StudentShare solutions
Triangle menu

A Theory of Network Localization - Summary - Essay Example

Not dowloaded yet

Extract of sample
A Theory of Network Localization - Summary

Furthermore, since GPS requires line-of-sight between the receiver and satellites, it may not work well in buildings or in the presence of obstructions such as dense vegetation, buildings, or mountains blocking the direct view to the GPS satellites.
Recently, novel schemes have been proposed to determine the locations of the nodes in a network where only some special nodes (called beacons) know their locations. In these schemes, network nodes measure the distances to their neighbors and then try to determine their locations. The process of computing the locations of the nodes is called network localization. Although the designs of the previous schemes have demonstrated great engineering ingenuity and their effectiveness in certain settings verified through extensive simulations, some fundamental questions have not been addressed. As a result, the previous schemes are mainly heuristic-based and a full theoretical foundation of network localization is still lacking.
The problem of network localization in which some nodes know their locations and other nodes determine their locations by measuring the distances to their neighbors was investigated. Here is the process.
The study was undertaken to find out what were the precise conditions required for unique network localizability. To find this out a network localization problem was formulated. ...
Each node is located at a fixed position in Rd and has associated with it a specific set of "neighboring" nodes. The essential property we will require in this paper is that the definition of a neighbor be a symmetric relation on {1, 2,,n} in the sense that node j is a neighbor of node i if and only if node i is also a neighbor of node j. Under these conditions, N's neighbor relationships can be conveniently described by an undirected graph GN = (V, EN) with vertex set V {1, 2,...,n} and edge set EN defined so that (i, j) is one the graph's edges precisely when nodes i and j are neighbors. We assume throughout that GN is a connected graph. The network localization problem with distance information is to determine the locations pi of all nodes in Rd given the graph of the network GN, the positions of the beacons pj, j {1, 2, ...,m} in Rd, and the distance N =(i, j)between each neighbor pair (i, j) EN.


Solvability
Solvability of the following theorem depends on the global rigidity.
.

Global Rigidity
Global Rigidity can be explained by the following theorem.

The formation Fq is generically globally rigid if every sufficiently small perturbation q of p creates a globally rigid formation Fq.

A graph G is redundantly rigid in Rd if the removal of any single edge results in a graph that is also generically rigid in Rd. Fig. 3 suggests, a graph needs to be generically redundantly rigid to ensure generic global rigidity.


In grounded graphs each vertex represents a network node and two vertices in the graph are connected if the distance between the two is known; that is, when the distance between the two nodes is measured or when the two nodes are beacon nodes and their distance is implicitly known. So a network has a unique ...Show more

Summary

Position servicing is an essential step for many computer and networking agencies. The concept of sensor networks is generally thought of as futuristic sources of finding the locations. The sensor nodes need to know their locations in order to detect and record events and to route packets using geometric routing…
Author : klockocyrus
A Theory of Network Localization - Summary essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"A Theory of Network Localization - Summary"
with a personal 20% discount.
Grab the best paper

Related Essays

Network
Ethernet Tutorial Part I: Networking Basics, viewed 23 May 2011, http://www.technick.net/public/code/cp_dpage.php?aiocp_dp=guide_networking_ethernet_01. 7 List of Figures Figure 1 Repeater and Hub with different topologies 2 Figure 2 Basic Switch Setup 3 Figure 3 Loop Removal Through STP 6 Figure 4 Typical Router Configuration 7 List of Tables Table 1 Node Limitation in Hubs 5 Till present, Ethernet maintains its position of being the most popular LAN technology due to the balance it provides between the speed and cost, its ease of installation, being most widely accepted in the computer market and its universal support to practically all protocols (Lantronix n.d.).
4 pages (1000 words) Essay
The Localization of Management in China
China is a population powerhouse and very emerging market with very complex network of controls and management skills which determine the success of the management in the Chinese grounds and market. Understanding Chinese culture is the key to managing the localized Chinese market.
45 pages (11250 words) Essay
Network Localization
Businesses have evolved since in the way the staff and employees work in IT has given everyone an opportunity. It has provided every person with the ability to communicate and perform tasks which were impossible to do before the arrival of the 21st century.
14 pages (3500 words) Essay
Network
It can typically transmit data rates up to 10 Mbps. The IEEE Ethernet standard 802.3 (‘IEEE Ethernet’ 2011) defines all the configuration rules laying down a network and also defines the networked devices’ interaction with one another. The distance between
4 pages (1000 words) Essay
Discuss the relevance of actor network theory and systems thinking for design and implementation of infrastructure systems
Actor network theory and system thinking are important approaches in the management of an information system. The actor network theory aids in approaching the landscape of society and
7 pages (1750 words) Essay
Network
According to Jim Randel, credit cards are used to borrow money from banks, which is a loan without collateral. A debit card is used to access a customer’s own money, which is backed by his or
2 pages (500 words) Essay
Summary
The MAC sub layer assembles data into frames and addresses ad error detection. On the other hand, the MAC layer de-assembles, addresses recognition, and error detection. Access points are base stations found in wireless
1 pages (250 words) Essay
U.S. Textile Industry Localization
It is well known that localization of the industrial enterprises depends on a number of factors such as power supplies, availability of resources and raw materials, proximity to the market and others. However, the industry was initially located in New England with machinery imported from Europe and the first cotton mill founded in 1790.
2 pages (500 words) Essay
Summary of the Chapter Queer Theory
The writer of the paper informs us that queer theory is involved in the exploration of gay and lesbian relationships based on the social structure and the deviant sexual behaviour. He cross-examines the aspects of homosexual, the history of how sexuality has been portrayed in the film, as well as structure of the buddy movie and ideas of the camp.
1 pages (250 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation