Please use this identifier to cite or link to this item: http://hdl.handle.net/1893/15988
Appears in Collections:Computing Science and Mathematics Technical Reports
Title: Network Boundary Identification using Local Information
Authors: Fayed, Marwan
Mouftah, Hussein T
Contact Email: marwan.fayed@stir.ac.uk
Citation: Fayed M & Mouftah HT (2007) Network Boundary Identification using Local Information, TR-2007-05. School of Information Technology & Engineering, University of Ottawa.
Issue Date: 2007
Publisher: School of Information Technology & Engineering, University of Ottawa
Series/Report no.: TR-2007-05
Abstract: Detection of nodes on the network boundary is necessary for correct operation in many wireless applications. Many virtual coordinate constructions rely on the furthest set of nodes as beacons, and sensing applications may find useful the knowledge of the network edge. In this paper we propose local convex view (lcv) as a means to identify nodes close to the network edge. It is based on the idea that -hulls can capture the shape of a set of points, and motivated by the hypothesis that some structural information relevant to the network is buried within view of many nodes. The lcv differs from most previous methods in that it is a localized algorithm. Nodes using lcv establish neighbourhood coordinates where no location information is available a priori. In those cases where needed information is missing, we adopt a simple probabilistic model to decide the boundary status of a node. We identify two metrics for evaluation, and compare via simulation the performance of lcv against two methods with similar properties. In our experiments we find lcv to be consistent in its performance, and resilient to the impediments facing other methods.
Type: Technical Report
URI: http://hdl.handle.net/1893/15988
Affiliation: Computing Science - CSM Dept
University of Ottawa

Files in This Item:
File Description SizeFormat 
Network Boundary Identification.pdf437.72 kBAdobe PDFUnder Embargo until 31/12/2999     Request a copy

Note: If any of the files in this item are currently embargoed, you can request a copy directly from the author by clicking the padlock icon above. However, this facility is dependant on the depositor still being contactable at their original email address.

This item is protected by original copyright



Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.