A Theory of Network Localization - Summary

Pages 9 (2259 words)
Download 0
Position servicing is an essential step for many computer and networking agencies. The concept of sensor networks is generally thought of as futuristic sources of finding the locations. The sensor nodes need to know their locations in order to detect and record events and to route packets using geometric routing…


Furthermore, since GPS requires line-of-sight between the receiver and satellites, it may not work well in buildings or in the presence of obstructions such as dense vegetation, buildings, or mountains blocking the direct view to the GPS satellites.
Recently, novel schemes have been proposed to determine the locations of the nodes in a network where only some special nodes (called beacons) know their locations. In these schemes, network nodes measure the distances to their neighbors and then try to determine their locations. The process of computing the locations of the nodes is called network localization. Although the designs of the previous schemes have demonstrated great engineering ingenuity and their effectiveness in certain settings verified through extensive simulations, some fundamental questions have not been addressed. As a result, the previous schemes are mainly heuristic-based and a full theoretical foundation of network localization is still lacking.
The problem of network localization in which some nodes know their locations and other nodes determine their locations by measuring the distances to their neighbors was investigated. Here is the process.
The study was undertaken to find out what were the precise conditions required for unique network localizability. To find this out a network localization problem was formulated. ...
Download paper
Not exactly what you need?

Related papers

Network Security
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets…
10 pages (2510 words)
Network Management
There does not appear to be a comprehensive IT strategy in place with emphasis on driving the business forward and creating a positive impact on the bottom line. This is reflected in the current network architecture, which is somewhat piecemeal reflecting a 'fire-fighting' approach in its design.…
10 pages (2510 words)
Network Localization
As such, modern information technology has been considered the result of a crucial connection between digital and communication technologies. It has been declared as the fundamental core of an information system, which involves various interactions between data, the users, software, hardware, business corporations and their environment.…
14 pages (3514 words)
Network Applications
This server was the unanimous choice because it was an open source server that was free in addition to being the most popular server, as it required minimal knowledge and effort for the purpose of using it to provide services to the client.…
4 pages (1004 words)
Neural Network
In general a biological neural network is composed of a group or groups of chemically connected or functionally associated neurons. A single neuron may be connected to many other neurons and the total number of neurons and connections in a network may be extensive. These connections are called synapses, are usually formed from axons to dendrites, though dendrodendritic microcircuits and other…
6 pages (1506 words)
Network Infrastructure
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…
12 pages (3012 words)