Preface |
|
xi | |
Acknowledgments |
|
xv | |
Authors |
|
xvii | |
1 Wireless Networks |
|
1 | (56) |
|
|
1 | (10) |
|
1.1.1 Introduction to Wireless Networks |
|
|
1 | (6) |
|
1.1.1.1 Development History of Wireless Networks |
|
|
1 | (5) |
|
1.1.1.2 Standards for Wireless Networks |
|
|
6 | (1) |
|
1.1.2 Classification of Wireless Networks |
|
|
7 | (4) |
|
1.2 Wireless Ad Hoc Network |
|
|
11 | (9) |
|
1.2.1 Introduction to Wireless Ad Hoc Networks |
|
|
11 | (3) |
|
1.2.2 Characteristics of Ad Hoc Networks |
|
|
14 | (2) |
|
1.2.3 The Structure of the Nodes in Ad Hoc Networks |
|
|
16 | (1) |
|
1.2.4 The Architecture of Ad Hoc Networks |
|
|
17 | (3) |
|
1.2.5 The Application of Ad Hoc Networks |
|
|
20 | (1) |
|
1.3 Wireless Sensor Network |
|
|
20 | (35) |
|
1.3.1 Introduction to the WSN |
|
|
20 | (1) |
|
1.3.2 The Structure of Nodes in WSNs |
|
|
21 | (3) |
|
1.3.3 The Architecture of WSNs |
|
|
24 | (8) |
|
1.3.4 Technologies of WSNs |
|
|
32 | (4) |
|
1.3.5 Applications of the WSN |
|
|
36 | (15) |
|
1.3.5.1 Military Application |
|
|
36 | (1) |
|
1.3.5.2 Agricultural Application |
|
|
37 | (2) |
|
1.3.5.3 Industrial Application |
|
|
39 | (3) |
|
1.3.5.4 Environmental Observation and Forecasting System |
|
|
42 | (2) |
|
1.3.5.5 Building Condition Monitoring |
|
|
44 | (2) |
|
|
46 | (3) |
|
|
49 | (1) |
|
1.3.5.8 Space and Ocean Exploration |
|
|
49 | (2) |
|
1.3.6 Characteristics and Challenges of WSNs |
|
|
51 | (4) |
|
|
55 | (2) |
2 Topology Control of Wireless Networks |
|
57 | (22) |
|
2.1 Introduction of Topology Control |
|
|
57 | (6) |
|
2.2 The Classification of Topology Control |
|
|
63 | (13) |
|
|
63 | (12) |
|
2.2.1.1 Minimize the Maximum Transmit Power |
|
|
64 | (2) |
|
2.2.1.2 Common Power Allocation |
|
|
66 | (1) |
|
2.2.1.3 Direction-Based Power Control |
|
|
67 | (1) |
|
2.2.1.4 Power Control Based on Node Degree |
|
|
67 | (3) |
|
2.2.1.5 Power Control Based on Proximity Graph |
|
|
70 | (5) |
|
2.2.2 Hierarchical Topology Control |
|
|
75 | (1) |
|
|
76 | (3) |
3 Clustering Algorithms |
|
79 | (162) |
|
3.1 Clustering Routing Protocols in Wireless Ad Hoc Networks |
|
|
79 | (6) |
|
|
79 | (2) |
|
3.1.2 Classic Clustering Algorithms in Wireless Ad Hoc Networks |
|
|
81 | (4) |
|
3.1.2.1 Minimum ID Clustering Algorithm |
|
|
81 | (1) |
|
3.1.2.2 Maximum Degree Clustering Algorithm |
|
|
81 | (1) |
|
3.1.2.3 Motion-Based Clustering Algorithm |
|
|
82 | (1) |
|
3.1.2.4 Weight-Based Clustering Algorithm |
|
|
83 | (1) |
|
3.1.2.5 Clustering Algorithm Based on Geographical Location |
|
|
84 | (1) |
|
3.2 Clustering Routing Protocol in a WSN |
|
|
85 | (147) |
|
|
85 | (2) |
|
3.2.2 The Advantages and Goals of Clustering Algorithms |
|
|
87 | (3) |
|
3.2.3 The Classification of Clustering Algorithms |
|
|
90 | (8) |
|
3.2.3.1 The Characteristics of Clusters |
|
|
91 | (3) |
|
3.2.3.2 The Characteristics of Cluster Heads |
|
|
94 | (1) |
|
3.2.3.3 The Process of Clustering |
|
|
95 | (3) |
|
3.2.3.4 The Whole Process of the Algorithms |
|
|
98 | (1) |
|
3.2.4 Classic Clustering Algorithms and Related Works in WSNs |
|
|
98 | (143) |
|
|
98 | (8) |
|
3.2.4.2 Centralized and Hybrid Clustering Algorithms (LEACH-C) |
|
|
106 | (7) |
|
3.2.4.3 Iterative Clustering Algorithms |
|
|
113 | (8) |
|
3.2.4.4 Chain Clustering Algorithms (PEGASIS) |
|
|
121 | (10) |
|
3.2.4.5 Energy Heterogeneous Clustering Algorithms |
|
|
131 | (7) |
|
3.2.4.6 Self-Adaptive Clustering Algorithms |
|
|
138 | (9) |
|
3.2.4.7 Uneven Clustering Algorithms |
|
|
147 | (29) |
|
3.2.4.8 Energy-Driven Clustering Algorithms |
|
|
176 | (9) |
|
3.2.4.9 Grid Clustering Algorithms |
|
|
185 | (4) |
|
3.2.4.10 Responsive Hybrid Clustering Algorithms |
|
|
189 | (3) |
|
3.2.4.11 Multilayer Clustering Algorithms |
|
|
192 | (11) |
|
3.2.4.12 Clustering Algorithms Based on Fuzzy Logic Control |
|
|
203 | (12) |
|
3.2.4.13 Other Clustering Algorithms |
|
|
215 | (17) |
|
|
232 | (9) |
4 Dominating Set Theory and Algorithms |
|
241 | (110) |
|
4.1 Basic Concept and Models of the Dominating Set |
|
|
241 | (2) |
|
|
241 | (1) |
|
|
241 | (3) |
|
|
242 | (1) |
|
4.1.2.2 Quasi Unit Disk Graph |
|
|
242 | (1) |
|
|
243 | (1) |
|
4.2 The Function of the Dominating Set |
|
|
243 | (1) |
|
4.3 The Classification of Dominating Set Algorithms |
|
|
244 | (92) |
|
4.3.1 The Maximal Independent Set Algorithm |
|
|
244 | (8) |
|
4.3.1.1 Related Works of MIS |
|
|
245 | (1) |
|
4.3.1.2 Classical MIS Algorithm |
|
|
246 | (6) |
|
4.3.2 Minimum Connected Dominating Set |
|
|
252 | (6) |
|
4.3.2.1 Related Works of the Minimum Connected Dominating Set |
|
|
252 | (2) |
|
4.3.2.2 MCDS Distributed Algorithms with Good Performance |
|
|
254 | (4) |
|
4.3.3 Weakly Connected Dominating Sets |
|
|
258 | (8) |
|
4.3.3.1 The Related Works of Weakly Connected Dominating Sets |
|
|
259 | (1) |
|
4.3.3.2 The Distributed WCDS Algorithm |
|
|
260 | (6) |
|
4.3.4 Extended Weakly Dominating Sets |
|
|
266 | (14) |
|
4.3.4.1 Classical Extended Dominating Set Algorithm |
|
|
266 | (2) |
|
4.3.4.2 Three Novel EWCDS Algorithms |
|
|
268 | (12) |
|
4.3.5 The Edge Dominating Set |
|
|
280 | (3) |
|
4.3.5.1 Related Works of the Edge Dominating Set |
|
|
280 | (1) |
|
4.3.5.2 The Classical Edge Dominating Set Algorithm |
|
|
281 | (2) |
|
4.3.6 The Dominating Set Algorithm under the Mobile Model |
|
|
283 | (10) |
|
4.3.6.1 The Introduction of a Mobile Model |
|
|
283 | (2) |
|
|
285 | (8) |
|
4.3.7 The Dominating Set Algorithm under the Interference Model |
|
|
293 | (11) |
|
4.3.7.1 The Physical Interference Model |
|
|
293 | (1) |
|
4.3.7.2 The Protocol Interference Model |
|
|
294 | (6) |
|
4.3.7.3 The Dominating Set Construction Algorithm Based on Interference |
|
|
300 | (4) |
|
|
304 | (7) |
|
4.3.8.1 k-Dominating Set and k-Connected Dominating Set |
|
|
304 | (3) |
|
4.3.8.2 The k-Connected m-Dominating Set |
|
|
307 | (4) |
|
|
311 | (25) |
|
4.3.9.1 The Research Meaning of Domatic Partition |
|
|
311 | (1) |
|
4.3.9.2 The Definition and Classification of the Domatic Partition Problem |
|
|
312 | (1) |
|
4.3.9.3 Domatic Partition on the Special Graph in Graph Theory |
|
|
313 | (4) |
|
4.3.9.4 The Research Status of Domatic Partition Problem |
|
|
317 | (4) |
|
4.3.9.5 k-Domatic Partition |
|
|
321 | (15) |
|
|
336 | (1) |
|
4.4 Distributed Algorithm in the Wireless Network |
|
|
336 | (7) |
|
|
337 | (1) |
|
4.4.2 The Distributed Algorithm |
|
|
338 | (5) |
|
4.4.2.1 The Classic Problem in the Distributed Computing-Maximal Independent Set Problem |
|
|
339 | (1) |
|
4.4.2.2 Finding a Fast Distributed Maximal Independent Set Algorithm |
|
|
340 | (1) |
|
|
341 | (2) |
|
|
343 | (1) |
|
|
343 | (8) |
5 Simulation and Example |
|
351 | (74) |
|
|
351 | (3) |
|
5.1.1 Computer Simulation Technology |
|
|
351 | (1) |
|
5.1.2 Simulation Tools of Wireless Networks |
|
|
351 | (3) |
|
5.2 Simulation Based on NS2 and Examples |
|
|
354 | (43) |
|
5.2.1 Introduction to NS2 |
|
|
354 | (1) |
|
5.2.2 Characteristics and Structure of NS2 |
|
|
354 | (3) |
|
5.2.2.1 Characteristics of NS2 |
|
|
354 | (1) |
|
5.2.2.2 The Hierarchical Structure of NS2 |
|
|
355 | (1) |
|
5.2.3 The General Methods and Processes of NS2 Simulation |
|
|
356 | (1) |
|
5.2.4 Installation of NS2 |
|
|
357 | (1) |
|
5.2.5 LEACH Protocol and Its Simulation Process |
|
|
358 | (32) |
|
5.2.5.1 The Details of the LEACH Algorithm |
|
|
359 | (4) |
|
5.2.5.2 The Installation of the LEACH Protocol |
|
|
363 | (5) |
|
5.2.5.3 Simulation of LEACH Protocol |
|
|
368 | (22) |
|
5.2.6 The EDUC Simulation Example |
|
|
390 | (3) |
|
5.2.7 EADC Simulation Examples |
|
|
393 | (4) |
|
5.2.7.1 Cluster Head Distribution |
|
|
394 | (1) |
|
|
395 | (2) |
|
5.3 Simulation and Example Based on C++ |
|
|
397 | (14) |
|
5.3.1 Introduction to VC++ |
|
|
397 | (1) |
|
5.3.2 The Development Environment of VC++ |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
5.3.3 Simulation Example of the EWCDS Algorithm |
|
|
399 | (12) |
|
5.3.3.1 Simulation Results |
|
|
400 | (6) |
|
5.3.3.2 The Specific Implementation Process of Simulation |
|
|
406 | (5) |
|
5.4 Simulation and Example Based on Java |
|
|
411 | (12) |
|
5.4.1 Introduction to Java |
|
|
411 | (2) |
|
5.4.1.1 Download and installation of the Java Development Kit package |
|
|
412 | (1) |
|
5.4.2 Simulation Example of the EDCDS Algorithm |
|
|
413 | (10) |
|
5.4.2.1 Algorithm Description |
|
|
413 | (1) |
|
5.4.2.2 Simulation Analysis and Results |
|
|
414 | (9) |
|
|
423 | (2) |
Index |
|
425 | |