System and method for hierarchical clustering of wireless mobile network
11412039 · 2022-08-09
Assignee
Inventors
Cpc classification
H04W4/80
ELECTRICITY
H04W4/70
ELECTRICITY
International classification
G06F15/16
PHYSICS
Abstract
A method, network system, and non-transitory computer readable medium that arrange a set of wireless mobile devices into a two-level clustering structure including a cluster in a first-level and a cluster in the second-level, based on node status registered and algorithm preinstalled in a back-end server, where each of the set of wireless mobile devices is assigned either one of a slave member of a cluster in the first-level, a master of a cluster in the first-level where the master is also a member of a cluster in the second-level, or a super master of a cluster in the second-level where a master of a cluster in the first-level is assigned as the super master. The two-level clustering structure is periodically updated. Only the super-masters are configured to communicate with the back-end server via a long-range connection to WLAN, while a short-range wireless interface is used for internal communications.
Claims
1. A method comprising: registering a node status comprising a series number, a location, a battery level and an availability of a long-range connection to a wireless local area network (WLAN) for each of a set of wireless mobile devices, wherein the set of wireless mobile devices is configured to communicate with a back-end server via the long-range connection to the WLAN, and internally via a short-range wireless interface; arranging the set of wireless mobile devices into a two-level clustering structure comprising a cluster class selected from the group consisting of a first cluster in a first-level and a second cluster in a second-level, wherein each of the set of wireless mobile devices is assigned one of three positions in the first cluster or the second cluster: 1) a slave member of the first cluster in the first-level, 2) a master of the first cluster in the first-level where the master is also the slave member of the second cluster in the second-level, or 3) a super master of the second cluster in the second-level where the master of the first cluster in the first-level is assigned as the super master and the cluster class in the first-level is assigned as the cluster class in the second-level; and updating the two-level clustering structure periodically based on the node status registered most recently, wherein each of the set of wireless mobile devices is reassigned either one of the three positions in clustering in a cluster, wherein the super masters are configured to communicate with the back-end server via the long-range connection to the WLAN, and a maximum cluster size given by a specification of the short-range wireless interface, wherein the arranging includes: obtaining a set of solutions minimizing an objective function Z; and assigning each of the set of wireless mobile devices one of the three positions in the first cluster or the second cluster based on the set of solutions, wherein the objective function Z is defined by below Equation (1) as:
Z=Σ.sub.i=1.sup.NΣ.sub.j=1.sup.NC.sub.ijX.sub.ij+Σ.sub.j=1.sup.NF.sub.jY.sub.j+Σ.sub.i=1.sup.NΣ.sub.j=1.sup.NC.sub.ijV.sub.ij+Σ.sub.j=1.sup.NF.sub.jW.sub.j, (7) and obtaining the set of solutions minimizing the objective function is carried out by a processor having circuitry with instructions to solve a minimization problem, based on the node status registered and under constraints expressed with below equations (8)-(16),
Σ.sub.j=1.sup.NX.sub.ij=1, i=1 . . . N, (8)
Σ.sub.i=1.sup.NX.sub.ij≤PY.sub.j, j=1 . . . N, (9)
Σ.sub.j=1.sup.NC.sub.ijX.sub.ij≤R, i=1 . . . N, (10)
Σ.sub.j=1.sup.NV.sub.ij≤Y.sub.i, i=1 . . . N, (11)
Σ.sub.i=1.sup.NV.sub.ij≤PW.sub.j, j=1 . . . N, (12)
Σ.sub.j=1.sup.NC.sub.ijV.sub.ij≤RY.sub.j, i=1 . . . N, (13)
W.sub.j≤, j=1 . . . N, (14)
W.sub.j≤WF.sub.j, j=1 . . . N, (15)
W.sub.j≤BL.sub.j, j=1 . . . N, (16) and with below definitions (1)-(6),
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) A more complete appreciation of this disclosure and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
DETAILED DESCRIPTION
(13) In the drawings, like reference numerals designate identical or corresponding parts throughout the several views. Further, as used herein, the words “a,” “an” and the like generally carry a meaning of “one or more,” unless stated otherwise. The drawings are generally drawn to scale unless specified otherwise or illustrating schematic structures or flowcharts.
(14) Furthermore, the terms “approximately,” “approximate,” “about,” and similar terms generally refer to ranges that include the identified value within a margin of 20%, 10%, or preferably 5%, and any values therebetween.
(15) As described in “background,” many solutions have been proposed for reducing energy for large-scale tracking systems using either Bluetooth or Wi-Fi as the short-range wireless interfaces. However, none of those proposed solutions are fully suitable for large-scale tracking applications in open areas with huge crowds, high mobility and signal interference.
(16) Aspects of the present disclosure are directed to a new method, system and computer program product for large-scale systems in environments in open areas with huge crowds and high mobility where communication is affected by interference and errors. Energy-efficient solutions for large-scale tracking wireless sensor networks (WSN) under such environments are described. The new approach is based on bi-level hierarchical clustering, and has several realistic features that are addressed simultaneously. Mobile clusters classified in two levels, the first-level cluster with a super master and the second-level cluster with a master are described, in which Wi-Fi communication is limited to the super masters that constitute a subset of the total number of nodes (mobile wireless devices). In addition, the method, system and computer program product consider both Bluetooth and Wi-Fi signals, and specify a number of clusters and a formation of the clusters including assignment of a master and members for each cluster in the first-level and of a super master and members for each cluster in the second-level, for maximizing the performance and minimizing the energy consumption. Moreover, the method, system and computer program product consider the interference between Bluetooth and Wi-Fi signals as well as between different Bluetooth signals for multiple nodes co-existing in the same area.
(17)
(18) In the present disclosure, the analysis is based on using Bluetooth version 4.2, also known as Bluetooth Low Energy (BLE) or Bluetooth Smart. This version has several useful features such as higher speed, greater capacity, and enhanced security, as described in Bluetooth Specifications, at Bluetooth Technology Website, https://www.bluetooth.com, Retrieved August 2017, the entire content of which is herein incorporated by reference. The version 4.2 allows only trusted owners to track device locations and confidently pair devices. It also facilitates Internet of Things (IoT) applications due to its low power consumption and efficiency in transmitting data over the Internet.
(19) Here, a mathematical programming model is presented for maximizing the performance and minimizing energy consumption of large-scale tracking systems based on the two-level hierarchical clustering structure. In order to achieve the goals of efficient energy consumption and good quality of service, the following objectives are preferably attained simultaneously: I. Minimizing the number of clusters (masters) for the first-level of the clustering hierarchy; II. Minimizing the total distance between masters and cluster members for the first-level of the clustering hierarchy; III. Minimizing the number of clusters (super masters) for the second-level of the clustering hierarchy; and IV. Minimizing the total distance between super masters and masters for the second-level of the clustering hierarchy.
(20) The first objective, minimizing the number of the clusters, leads to reducing the energy consumption, which in turn leads to maximizing the network lifetime. Moreover, minimizing the number of clusters reduces channel access congestion, which reduces the interference among Bluetooth-based clusters as well as Bluetooth/Wi-Fi communications when they are employed in the same area. The second objective, which is minimizing the total distance between first-level masters and cluster members, leads to higher accuracy of positioning. The master node represents the location information of all its cluster members. Therefore, communicating via short-range wireless interfaces such as Bluetooth is more accurate for reporting locations than communicating via long-range radio interfaces. The expected error in positioning is ±10 m, which is the maximum range of the Bluetooth signals. Furthermore, shorter distances reduce the energy consumption and the transmission delay of Bluetooth networks, since communicating via short-range wireless interfaces such as Bluetooth consumes lower power than communicating via long-range radio interfaces. The third objective is similar to the first objective, and it has similar benefits, but it applies to the second level of the network clustering hierarchy. Likewise, the fourth objective is similar to the second objective and has similar advantages, but it applies to the second level of the hierarchy.
(21) Equations (1)-(6) defines symbols for expressing the above objectives by a set of equations discussed later. Here, the subscripts i=1 to N denote the cluster member number, the subscripts j=1 to N denote the master number, and C.sub.ij, the distance between node i and node j. Let WF.sub.j denote the availability of Wi-Fi service in node (user's smartphone) j as defined in (1). The user's battery level (BL.sub.j) is defined as in (2). Equations (3)-(6) define the decision variables corresponding to a status of the node in the clustering hierarchy, where equations (3) and (4) describe the decision variables for the first-level, while equations (5) and (6) describe the decision variables for the second level.
(22)
(23) A complete mathematical representation for attaining the objectives specified above is given by the set of equations (7)-(16), based on the definitions (1)-(6). The equation (7) gives an objective function Z to be minimized, where the four terms represent the objectives I to IV. The first two terms aim to minimize the number of clusters (masters) and the total distance between masters and cluster members for the first level of the network hierarchy. The third and fourth terms aim to minimize the number of clusters (super masters) in the second-level and the total distance between super masters and the number of clusters (masters) in the second level of the hierarchy.
(24) The objective function (7) is to be optimized subject to nine constraints. The first constraint (8) ensures that every cluster member has a master. Constraints (9) and (10) limit first-level cluster size to 8 (1 master plus 7 cluster members) and ensure that first-level cluster members are within covering distance range of the Bluetooth, which is currently about 10 m, respectively. Constraint (11) ensures that every master has a super master. Constraints (12) and (13) limit second-level cluster size to 8 (1 super master and 7 cluster members) in the second level namely, the first-level masters) and ensure that cluster members in the second-level are within the Bluetooth range, respectively. Constraints (14) ensure that each super master must be already a master. The last two constraints, (15) and (16), ensure that the super master has Wi-Fi connection and a battery level greater than or equal to 50%, respectively. The fixed cost of each master and super master is denoted by F, and it is set equal to 100.
Z=Σ.sub.i=1.sup.NΣ.sub.j=1.sup.N C.sub.ijX.sub.ij+Σ.sub.j=1.sup.N F.sub.jY.sub.j+Σ.sub.i=1.sup.NΣ.sub.j=1.sup.NC.sub.ijV.sub.ij+Σ.sub.j=1.sup.NF.sub.jW.sub.j (7)
Subject to
Σ.sub.j=1.sup.NX.sub.ij=1, i=1 . . . N (8)
Σ.sub.i=1.sup.NX.sub.ij≤8Y.sub.j, j=1 . . . N (9)
Σ.sub.j=1.sup.NC.sub.ijX.sub.ij≤10, i=1 . . . N (10)
Σ.sub.j=1.sup.NV.sub.ij≤Y.sub.i, i=1 . . . N (11)
Σ.sub.i=1.sup.NV.sub.ij≤8W.sub.j, j=1 . . . N (12)
Σ.sub.j=1.sup.NC.sub.ijV.sub.ij≤10Y.sub.j, i=1 . . . N (13)
W.sub.j≤Y.sub.j, j=1 . . . N, (14)
W.sub.j≤WF.sub.j, j=1 . . . N, (15)
W.sub.j≤BL.sub.j, j=1 . . . N, (16)
(25) It is also noted that the Wi-Fi connection may be substituted by other types of long-range connection to WLAN, and the Bluetooth also may be substituted by different types of short-range wireless interface for internal communications between the wireless mobile devices, as a close modification of and within the scope of the present disclosure.
(26) Heuristic Clustering
(27) In very large-scale mobile tracking applications, the solution of the mathematical representation presented above can be difficult or time-consuming. Therefore, a fast and effective heuristic approach based on hierarchical mobile clustering is described to minimize energy consumption and to reduce interference in very large-scale Bluetooth networks, based on bi-level hierarchical mobile clustering. The described bi-level clustering algorithm focuses on node battery level and Wi-Fi connection availability. In order to achieve the best performance, the following requirements are preferably satisfied: Each node makes its own decisions based on its local information. Each node can be either a cluster member that belongs to exactly one cluster (cluster member for a first-level master), a first-level master (also a cluster member for a super master), or a second-level master (super master). Clusters must include all nodes, without any overlap (common nodes) between different clusters. Message exchange should be efficient in order to meet clustering processing requirements.
(28) The heuristic Hierarchical Clustering Algorithm iteratively constructs a bi-level clustering structure for all nodes in the network. When all nodes are booted up, each node will broadcast its credentials (such as its battery level, Wi-Fi connection availability, etc.) to all nodes within its range. As the first step in the construction of first-level clusters, all nodes that have Wi-Fi connection availability are eligible to be masters or cluster members for the first level clusters, while the nodes that do not have Wi-Fi are only eligible to be cluster members.
(29) Next, as the second step, among the nodes with Wi-Fi connection, the node that has the highest battery level will be chosen as a master of a particular first-level cluster, and the closest (preferably up to seven, but other numbers are possible depending on the technology) nodes can join as cluster members for the particular cluster. The construction process continues until each node is assigned as either a master or a cluster member that belongs to exactly one cluster at the end of the first-level clustering procedure. After that, as the third step, the construction of second-level clusters begins. The first-level master which has Wi-Fi connection and the highest battery level will be chosen as a super master for a second-level cluster, and the closest (preferably up to seven but the number may vary depending on the technology) masters for the first-level can join as second-level cluster members (cluster members for the super master). Reassignments of some of nodes may occur, where a node initially assigned as a master in the first-level may be chosen as the super master. The construction process continues until each node is assigned either as a cluster member for a first level cluster, a master for the first-level cluster, also a cluster member of a second level cluster, or a super master for a second level cluster. Cluster members and masters use low-energy Bluetooth technology, while only super masters use Wi-Fi connection for communication with the server.
(30) As an alternative approach to the first and the second steps in the above algorithm, the node that has the highest battery level among the nodes with Wi-Fi connection will be chosen as a master of a particular cluster for the first-level, and the closest (up to seven) nodes can join as cluster members for the particular cluster. Those steps are continued until about five percent or more, more preferably about seven percent or more of the total nodes have been selected as the masters. Then, remaining masters may be chosen without the requirement of Wi-Fi connection availability but with the requirement of the highest battery level among the nodes for which eligibility to the master yet to be examined.
(31) First-level cluster size p includes the first-level master, while second-level cluster size m does not include the second-level (super) master. In one example about fifty percent (½) to fourteen percent ( 1/7) of the total nodes are needed to be chosen as the masters, assuming p nodes (p=2 to 7) will be grouped into each of the clusters in the first-level in average. However other numbers and percentages may be used depending on the technology. Further assuming m masters (m=6 to 1) are assigned in average as the cluster members of each of the clusters in the second level, then about five percent (¼×1/(4+1)), the minimum occurs when p is 4 or 5 to about seven percent ( 1/7×1/(1+1)) of the total nodes will be required to be chosen as the super masters which requires, for example, a Wi-Fi connection (other criteria such as: time in serving as cluster; % of consumed energy while serving as a master node; node movement direction, for instance, if the master node is moving opposite to the potential member, in such case, the two nodes will lose connectivity very soon, may be used together with or alternately to the availability of a Wi-Fi connection). However, as discussed later, around two percent of the total nodes are selected as the super masters in a minimized solution. Therefore, including the masters with the availability of Wi-Fi connection up to about five percent, more preferably up to about seven percent of the total nodes, should suffice as an alternative condition to select masters, instead of requiring that all of the masters have the availability of a Wi-Fi connection. Details are summarized in Table 1. Here, a relation l=n×(m+1) has been used in estimation, where l and n denotes a total number of masters initially selected in the first-level and a total number of super masters, respectively in average, and m denotes the number of cluster members (slaves of a super master) of each of the clusters in the second level, in average.
(32) TABLE-US-00001 TABLE 1 Estimated numbers of masters l and super masters n when a number of members p in a cluster in the first-level and a number of masters m assigned as slave members in a cluster in the second-level are assumed in average. N denotes a total numbers of nodes. Size of first-level Number of masters m cluster p = number of Number of assigned as slave Number of super members including the master
Table 2 presents pseudo codes of the Hierarchical Clustering Algorithm, which constructs a two-level hierarchical clustering structure for mobile networks according to above described algorithm.
(33) TABLE-US-00002 TABLE 2 Pseudo code of the algorithm 1: If N > 0 (N: Number of nodes) 2: for i =1: N // first-level clustering 3: if (i has Wi-Fi) 4: Update possible Master 5: else 6: Update possible Cluster member 7: end if 8: if (i has highest battery level BL) 9: Update become Master 10: end if 11: for j = 1: possible Cluster member 12: if (C.sub.ij ≤ 10)// Bluetooth range 13: Update M-possible Cluster members 14: end if 15: if (M ≤ 7) 16: Update all M become Cluster members 17: Cluster size = M 18: else 19: Update closest 7 become Cluster members 20: Cluster size = 7 21: end if 22: Update N = N − Cluster size 23: ----Start second-level clustering---- 24: for i = 1: K (K: Number of first-level Masters) 25: if (i has highest battery level BL) 26: Update become super master 27: else 28: Update possible second-level member 29: end if 30: for j = 1: possible second-level member 31: if (C.sub.ij ≤ 10)// Bluetooth range 32: Update M-possible second-level member 33: end if 34: if (M ≤ 7) 35: Update all M become second-level members 36: Cluster size = M 37: else 38: Update closest 7 become second-level members 39: Cluster size = 7 40: end if 41: Update K = K − Cluster size 42: end if
(34) After clusters are formed and masters and super masters are selected, the process of data exchange starts. This process takes place between cluster members and first-level masters, between first-level masters and super masters, and between super masters and the back-end server. The super masters use Wi-Fi to transmit data to the server, where the data is processed and stored. Then, after a given period, new clusters are formed at two levels and new masters and super masters are selected. The order of the list will be refreshed periodically and the two-level clustering hierarchy will be periodically reconstructed. This procedure guarantees fair load distribution among multiple devices, attains maximum throughput and lifetime of the network, and avoids draining the batteries of a few super master devices.
(35) The Bluetooth technology provides two types of data transmissions between devices in a piconet: synchronous connection oriented (SCO) and asynchronous connection less (ACL), both with a data rate of 1 Mbps and transmitting power of 1 mW. The channel is divided into 625 μs time slots, and a new hop frequency is used for each slot, where all of the devices connected to a piconet use a same frequency-hopping schedule controlled by the master. SCO link is established between the master and a single cluster member as a point to point connection with reserved slots. The master reserves time slots to ensure that the capacity is available for an SCO link. Up to a maximum of three SCO links can be maintained by a master at the same time. On the other hand, ACL links can be established between the master and up to seven cluster member devices, using free slots after SCO transmission. ACL can also be used as a point-to-point connection, but the master can broadcast the data to multiple cluster members and the cluster member can only send data when requested to do so by the master. Therefore, two time slots (1250 μs) are needed for each cluster member to transmit its data to the master.
(36) In the described approach, ACL transmissions are used within each piconet to communicate between the master and all the cluster members. It is important to avoid interference from other Bluetooth devices using the industrial, scientific, and medical (ISM) radio band. For that reason, a simple time schedule is used for each device in a second-level Bluetooth cluster. According to this schedule, time is divided between two modes of operation: active mode and sleep mode. The time for each mode is 1250 μs, and each device can send its data only when it is in the active mode.
(37)
(38)
(39) Here some lemmas regarding the two-level hierarchical clustering are introduced with proofs.
(40) Lemma-I
(41) For the first-level clusters using Bluetooth as a medium among themselves and Wi-Fi as a medium to communicate with a server, the maximum delay will not exceed D.sub.max.sup.1.
(42) Proof:
(43) Assume N nodes forming M first-level clusters using Bluetooth to communicate among themselves, with M master nodes using Wi-Fi to communicate with a server. Denote n.sub.i.sup.1 as the number of nodes in the i.sup.th first-level cluster, then TTS.sub.i.sup.1 which is the time the i.sup.th first-level cluster needs to transmit data to the server can be computed as in Equation (17).
TTS.sub.i.sup.1=n.sub.i.sup.1 T. (17)
Here, T denotes the standard Bluetooth cycle duration, i.e. T=1250 μs (Bluetooth SIG, 2017). Once this time passes, the master node can send the collected data including its own data along with its position to the server. Since the size of clusters differs, the maximum delay D.sub.max.sup.1 that a node may incur is computed as follows.
D.sub.max.sup.1=max{n.sub.i.sup.1}T, i=1, 2, . . . , M (18)
TD.sup.1≤D.sub.max.sup.1. (19)
D.sub.max.sup.1 is the maximum delay for the first-level clusters in the network hierarchy, which is dominated by the cluster that had the maximum number of nodes among all first-level clusters (max{n.sub.i.sup.1}). TD.sup.1 is the total delay of all clusters in the first-level of the network hierarchy, which is equal to D.sub.max.sup.1.
Example-I
(44) For the one-level clustering system illustrated in
(45) Lemma-II
(46) For the second-level clusters using Bluetooth as a medium among themselves and Wi-Fi as a medium to communicate with a server, the maximum delay will not exceed D.sub.max.sup.2=max {TTS.sub.j.sup.2}.
(47) This detail can be verified as follows by assuming N nodes forming M.sup.1 first-level clusters and M.sup.2 first-level clusters using Bluetooth as a medium among themselves, with M.sup.2 super master nodes using Wi-Fi as a medium to communicate with a server. Denote n.sub.ij as the number of nodes in the i.sup.th first-level cluster belonging to the j.sup.th second-level cluster, then TTS.sub.j.sup.2, which is the time the second-level cluster j needs to transmit data to the server can be computed as in Equation (20).
TTS.sub.j.sup.2=[Σ.sub.i=1.sup.M.sup.
(48) In Equation (20), the constant 1 is added to each n.sub.ij to include the data of all first-level master nodes. Since the second-level master (super master) node is also a first-level master, the constant 1 is subtracted from the total delay. Furthermore, each super master node also has to schedule the transmissions of its members. Hence, the total delay (TD.sup.2) for transmitting the complete collected data to the server excluding Wi-Fi transmission can be computed as follows.
TD.sup.2≤max{TTS.sub.j.sup.2} (21)
Example-II
(49) For the two-level clustering system shown in
TTS.sub.1.sup.2=[(7+1)+(3+1)+(4+1)+4]T=21T
TTS.sub.2.sup.2=[(4+1)+(7+1)+4]T=17T
Since every super master node is independent of other super master nodes, each one will send once its data are ready. Hence, the maximum delay for this example is:
TD.sup.2≤max{TTS.sub.1.sup.2, TTS.sub.2.sup.2}=21T.
(50) Now, performance of the two-level hierarchical clustering approach above presented is evaluated by two methods: one by solving the mathematical programming model Equations (7)-(16) using GAMS and the other by using a MATLAB Simulink simulation model.
(51) The first method, solving the mathematical programming model Equations (7)-(16) was performed under three different scenarios using version 24.3.3 of GAMS (General Algebraic Modeling System). GAMS Specifications. GAMS Software GmbH (2018), https://www.gams.com Retrieved April 2018, the entire contents of which is incorporated herein by reference.
(52) The first scenario tackles the problem by considering only the first two terms in the objective function Equation (7), the terms aim to minimize the number of clusters (masters) and the total distance between masters and cluster members for the clustering in the one-level hierarchy.
(53) The second scenario considers all four terms in the objective function that aims to minimize the number of clusters and the total distance between masters and cluster members for both levels of the hierarchy.
(54) The third scenario considers all four terms of the objective function, and further applies sensitivity analysis by considering two different values for the number of nodes, namely 700 and 800. This is done by changing the second-level cluster size, i.e. the right-hand side of the constraints Equation (12).
(55) All above-described scenarios have been analyzed under the following environment. The size of the service region is set as 10×20 m.sup.2. The minimum value of the objective function is calculated by GAMS MIP solver, assuming the following different values for the number of nodes: N=100, 200, 300, 400, 500, 600, 700, and 800.
(56)
(57)
(58) The second method for evaluating the two-level hierarchical clustering approach using the MATLAB Simulink simulation model are presented below with results. The MATLAB Simulink is commonly used to analyze models of radio frequency mechanisms of Bluetooth transceivers. Components of the simulation model include: scatternet, piconet, interference source from 802.11, and modules for measuring important performance parameters of the system. Each transceiver includes a binary data generator, a Gaussian frequency shift keying (GFSK), a pseudo-random number generator to create frequency hopping, and a matching receiver. Golmie N., Van Dyck R. E., Soltanian A., Tonnerre A., and Rebala O., “Interference evaluation of Bluetooth and IEEE 802.11b systems,” Wireless Networks, 9(3), 201-211, 2003, the entire content of which is herein incorporated by reference. Song M., Shetty S., and Gopalpet D, “Coexistence of IEEE 802.11b and Bluetooth: An integrated performance analysis,” Mobile Networks and Applications, 12(5), 450-459, 2007, the entire content of which is herein incorporated by reference. Cho D. K., Lee S. H., Chang A., Massey T., Chang C. W., Tsai M. H., and Gerla M, “Opportunistic medical monitoring using Bluetooth P2P networks,” International Symposium on World of Wireless, Mobile and Multimedia Networks IEEE pp. 1-6, 2008, the entire content of which is herein incorporated by reference. To introduce noise, the 802.11 packet block is generated as an interference source.
(59) In the simulation, the Bluetooth full duplex transmission model is used, since it is more realistic than the standard Bluetooth model.
(60)
(61) The simulation model takes into account P—Bluetooth piconets existing together in an area of size 10×10 m.sup.2, in order to study Bluetooth piconets (clusters) for highly populated areas. Therefore, each piconet experiences possible interference by (P−1) other piconets. If two or more piconets send out a packet (an information message) on a same frequency band at any time, then the corresponding packets collide and are considered lost. As per Bluetooth standards, all clusters employ the frequency-hopping schedules in which each of the clusters selects a random channel from 79 possible frequency channels. The simulation model is able to capture the interference between different Bluetooth packets and between Bluetooth and Wi-Fi packets when they use the same frequency range. Kamerman A. Id.
(62) It is assumed that each node can send data traffic at a rate of 1 Mbps and it can send frames with sizes up to 20 bytes. For the hardware (Bluetooth/Wi-Fi) energy consumption parameters, the values specified by Yoo and Park (2011) were used. Yoo J. W. and Park K. H. (2011). Id. In order to achieve 95% confidence interval, each simulation was repeated 20 times using different random topologies and then an average was calculated.
(63)
(64)
TE=TE.sub.CH+TE.sub.CM+TE.sub.idle, (22)
G=N×L×R(1−FER), (23)
EF=G/TE, (24)
where, TE denotes a total energy consumption of all nodes, TE.sub.CH, a total energy consumption by cluster heads, TE.sub.CM, a total energy consumption by cluster members, TE.sub.idle, a total energy consumption by idle nodes, G, the throughput defined as a total number of successfully received bits, R, the frame rate per second, L, the frame length (size), and EF, the energy efficiency. The frame size was assumed equal to 20 bytes, which is sufficient to send health information messages.
Lemma III
(65) The effective throughput of two-level hierarchy is higher than single-level hierarchy.
(66) This point can be verified by assuming N nodes forming M.sup.1 first-level clusters using Bluetooth as a medium among themselves via masters, among M.sup.1 first-level cluster, M.sup.2 first-level clusters with M.sup.2 super master nodes using Wi-Fi as a medium to communicate with a server. Since each super master node sequentially schedules the transmission slots for its member, no signal collisions will occur. Therefore, the whole set of members belonging to the j.sup.th second-level cluster is effectively considered as one piconet in terms of mutual interference (i.e. no interference takes place among these members). Accordingly, the limiting factor in terms of interference is M.sup.2 (the number of second-level clusters). Then, the total throughput in this case can be computed as follows. Denoting G.sup.2(N)
(67) as a bi-level effective throughput,
G.sup.2(N)=N×L×R [1−FER(M.sup.2)]. (25)
On the other hand, for single-level clustering, the key factor is the number of first-level clusters (M.sup.1) existing in the same interference range. Therefore, the single-level effective throughput G.sup.1(N) can be computed by:
G.sup.1(N)=N×L×R [1−FER(M.sup.1)]. (26)
But naturally,
M.sup.1>M.sup.2,
So,
F(M.sup.1)>FER(M.sup.2).
Therefore,
G.sup.1(N)<G.sup.2(N)
Example—III:
(68) For the two-level clustering hierarchy system shown in
G.sup.1(K)=35×20×8×(1−0.0927)=5081 bits
G.sup.1(K)=35×20×8×(1−0.0068)=5562 bits
The throughput is enhanced by 10% in the two-level clustering hierarchy system.
(69)
(70) Table 3 also lists the total energy consumption for the three approaches. Here in addition to the results for the three approaches illustrated in
(71) TABLE-US-00003 TABLE 3 Total energy consumption (Joules) of three approaches Comparison vs GAMS GAMS (%) Number Mathe- Two- Direct of Two-Level Direct matical Level One- Nodes Clustering One-Level Model Clustering Level 100 22.9 238.41 21.8 5 993.60 200 45.6 476.82 43.5 4.80 996.10 300 65.6 715.23 62.9 4.29 1037.10 400 87.9 953.64 84.7 3.78 1025.90 500 107.3 1192.05 104.1 3.07 1045.10 600 128.8 1430.46 125.8 2.38 1037.10 700 147.5 1668.87 145.2 1.58 1049.40 800 167.9 1907.28 167 0.54 1042.10
(72) As observed in
(73) For the direct approach, as observed in Table 3, the energy consumption of the direct approach is 993.6% higher than the GAMS solution when the number of nodes is equal to 100, and 1042.1% higher when the number of nodes is equal to 800. Clearly, the direct approach without clustering is not a practical solution method for large-scale tracking systems.
(74)
(75) TABLE-US-00004 TABLE 4 Throughput, energy consumption and efficiency for the three approaches in FIG. 11 Energy Num- Throughput of Consumption Efficiency of ber (bps) of (Joule) (bit/Joule) of One- Two- One- Two- One- Two- Nodes Direct Level Level Direct Level Level Direct Level Level 25 4000 3972.8 4000 59.6 13.8 6.6 67.1 287.9 606.1 50 8000 7668 8000 119.2 26.2 10.9 67.1 292.7 733.9 75 12000 11430 12000 178.8 38.6 17.5 67.1 296.1 685.7 100 16000 14516.8 16000 238.41 50.8 22.9 67.1 285.8 698.7
(76) As observed in
(77) Table 4 indicates further reasons why the above differences arise. In terms of throughput, there is not so much difference among the three approaches: the one-level approach exhibits about ten percent less values than other two approaches or the two-level approach brings just about ten percent of increase compared to the one-level approach in a large number of nodes of a hundred. A dramatic improvement appears in terms of energy consumption: about one fifth reduction by one-level approach from the direct approach, and further about a half reduction by the two-level approach from the one-level approach. These demonstrate that the efficiency reduction in the two-level approach illustrated in
(78) A method or a system which includes the features in the foregoing description provides numerous advantages. The two-level clustering approach described in the present disclosure have a better performance over other direct approaches without the clustering or the one-level clustering approach. Thus, the present disclosure provides an improvement to the technical field of communication. The two-level clustering approach according to the present disclosure improves not only the energy efficiency but also the total energy consumption from the other two approaches in a large scale-network, for example, for the tracking system with a large number of users of smartphone, where locations and relevant piece of information are reported to the server periodically. In addition, the two-level clustering approach according to the present disclosure has the advantage of improving the throughput compared to the one-level clustering approach.
(79) Obviously, numerous modifications and variations are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.
(80) Thus, the foregoing discussion discloses and describes merely exemplary embodiments of the present invention. As will be understood by those skilled in the art, the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Accordingly, the disclosure of the present invention is intended to be illustrative, but not limiting of the scope of the invention, as well as other claims. The disclosure, including any readily discernible variants of the teachings herein, define, in part, the scope of the foregoing claim terminology such that no inventive subject matter is dedicated to the public.