation to active search mode first. If it finds more nodes than the minimum number of neighbor nodes to be searched, the node immediately returns to the periodic wake-up mode.
If the neighboring nodes have not been sufficiently searched in the consecutive slot c 1 , the node tries to continue to wake up in the next consecutive slot c 2 -c 1 for the neighbor search.
In high-density networks, this approach not only reduces energy consumption due to premature termination of the active search mode, but also shortens the event-based search latency because rapid activation of the active search mode allows for reduced energy consumption.
Performance evaluation
We evaluate the FEND, AARP, Disco, and U-Connect according to the present invention with the following criteria through simulations using the ns-3 (Network Simulator 3) program: wake-up ratio (WR) Time, WR-delay product.
We also use three target duty cycles of 2%, 5%, and 11% in the simulation.
[Table 1]
FEND, AARP, Disco, and U-Connect are based on the duty cycle. The FEND, AARP, Disco, and U-Connect are based on a small number of values used in FEND, AARP, Select a prime number.
Again, the WR for AARP, U-Connect and Disco is determined by the chosen prime.
However, the WR obtained by the parameter p i selected by the node n i in FEND varies between 1 / p i and 2 / p i according to the schedule (or pattern) of the neighbor search request.
Again, it is preferable that the dimension of the parameter pi of FEND is not limited, but the parameter pi of FEND selects a prime number to obtain the performance evaluation result under the same condition.
The time interval at which neighbor node discovery requests arrive at all nodes follows the exponential distribution average value.
When the dashboard camera starts to shoot a video after searching for its neighbors, it is not necessary to search for the neighbor again before terminating the video shooting.
Therefore, if a
However, in order to analyze the performance of FEND for various μ, simulation sets the range of μ from 5 seconds (500 slots) to 100 seconds (10,000 slots). The slot size used in the simulation is 10ms, which is acceptable for low-cost communication equipment.
To obtain reliable results, 100 experiments were repeated for one μ, and one experiment was performed for 30,000 seconds (3,000,000 slots).
In each experiment, the starting slot of each node is randomly selected between 0 and 100. [
In order to evaluate the performance of FEND, we make the node n i search for the node n j in two extreme situations: In the first case, the node n j represents the search range c j ( c j = p j ) Use it as a parameter to enable active navigation mode as often as possible.
In the second case, node n j does not use active search mode at all.
For the latter and the former, they are called FEND-W and FEND-P, respectively.
First, the case of symmetry is evaluated. The simulation of the network consists of two nodes, n 1 and n 2 , and the target duty cycle of both nodes is equal to 5%. Each protocol will select a small number, as shown in Table 1, and in the case of symmetry is the navigation of the node n 1 in FEND because the range c 1 is the same as p 1, nodes n attempt to duty cycle ≥ 5% neighborhood of the target of 1 .
In FIG. 5, a wake-up ratio of FEND and conventional protocols, an event-based search delay average, and a WR-delay product are shown in the case of symmetry, and therefore, detailed evaluation will be made with reference to FIG.
5 (a) shows a graph of the node n 1 WR attempting to traverse the node n 2 in the case of symmetry is shown.
The WR of AARP, Disco, U-Connect is determined by the selected decimal number (see Table 1), but the WR of FEND depends on the neighbor search request time interval.
Using equation (4), since c 1 = p 1 = 41
= 1640 slots (Therefore, in FEND, the WR of node n 1 is 2 / p 1 at μ ≤ 15 seconds, and it decreases at μ> 15 seconds according to the average arrival time.
FIG. 5 (b) is a graph showing the average of the event-based search delay time of the node n 1 searching for the node n 2 in the symmetric case.
It can be seen that the average of the event-based search latency of AARP, Disco, and U-Connect is about 3.91 seconds to about 5.37 seconds regardless of the neighbor search request time interval.
The average value of the event-based navigation delay of AARP, Disco and U-Connect is considered to be too large for cooperative video surveillance of vehicles.
In FEND, the start of the active search mode may be delayed, as shown in FIG. 4, in the case of μ <15 seconds.
Therefore, at μ <15 seconds, the average of the event-based search latency of FEND-P and FEND-W is not small compared to AARP, Disco and U-Connect.
In addition, since the number of wake-up slots of n 2 in FEND-W is only half that of FEND-P, the average of the event-based search delay time of FEND-W is longer than that of FEND-P.
However, in the case of μ> 15 seconds, since the active search mode can be started immediately as shown in FIG. 4 (c), the event-based search delay time average in FEND-P and FEND-W is about 0.20 seconds .
Unlike conventional protocols, the event-based search delay time average in FEND-P and FEND-W is considered to be sufficiently small for cooperative video surveillance in vehicles.
FIG. 5 (c) is a graph showing the WR-delayed product of node n 1 searching for node n 2 in the symmetric case. 5 (c) has a shape similar to that of FIG. 5 (b), but the result of considering both energy consumption and delay time is shown.
WR of node n 2 in FEND-W is half of FEND-P, and in the case of μ> 15 seconds as shown in FIG. 5 (a), WR of node n 1 gradually decreases.
Let R i, j be the ratio of the WR sum of n i and n j in FEND-W for the WR sum of n 1 and n 2 in FEND-P, then R 1,2 value is 0.75 for μ ≤ 15 seconds , μ> 15 seconds, the value of R 1,2 continuously decreases as the value of μ increases.
Thus, at μ ≤ 15 seconds, the difference between the WR-delay products of FEND-P and FEND-W is less than the difference of the event-based search delay time averages of FEND-P and FEND-W.
In the case of μ> 15 seconds, the WR-delay product of FEND-W becomes smaller than the WR-delay product of FEND-P.
As a result, at W = 100 seconds, the WR-delay product of FEND-W is only about 1 / 36.5 times the WR-delay product of AARP, and is only about 1 / 46.6 times that of Disco's WR-delay product.
Next, the asymmetric case protocol is evaluated. The simulation of the network consists of three nodes n 1 , n 2 , and n 3 , with target duty cycles of 2%, 5%, and 11%, respectively, and a prime number is selected as shown in Table 1.
The evaluation of the asymmetric protocol will be described in detail with reference to FIG.
FIG. 6 shows a graph of FEND versus event-based search delay average and WR-delay product of conventional protocols in the asymmetric case.
Figure 6 (a) and in (b) when the asymmetric, the target duty cycles ≥ 5% of the detected target node, c 1 = 41 a, the node n event based on the node n 1 for searching a 2 and n 3 search latency The average is shown.
Using the equation (4), it is found that p 1 = 89 and c 1 = 41
= 3,560 slots (35.6 seconds with a slot size of 10 ms).Therefore, at μ = 30 sec, the event-based search delay time average of FEND-P and FEND-W is not much shorter than that of AARP, Disco, and U-Connect.
However, in Fig. 6 (a), the event-based search delay time average of FEND-P and FEND-W is only about 0.25 seconds in the case of μ> 35 seconds. On the other hand, , Which is not suitable for cooperative video surveillance of the vehicle, from about 7.26 seconds to about 7.57 seconds.
Similarly, in FIG. 6 (b), the event-based search delay time average for FEND-P and FEND-W is only about 0.11 seconds, , Which is not suitable for cooperative video surveillance of the vehicle, is about 2.87 seconds to about 3.48 seconds.
Figure 6 (c) and (d) the asymmetrical case, the target duty cycle in ≥ 5% of the found nodes, namely c 1 = 41, node n WR- delay product of the nodes n 1 and n 3 for searching a second Respectively.
If, as previously mentioned, called the WR agreement ratio of n 1 and n 2 of the FEND-W for the WR sum of n i and n j at FEND-P R i, j, R 1, if μ ≤ 35 seconds , The value of 2 is 0.66, the value of R 1,3 is 0.58, and when μ> 35 seconds, the values of R 1,2 and R 1,3 continuously decrease as the value of μ increases.
6 (c) and (d), the WR-delay product of FEND-W is always smaller than the WR-delay product of FEND-P. Among the conventional protocols, Disco has the lowest WR-delay product. Compared with Disco, at W = 100 seconds, the WR-delay product of FEND-W is larger than the WR- And only about 1 / 62.2 in FIG. 6 (d), and about 1 / 40.0 in FIG. 6 (d).
In case of asymmetry in FIGS. 7 (a) and 7 (b), the event-based search delay time average of node n 3 searching nodes n 1 and n 2 with target duty cycle ≥ 2% and c 1 = .
Using the equation (4), at p 3 = 17 and c 3 = 89, L A + L W =
= 1,411 slots (14.11 seconds with a slot size of 10 ms).Therefore, at μ = 10 sec, the event-based search delay time average of FEND-P and FEND-W is not much shorter than that of AARP, Disco, and U-Connect.
However, in Fig. 7 (a), the event-based search delay time average in FEND-P and FEND-W is only about 0.44 seconds in the case of 占 15 15 seconds, , Which is not suitable for the cooperative video surveillance of the vehicle, from about 2.86 seconds to about 3.49 seconds.
Similarly, in Fig. 7 (b), the event-based search delay time average for FEND-P and FEND-W is only about 0.20 seconds, , Which is not suitable for cooperative video surveillance of the vehicle, is about 1.33 seconds to about 1.50 seconds.
Figure 7 (c) and (d) the asymmetrical case, the duty cycle of the node in the found target ≥ 2%, or 1, c = 89, node n WR- delay product of the nodes n 1 and n 2 3 navigating Respectively.
As mentioned above, when the WR agreement ratio of n i and n j at FEND-W for at FEND-P in WR sum of n 1 and n 2 R i, j la, R 1 in the μ if <15 seconds , The value of 3 is 0.92, the value of R 2,3 is 0.85, and when μ ≤ 15 seconds, the values of R 1,3 and R 2,3 continuously decrease as the value of μ increases.
7 (c) and (d), the WR-delay product of FEND-W is always smaller than the WR-delay product of FEND-P. Among the conventional protocols, Disco has the lowest WR-delay product. Compared with Disco, at W = 100 seconds, the WR-delay product of FEND-W is larger than the WR- Not only about 1 / 11.5 but also about 1 / 11.9 in Fig. 7 (d).
As described above, when the video of the
5 to 7, it can be seen that FEND exceeds the existing protocols in terms of search delay time and energy consumption at < RTI ID = 0.0 >
[proof]
L A is the number of slots in active search mode, and L W is the number of periodic wake-up slots.
Also, l is the number of slots between the end of the active search mode and the first wake-up slot of the periodic wake-up mode thereafter, and c i and p i are parameters.
Also, any number k has a range of k? 0.
Equation (1)
Here, the ratio of wake-up slots to L A + L W should be equal to 2 / p i .
Equation (2)
In the equation (2)
Equation (3)
From equations (1) and (3)
Equation (4)
According to equation (4), when the active search mode is activated as often as possible in multiples of pi , the number of slots between the start points of two consecutive active search modes is
As shown in FIG.
While the present invention has been described with reference to exemplary embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims. It will be appreciated that embodiments are possible. Accordingly, the scope of protection of the present invention should be determined by the claims.
Claims (8)
(a) selecting a parameter p i according to a target duty cycle of a node n i of the opportunistic mobile network;
(b) performing a wake-up mode in which the node n i is periodically waked up in a multiple of the selected parameter p i ; And
(c) performing an active search mode to change the node n i to be activated to a consecutive slot c i after a neighbor search request is received,
Half of the target duty cycle is used in the periodic wake-up mode, the other half is reserved for the active search mode,
The active search mode is performed when a wake-up ratio (WR) is established according to the following equation using the following equation, and when WR is not satisfied with the above equation, Lt; / RTI > is performed after the delay,
WR? 2 / p i
In the equation, WR is the ratio of wake-up slots to total slots,
A method for searching neighboring nodes in an opportunistic mobile network using an asynchronous neighbor discovery protocol.
After the step (c)
Returning to step (b)
A method for searching neighboring nodes in an opportunistic mobile network using an asynchronous neighbor discovery protocol.
If the active search mode is performed as often as possible in multiples of the parameter pi ,
The number of slots between the start point of two consecutive active search modes can be calculated by the following equation,
In the equation, c i is the search range of the node n i in the continuous slot,
A method for searching neighboring nodes in an opportunistic mobile network using an asynchronous neighbor discovery protocol.
The step (a)
(a1) selecting the target duty cycle d (d low <d? d high );
(a2) selecting an inverse of the parameter closest to half of the selected target duty cycle; And
(a3) using the parameter to specify a search range in a neighbor search request,
A method for searching neighboring nodes in an opportunistic mobile network using an asynchronous neighbor discovery protocol.
The parameter is a prime number,
A method for searching neighboring nodes in an opportunistic mobile network using an asynchronous neighbor discovery protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160010798A KR101934156B1 (en) | 2016-01-28 | 2016-01-28 | A Fast and Energy-Efficient Asynchronous Neighbor Discovery Protocol for Cooperative Video Surveillance of Vehicles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160010798A KR101934156B1 (en) | 2016-01-28 | 2016-01-28 | A Fast and Energy-Efficient Asynchronous Neighbor Discovery Protocol for Cooperative Video Surveillance of Vehicles |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170090213A KR20170090213A (en) | 2017-08-07 |
KR101934156B1 true KR101934156B1 (en) | 2018-12-31 |
Family
ID=59653810
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160010798A KR101934156B1 (en) | 2016-01-28 | 2016-01-28 | A Fast and Energy-Efficient Asynchronous Neighbor Discovery Protocol for Cooperative Video Surveillance of Vehicles |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101934156B1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102027291B1 (en) * | 2018-02-26 | 2019-10-01 | 목원대학교 산학협력단 | Combined Quorum-based NDP in Heterogeneous Wireless Sensor Networks, Applied wireless sensor and its system |
CN112601199B (en) * | 2020-11-13 | 2022-02-22 | 西安电子科技大学 | Intelligent contact sensing method, device and system based on low-power-consumption Bluetooth |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101373134B1 (en) * | 2012-12-10 | 2014-03-12 | 포항공과대학교 산학협력단 | Adaptive, asynchronous rendezvous protocol for opportunistic networks, and portable communication device using it |
-
2016
- 2016-01-28 KR KR1020160010798A patent/KR101934156B1/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101373134B1 (en) * | 2012-12-10 | 2014-03-12 | 포항공과대학교 산학협력단 | Adaptive, asynchronous rendezvous protocol for opportunistic networks, and portable communication device using it |
Also Published As
Publication number | Publication date |
---|---|
KR20170090213A (en) | 2017-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gedik et al. | Mobieyes: Distributed processing of continuously moving queries on moving objects in a mobile system | |
Xu et al. | Opportunistic resource exchange in inter-vehicle ad-hoc networks | |
US9553769B2 (en) | Devices and methods for communication in ad-hoc networks | |
Mouratidis et al. | Continuous monitoring of spatial queries in wireless broadcast environments | |
CN106575294A (en) | Trajectory data inquiry method and apparatus | |
KR101934156B1 (en) | A Fast and Energy-Efficient Asynchronous Neighbor Discovery Protocol for Cooperative Video Surveillance of Vehicles | |
Dietzel et al. | Modeling in-network aggregation in VANETs | |
KR102041717B1 (en) | Methdo for calculating turst parameter between nodes in wireless network, method and apparatus for establishment of routing path using turst parameter | |
Kloiber et al. | Update delay: A new information-centric metric for a combined communication and application level reliability evaluation of cam based safety applications | |
CN111669711B (en) | Method and device for realizing vehicle information storage and computer equipment | |
CN109089246A (en) | data transmission method and related product | |
CN114039891A (en) | Sketch-based software-defined network large-flow end-to-end time delay and packet loss rate estimation method | |
US8521924B2 (en) | Method of context aware data-centric storage for wireless sensor networks | |
CN117473011A (en) | Data synchronization method, device and hybrid cache system | |
Soto et al. | REPRO: Time-constrained data retrieval for edge offloading in vehicular clouds | |
CN114758515B (en) | Traffic light timing determination method, device, equipment and storage medium | |
CN112020097B (en) | Collaborative sensing node selection method based on energy efficiency priority in mobile scene | |
Chang et al. | Distributed collaborative surveillance system based on leader election protocols | |
KR101591595B1 (en) | Method for predicting link in big database | |
Jin et al. | PC‐MAC: A Prescheduling and Collision‐Avoided MAC Protocol for Underwater Acoustic Sensor Networks | |
CN112861971A (en) | Cross-point road side perception target tracking method and system | |
CN106550329A (en) | The detection process method and device of mobile terminal | |
CN110572796A (en) | Failure node detection method, device and related equipment | |
KR101780144B1 (en) | METHOD OF LOAD BALANCING AND ROUTING IN WIRELESS SENSOR NETWORKS BASED ON IoT | |
CN111008611A (en) | Queuing time determining method and device, storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |