“…The goal of this work is to mitigate the weakness of the NANBB spanning tree based communication topology by assigning backup links to thwart against single point of failure and increase its reliability [18]. This may be measured by the probability that the network remains connected despite link failure; that is, any SM somehow remains capable of transmitting its power demand to the RG under link failure, provided that other SMs are operative.…”
Section: Link Failure Connectivity Recovery: Motivating Examplesmentioning
confidence: 99%
“…The path (SM , SM ) between SM and any SM ∈ (SM ) is simply the edge = [SM , SM ]. The degree of (SM ) deg SM is the size of the neighbor set (SM ) (i.e., deg SM = | (SM )|) [18].…”
Section: Problem Formulation and Definitionsmentioning
confidence: 99%
“…Mark label : visited (15) Mark label SM : visited (16) Add to Γ (17) else (18) Set the label of ( ) as: back-edge. (19) if…”
Section: Algorithm: Nanbb Biconnected Tree Networkmentioning
confidence: 99%
“…International Journal of Distributed Sensor Networks for lSM ∈ (lSM) do (10) Compute = { ∈ − Γ, incident to lSM } (11) if | | = 1 then (12) Add to (13) Mark : visited (14) Mark SM ← opposite (lSM , ): visited (15) else (16) for ∈ do (17) Compute SM ← opposite (lSM , ) (18) if SM : unvisited then (19) Compute weight of (20)…”
Section: Nanbb -Connected Tree Communication Networkmentioning
confidence: 99%
“…When a node creates a packet that it wants to use for loop detection, it appends its address to a sequence number to for lSM ∈ (cSM ) do (10) Compute = { ∈ − , incident to lSM } (11) = { }, ∈ Γ, incident to lSM , | | = 1 (12) while | | < do (13) if | | = − 1 then (14) Add to (15) Mark ∈ : visited (16) Mark SM ← opposite (lSM , ∈ ): visited (17) else (18) for ∈ do (19) Compute SM ← opposite (lSM , ) (20) if SM : unvisited then (21) Compute weight (22) Mark : visited (23) Add the least weighted to (24) Mark SM ← opposite (lSM , ): visited create an identifier that it stores in its loop detection table. The identifier is unique and can be used to trace the packet in the entire network.…”
Section: Loop Detection Mechanism the Loop Detection Mechanism As Dementioning
Tree multicast configuration of smart meters (SMs) can maintain the connectivity and meet the latency requirements for the Advanced Metering Infrastructure (AMI). However, such topology is extremely weak as any single failure suffices to break its connectivity. On the other hand, the impact of a SM node failure can be more or less significant: a noncut SM node will have a limited local impact compared to a cut SM node that will break the network connectivity. In this work, we design a highly connected tree with a set of backup links to minimize the weakness of tree topology of SMs. A topology repair scheme is proposed to address the impact of a SM node failure on the connectivity of the augmented tree network. It relies on a loop detection scheme to define the criticality of a SM node and specifically targets cut SM node by selecting backup parent SM to cover its children. Detailed algorithms to create such AMI tree and related theoretical and complexity analysis are provided with insightful simulation results: sufficient redundancy is provided to alleviate data loss at the cost of signaling overhead. It is however observed that biconnected tree provides the best compromise between the two entities.
“…The goal of this work is to mitigate the weakness of the NANBB spanning tree based communication topology by assigning backup links to thwart against single point of failure and increase its reliability [18]. This may be measured by the probability that the network remains connected despite link failure; that is, any SM somehow remains capable of transmitting its power demand to the RG under link failure, provided that other SMs are operative.…”
Section: Link Failure Connectivity Recovery: Motivating Examplesmentioning
confidence: 99%
“…The path (SM , SM ) between SM and any SM ∈ (SM ) is simply the edge = [SM , SM ]. The degree of (SM ) deg SM is the size of the neighbor set (SM ) (i.e., deg SM = | (SM )|) [18].…”
Section: Problem Formulation and Definitionsmentioning
confidence: 99%
“…Mark label : visited (15) Mark label SM : visited (16) Add to Γ (17) else (18) Set the label of ( ) as: back-edge. (19) if…”
Section: Algorithm: Nanbb Biconnected Tree Networkmentioning
confidence: 99%
“…International Journal of Distributed Sensor Networks for lSM ∈ (lSM) do (10) Compute = { ∈ − Γ, incident to lSM } (11) if | | = 1 then (12) Add to (13) Mark : visited (14) Mark SM ← opposite (lSM , ): visited (15) else (16) for ∈ do (17) Compute SM ← opposite (lSM , ) (18) if SM : unvisited then (19) Compute weight of (20)…”
Section: Nanbb -Connected Tree Communication Networkmentioning
confidence: 99%
“…When a node creates a packet that it wants to use for loop detection, it appends its address to a sequence number to for lSM ∈ (cSM ) do (10) Compute = { ∈ − , incident to lSM } (11) = { }, ∈ Γ, incident to lSM , | | = 1 (12) while | | < do (13) if | | = − 1 then (14) Add to (15) Mark ∈ : visited (16) Mark SM ← opposite (lSM , ∈ ): visited (17) else (18) for ∈ do (19) Compute SM ← opposite (lSM , ) (20) if SM : unvisited then (21) Compute weight (22) Mark : visited (23) Add the least weighted to (24) Mark SM ← opposite (lSM , ): visited create an identifier that it stores in its loop detection table. The identifier is unique and can be used to trace the packet in the entire network.…”
Section: Loop Detection Mechanism the Loop Detection Mechanism As Dementioning
Tree multicast configuration of smart meters (SMs) can maintain the connectivity and meet the latency requirements for the Advanced Metering Infrastructure (AMI). However, such topology is extremely weak as any single failure suffices to break its connectivity. On the other hand, the impact of a SM node failure can be more or less significant: a noncut SM node will have a limited local impact compared to a cut SM node that will break the network connectivity. In this work, we design a highly connected tree with a set of backup links to minimize the weakness of tree topology of SMs. A topology repair scheme is proposed to address the impact of a SM node failure on the connectivity of the augmented tree network. It relies on a loop detection scheme to define the criticality of a SM node and specifically targets cut SM node by selecting backup parent SM to cover its children. Detailed algorithms to create such AMI tree and related theoretical and complexity analysis are provided with insightful simulation results: sufficient redundancy is provided to alleviate data loss at the cost of signaling overhead. It is however observed that biconnected tree provides the best compromise between the two entities.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.