本文研究面向可靠的無線傳感器網絡的協議設計,測試和診斷。 / 在協議設計方面,我們集中研究媒體接入層的協議設計。首先,我們為水下無線傳感器網絡提出一個有效的媒體接入層協議RAS 。這個協議利用了水下無線傳感器網絡和地面無線傳感器網絡的媒體傳輸時延的差別,采用了並行傳輸的優先級方法。由于會導致碰撞,這種並行傳輸的方法不能被用在地面無線傳感器網絡中。該方法為高負荷的傳感器節點分配更長的傳輸時間。這種具有優先級的機制也同時提高了公平方面的性能。第二,我們處理水下無線傳感器網絡中由于報文失導致的不可靠的問題。基于之前提出的協議RAS ,我們提出了可靠的RAS 協議。該協議可以在可靠性和有效性方便達到一個平衡。它里面的報文確認和重傳機制同傳統的方法不同,所以它可以在提高可靠性的同時保證吞吐量不會被大幅降低。 / 第三,在協議測試方面,我們設計了RealProct ,一種新的可靠的用于無線傳感器網絡的一致性協議測試(測試協議實現是否符合協議規範)的架構。RealProct 采用了實際的傳感器節點來保證測試盡可能的接近實際部署。為了節省使用大規模實際部署來測試的硬件成本和控制成本, RealProct 使用少量傳感器節點虛擬各樣的拓撲結構和事件。同時,測試執行和裁決算法也用于最小化測試用例執行次數,並保證假陰和假陽錯誤低于給定值。 / 最後,我們提出了MDiag,一種使用移動智能手機巡視無線傳感器網絡並診斷網絡錯誤的方法。由于該智能手機不是無線傳感器網絡的組成部分,因此該診斷不會像其它已有的診斷方法那樣影響原無線傳感器網絡的運行。並且,使用智能手機巡視並診斷無線傳感器網絡比部署另一個用于診斷的網絡更有效。在巡視過程中,無線傳感器網絡所交互的報文被收集起來,然後被我們所設計的報文解析器所分析。然後,我們設計了統計性規則來指導異常現象的診斷。為了提高巡視效率,我們提出了一個巡視方法MSEP。 / 我們做了大量實驗驗證以上提出的方法和算法,結果表明它們在達到可靠性無線傳感器網絡的目標上很有效。 / This thesis investigates the protocol design, testing, and diagnosis of Wireless Sensor Networks (WSNs) to achieve dependable WSNs. / In the aspect of protocol design, we focus on the MAC (Medium Access Control) layer protocol design. First, we propose an efficient MAC protocol RAS (routing and application based scheduling protocol) for underwater acoustic sensor networks (UWASNs), a type of WSNs that are deployed in the water. Utilizing the medium propagation difference between UWASNs and terrestrial wireless sensor networks (TWSNs), RAS performs parallel transmissions which would definitely result in collisions in TWSNs. It schedules the transmissions with different priorities by allocating longer time to heavier-traffic sensor nodes. The priority mechanism also benefits the fairness performance. Second, we tackle the unreliability problem caused by the packet loss in UWASNs. Based on the previously designed RAS, we propose a reliable RAS called RRAS that obtains a tradeoff between the reliability and the efficiency. RRAS applies an ACK and retransmission mechanism that is different from the traditional one, so that it can maintain a comparable throughput while improving reliability. / Third, in the area of protocol testing, we design RealProct (reliable Protocol conformance testing with Real sensor nodes), a novel and reliable framework for performing protocol conformance testing in WSNs, i.e., testing the protocol implementations against their specifications. With real sensor nodes, RealProct can ensure that the testing scenarios are as close to the real deployment as possible. To save the hardware cost and control efforts required by testing with large-scale real deployments, RealProct virtualizes a network with any topology and generates non-deterministic events using only a small number of sensor nodes. In addition, test execution and verdict are optimized to minimize the number of test case runs, while guaranteeing satisfactory false positive and false negative rates. / Finally, we propose MDiag, a Mobility-assisted Diagnosis approach that employs smartphones to patrol the WSNs and diagnose failures. Diagnosing with a smartphone which is not a component of WSNs does not intrude the execution of the WSNs as most of the existing diagnosis methods. Moreover, patrolling the smartphone in the WSNs to investigate failures is more efficient than deploying another diagnosis network. During the patrol, packets exchanged in the WSNs are collected and then analyzed by our implemented packet decoder. Statistical rules are also designed to guide the detection of abnormal cases. Aiming at improving the patrol efficiency, a patrol approach MSEP (maximum snooping efficiency patrol) is proposed. We compare MSEP with a naive method, the greedy method, and a baseline method, and demonstrate that MSEP is better in increasing the detection rate and reducing the patrol time than other methods. / We perform extensive evaluations to verify the proposed techniques and algorithms, and the results confirm their advantages in achieving dependable WSNs. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Xiong, Junjie. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 136-154). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction and Background Study --- p.1 / Chapter 1.1 --- Wireless Sensor Networks (WSNs) --- p.1 / Chapter 1.1.1 --- Sensor Node --- p.5 / Chapter 1.1.2 --- The Base Station (BS) --- p.8 / Chapter 1.1.3 --- The Operating System (OS) of the Sensor Node --- p.8 / Chapter 1.1.4 --- The Protocol Design of WSNs --- p.11 / Chapter 1.2 --- Thesis Scope and Contributions --- p.20 / Chapter 1.2.1 --- Protocol Design --- p.20 / Chapter 1.2.2 --- Protocol Testing --- p.22 / Chapter 1.2.3 --- Protocol Diagnosis --- p.23 / Chapter 1.3 --- Thesis Organization --- p.23 / Chapter 2 --- An Efficient MAC Protocol Design --- p.25 / Chapter 2.1 --- Introduction --- p.26 / Chapter 2.2 --- Related Work --- p.28 / Chapter 2.3 --- RAS Overview --- p.29 / Chapter 2.3.1 --- Scheduling Element --- p.32 / Chapter 2.4 --- The Scheduling Problem in UWASNs --- p.34 / Chapter 2.4.1 --- Scheduling Principles --- p.34 / Chapter 2.4.2 --- Scheduling Problem Formulation --- p.35 / Chapter 2.4.3 --- Scheduling Problem Analysis --- p.37 / Chapter 2.5 --- RAS Protocol --- p.38 / Chapter 2.5.1 --- Scheduling Algorithm of the RAS Protocol --- p.38 / Chapter 2.5.2 --- Analysis of the RAS Protocol --- p.39 / Chapter 2.6 --- Performance Evaluation --- p.42 / Chapter 2.6.1 --- Schedule Length --- p.42 / Chapter 2.6.2 --- Network Throughput --- p.44 / Chapter 2.6.3 --- Average End-to-end Delay --- p.46 / Chapter 2.6.4 --- Average Maximum Queue Length per Node --- p.47 / Chapter 2.7 --- Discussions and Conclusions --- p.49 / Chapter 3 --- A Reliable MAC Protocol Design --- p.51 / Chapter 3.1 --- Introduction --- p.52 / Chapter 3.2 --- Related Work --- p.54 / Chapter 3.3 --- RRAS Protocol --- p.55 / Chapter 3.3.1 --- Overview of NACK-retransmission Mechanism --- p.56 / Chapter 3.3.2 --- Retransmission Mechanism --- p.57 / Chapter 3.3.3 --- Retransmission Time --- p.59 / Chapter 3.4 --- Performance Evaluation --- p.61 / Chapter 3.4.1 --- Retransmission Time of RRAS --- p.62 / Chapter 3.4.2 --- Working Time of RRAS and RAS --- p.63 / Chapter 3.4.3 --- Success Rate of RRAS and RAS --- p.64 / Chapter 3.4.4 --- Throughput of RRAS and RAS --- p.65 / Chapter 3.5 --- Conclusions --- p.66 / Chapter 4 --- Reliable Protocol Conformance Testing --- p.67 / Chapter 4.1 --- Introduction --- p.68 / Chapter 4.2 --- Related Work --- p.71 / Chapter 4.3 --- Protocol Conformance Testing --- p.73 / Chapter 4.3.1 --- PCT Process --- p.74 / Chapter 4.3.2 --- PCT Architecture --- p.75 / Chapter 4.4 --- Design of the RealProct Framework --- p.76 / Chapter 4.5 --- RealProct Techniques --- p.79 / Chapter 4.5.1 --- Topology Virtualization --- p.80 / Chapter 4.5.2 --- Event Virtualization --- p.81 / Chapter 4.5.3 --- Dynamic Test Execution --- p.85 / Chapter 4.6 --- Generality of RealProct --- p.88 / Chapter 4.7 --- Evaluation --- p.89 / Chapter 4.7.1 --- Detecting New Bugs in TCP --- p.90 / Chapter 4.7.2 --- Detecting Previous Bugs in TCP --- p.94 / Chapter 4.7.3 --- Testing Routing Protocol RMRP --- p.98 / Chapter 4.8 --- Conclusions --- p.99 / Chapter 5 --- Mobility-assisted Diagnosis for WSNs --- p.101 / Chapter 5.1 --- Introduction --- p.102 / Chapter 5.2 --- Related Work --- p.105 / Chapter 5.3 --- MDiag Background --- p.108 / Chapter 5.3.1 --- Network Architecture --- p.108 / Chapter 5.3.2 --- Failure Classification --- p.108 / Chapter 5.4 --- MDiag Framework --- p.109 / Chapter 5.4.1 --- Packet Decoder Input and Output --- p.111 / Chapter 5.4.2 --- Statistical Rules on Packet Analysis --- p.112 / Chapter 5.5 --- Coverage-oriented Smartphone Patrol Algorithms --- p.115 / Chapter 5.5.1 --- Naive Method (NM) --- p.115 / Chapter 5.5.2 --- Greedy Method (GM) --- p.116 / Chapter 5.5.3 --- Maximum Snooping Efficiency Patrol (MSEP) --- p.118 / Chapter 5.6 --- Evaluations --- p.119 / Chapter 5.6.1 --- Permanent Failure Detection --- p.121 / Chapter 5.6.2 --- Short-term Failure Detection --- p.122 / Chapter 5.7 --- Conclusions --- p.130 / Chapter 6 --- Conclusions --- p.132 / Bibliography --- p.136
Identifer | oai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_328163 |
Date | January 2012 |
Contributors | Xiong, Junjie., Chinese University of Hong Kong Graduate School. Division of Computer Science and Engineering. |
Source Sets | The Chinese University of Hong Kong |
Language | English, Chinese |
Detected Language | English |
Type | Text, bibliography |
Format | electronic resource, electronic resource, remote, 1 online resource (xiv, 154 leaves) : ill. (some col.) |
Rights | Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) |
Page generated in 0.0035 seconds