X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/ThesisAli.git/blobdiff_plain/c5833cac353b334ae2450046541cb61c6b5b54e3..6cacb63d8ed60c9822de6be85af0c827783658df:/Thesis.toc?ds=inline diff --git a/Thesis.toc b/Thesis.toc index 374c8f7..656ebdb 100755 --- a/Thesis.toc +++ b/Thesis.toc @@ -18,10 +18,10 @@ \contentsline {section}{\numberline {1.5}The Main Challenges in Wireless Sensor Networks}{25}{section.1.5} \contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms in Wireless Sensor Networks}{27}{section.1.6} \contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing:}{27}{subsection.1.6.1} -\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy:}{28}{subsubsection.1.6.1.1} +\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy:}{27}{subsubsection.1.6.1.1} \contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing:}{28}{subsubsection.1.6.1.2} \contentsline {subsection}{\numberline {1.6.2}Cluster Architectures:}{28}{subsection.1.6.2} -\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes:}{29}{subsection.1.6.3} +\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes:}{28}{subsection.1.6.3} \contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes:}{29}{subsubsection.1.6.3.1} \contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes:}{31}{subsubsection.1.6.3.2} \contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes:}{32}{subsection.1.6.4} @@ -36,8 +36,8 @@ \contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility:}{34}{subsubsection.1.6.7.2} \contentsline {section}{\numberline {1.7}Network Lifetime in Wireless Sensor Networks}{34}{section.1.7} \contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{35}{section.1.8} -\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems:}{37}{section.1.9} -\contentsline {section}{\numberline {1.10}Energy Consumption Modeling:}{38}{section.1.10} +\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems:}{36}{section.1.9} +\contentsline {section}{\numberline {1.10}Energy Consumption Modeling:}{37}{section.1.10} \contentsline {section}{\numberline {1.11}Conclusion}{39}{section.1.11} \contentsline {chapter}{\numberline {2}Related Literatures}{41}{chapter.2} \contentsline {section}{\numberline {2.1}Introduction}{41}{section.2.1} @@ -50,54 +50,56 @@ \contentsline {section}{\numberline {3.2}Evaluation Tools}{51}{section.3.2} \contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{52}{subsection.3.2.1} \contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{53}{subsection.3.2.2} -\contentsline {section}{\numberline {3.3}Optimization Solvers}{56}{section.3.3} +\contentsline {section}{\numberline {3.3}Optimization Solvers}{58}{section.3.3} \contentsline {section}{\numberline {3.4}Conclusion}{61}{section.3.4} \contentsline {part}{II\hspace {1em}Contributions}{63}{part.2} \contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{65}{chapter.4} -\contentsline {section}{\numberline {4.1}Summary}{65}{section.4.1} -\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{65}{section.4.2} -\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{65}{subsection.4.2.1} -\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{66}{subsection.4.2.2} -\contentsline {subsection}{\numberline {4.2.3}Main Idea}{67}{subsection.4.2.3} -\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{68}{subsubsection.4.2.3.1} +\contentsline {section}{\numberline {4.1}Introduction}{65}{section.4.1} +\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{66}{section.4.2} +\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{66}{subsection.4.2.1} +\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{67}{subsection.4.2.2} +\contentsline {subsection}{\numberline {4.2.3}Main Idea}{68}{subsection.4.2.3} +\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{69}{subsubsection.4.2.3.1} \contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{69}{subsubsection.4.2.3.2} \contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{69}{subsubsection.4.2.3.3} \contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{69}{subsubsection.4.2.3.4} -\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{69}{section.4.3} -\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{71}{section.4.4} -\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{71}{subsection.4.4.1} +\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{70}{section.4.3} +\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{72}{section.4.4} +\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{72}{subsection.4.4.1} \contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{72}{subsection.4.4.2} \contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{72}{subsection.4.4.3} \contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{73}{subsection.4.4.4} \contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Subregions}{74}{subsection.4.4.5} -\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Primary Point Models}{79}{subsection.4.4.6} -\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{83}{subsection.4.4.7} -\contentsline {section}{\numberline {4.5}Conclusion}{88}{section.4.5} -\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{91}{chapter.5} -\contentsline {section}{\numberline {5.1}Summary}{91}{section.5.1} -\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{91}{section.5.2} -\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{92}{subsection.5.2.1} -\contentsline {subsection}{\numberline {5.2.2}Primary Points based Multiround Coverage Problem Formulation}{93}{subsection.5.2.2} -\contentsline {section}{\numberline {5.3}Experimental Study and Analysis}{95}{section.5.3} -\contentsline {subsection}{\numberline {5.3.1}Simulation Setup}{95}{subsection.5.3.1} -\contentsline {subsection}{\numberline {5.3.2}Metrics}{96}{subsection.5.3.2} -\contentsline {subsection}{\numberline {5.3.3}Results Analysis and Comparison }{97}{subsection.5.3.3} -\contentsline {section}{\numberline {5.4}Conclusion}{100}{section.5.4} -\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{103}{chapter.6} -\contentsline {section}{\numberline {6.1}summary}{103}{section.6.1} -\contentsline {section}{\numberline {6.2}THE PeCO PROTOCOL DESCRIPTION}{103}{section.6.2} -\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{103}{subsection.6.2.1} -\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{106}{subsection.6.2.2} -\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{107}{subsection.6.2.3} -\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{108}{section.6.3} -\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{110}{section.6.4} -\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{110}{subsection.6.4.1} -\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{111}{subsection.6.4.2} -\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{111}{subsubsection.6.4.2.1} -\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{112}{subsubsection.6.4.2.2} -\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{112}{subsubsection.6.4.2.3} -\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{112}{subsubsection.6.4.2.4} -\contentsline {section}{\numberline {6.5}Conclusion}{113}{section.6.5} -\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{117}{part.3} -\contentsline {chapter}{Conclusion and Perspectives}{119}{chapter*.6} -\contentsline {part}{Bibliographie}{134}{chapter*.9} +\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Primary Point Models}{80}{subsection.4.4.6} +\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{85}{subsection.4.4.7} +\contentsline {section}{\numberline {4.5}Conclusion}{91}{section.4.5} +\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{93}{chapter.5} +\contentsline {section}{\numberline {5.1}Introduction}{93}{section.5.1} +\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{94}{section.5.2} +\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{94}{subsection.5.2.1} +\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{95}{section.5.3} +\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{97}{section.5.4} +\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{97}{subsection.5.4.1} +\contentsline {subsection}{\numberline {5.4.2}Metrics}{98}{subsection.5.4.2} +\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{99}{subsection.5.4.3} +\contentsline {section}{\numberline {5.5}Conclusion}{104}{section.5.5} +\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{107}{chapter.6} +\contentsline {section}{\numberline {6.1}Summary}{107}{section.6.1} +\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{107}{section.6.2} +\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{107}{subsection.6.2.1} +\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{110}{subsection.6.2.2} +\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{111}{subsection.6.2.3} +\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{113}{section.6.3} +\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{114}{section.6.4} +\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{114}{subsection.6.4.1} +\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{115}{subsection.6.4.2} +\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{115}{subsubsection.6.4.2.1} +\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{115}{subsubsection.6.4.2.2} +\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{117}{subsubsection.6.4.2.3} +\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{117}{subsubsection.6.4.2.4} +\contentsline {section}{\numberline {6.5}Conclusion}{117}{section.6.5} +\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{121}{part.3} +\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{123}{chapter.7} +\contentsline {section}{\numberline {7.1}Conclusion}{123}{section.7.1} +\contentsline {section}{\numberline {7.2}Perspectives}{124}{section.7.2} +\contentsline {part}{Bibliographie}{139}{chapter*.6}