文档库 最新最全的文档下载
当前位置:文档库 › Topology Control in Heterogeneous Wireless

Topology Control in Heterogeneous Wireless

Topology Control in Heterogeneous Wireless
Topology Control in Heterogeneous Wireless

Topology Control in Heterogeneous Wireless Networks:Problems and Solutions

Ning Li and Jennifer C.Hou

Department of Computer Science

University of Illinois at Urbana-Champaign

Urbana,IL61801

{nli,jhou}@https://www.wendangku.net/doc/767867144.html,

Abstract—Previous work on topology control usually assumes homogeneous wireless nodes with uniform transmission ranges. In this paper,we propose two localized topology control algo-rithms for heterogeneous wireless multi-hop networks with non-uniform transmission ranges:Directed Relative Neighborhood Graph(DRNG)and Directed Local Spanning Subgraph(DLSS). In both algorithms,each node selects a set of neighbors based on the locally collected information.We prove that(1)the topologies derived under DRNG and DLSS preserve the network connectivity;(2)the out degree of any node in the resulting topology by DLSS is bounded,while the out degree cannot be bounded in DRNG;and(3)the topologies generated by DRNG and DLSS preserve the network bi-directionality.

I.I NTRODUCTION

Energy ef?ciency[1]and network capacity are perhaps two of the most important issues in wireless ad hoc networks and sensor networks.Topology control algorithms have been proposed to maintain network connectivity while reducing energy consumption and improving network capacity.The key idea to topology control is that,instead of transmitting using the maximal power,nodes in a wireless multi-hop network collaboratively determine their transmission power and de?ne the network topology by forming the proper neighbor relation under certain criteria.

By enabling wireless nodes to use adequate transmission power(which is usually much smaller than the maximal trans-mission power),topology control can not only save energy and prolong network lifetime,but also improve spatial reuse(and hence the network capacity)[2]and mitigate the MAC-level medium contention[3].Several topology control algorithms [3]–[10]have been proposed to create power-ef?cient network topology in wireless multi-hop networks with limited mobility (a summary is given in Section III).However,most of them as-sume homogeneous wireless nodes with uniform transmission ranges(except[4]).

The assumption of homogeneous nodes does not always hold in practice,since even devices of the same type may have slightly different maximal transmission power.There also exist heterogeneous wireless networks in which devices have dramatically different capabilities,for instance,the communi-cation network in the Future Combat System which involves wireless devices on soldiers,vehicles and UA Vs.As will be exempli?ed in Section III,most existing algorithms cannot be directly applied to heterogeneous wireless multi-hop networks in which the transmission range of each node may be different. To the best of our knowledge,this paper is the?rst effort to address the connectivity and bi-directionality issue in the heterogeneous wireless networks.

In this paper,we propose two localized topology control al-gorithms for heterogeneous wireless multi-hop networks with non-uniform transmission ranges:Directed Relative Neighbor-hood Graph(DRNG)and Directed Local Spanning Subgraph (DLSS).In both algorithms,the topology is constructed by having each node build its neighbor set and adjust its trans-mission power based on the locally collected information. We are able to prove that(1)the topology derived under both DRNG and DLSS preserves network connectivity,i.e., if the original topology generated by having every node use its maximal transmission power is strongly connected,then the topologies generated by both DRNG and DLSS are also strongly connected;(2)the out degree of any node in the topology by DLSS is bounded,while the out degree of nodes in the topology by DRNG may be unbounded;and(3)the topology generated by DRNG and DLSS preserves network bi-directionality,i.e.,if the original topology by having every node use its maximal transmission power is bi-directional,then the topology generated by either DRNG or DLSS is also bi-directional after some simple operations.

Simulation results indicate that,compared with the other known topology control algorithms that can be applied to het-erogeneous networks,DRNG and DLSS have smaller average node degree(both logical and physical)and smaller average link length.The former reduces the MAC-level contention, while the latter implies a small transmission power needed to maintain connectivity.

The rest of the paper is organized as follows.In Section II, we give the network model.In Section III,we summarize previous work on topology control,and give examples to show why existing algorithms cannot be directly applied to heterogeneous networks.Following that,we present both the DRNG and DLSS algorithms in Section IV,and prove several of their useful properties in Section V.Finally,we evaluate the performance of the proposed algorithms in Section VI, and conclude the paper in Section VII.

使用DRNG和DLSS进行拓扑控制丗连通性和双向性

II.N ETWORK M ODEL

Consider a set of nodes(vertices),V={v1,v2,...,v n}, which are randomly distributed in the2-D plane.Assume the area that a transmission can cover is a disk.We de?ne the range of a node v i as the radius of the disk that v i

can cover using its maximal transmission power,denoted r v

i .

In a heterogeneous network,the transmission ranges of all nodes may not be the same.Let r min=min v∈V{r v}and r max=max v∈V{r v}.

We denote the network topology generated by having each node use its own maximal transmission power as a simple directed graph G=(V(G),E(G)),where E(G)={(u,v): d(u,v)≤r u,u,v∈V(G)}is the edge(link)set of G,and d(u,v)is the Euclidean distance between node u and node v.Note that(u,v)is an ordered pair representing an edge from node u to node v,i.e.,(u,v)and(v,u)are two different edges.A unique id(such as an IP/MAC address)is assigned to each node.Here we let id(v i)=i for simplicity.

We assume that the wireless channel is symmetric and obstacle-free,and each node is equipped with the capability to gather its location information via,for example,GPS for outdoor applications and pseudolite[11]for indoor applica-tions,and many other lightweight localization techniques for wireless networks(see[12]for a summary).

Before delving into the technical discussion and algorithm description,we give the de?nition of several terms that will be used throughout the paper.

De?nition1(Reachable Neighborhood):The reachable neighborhood N R u is the set of nodes that node u can reach using its maximal transmission power,i.e., N R u={v∈V(G):d(u,v)≤r u}.For each node u∈V(G), let G R u=(V(G R u),E(G R u))be an induced subgraph of G such that V(G R u)=N R u.

De?nition2(Weight Function):Given two edges (u1,v1),(u2,v2)∈E and the Euclidean distance function d(·,·),weight function w:E→R satis?es:

w(u1,v1)>w(u2,v2)

?d(u1,v1)>d(u2,v2)

or(d(u1,v1)=d(u2,v2)

&&max{id(u1),id(v1)}>max{id(u2),id(v2)}) or(d(u1,v1)=d(u2,v2)

&&max{id(u1),id(v1)}=max{id(u2),id(v2)}

&&min{id(u1),id(v1)}>min{id(u2),id(v2)}). This weight function ensures that two edges with different end-vertices have different weights.Note,however,that w(u,v)= w(v,u).

De?nition3(Neighbor Set):Node v is a neighbor of node u under an algorithm A,denoted u A?→v,if and only if there exists an edge(u,v)in the topology generated by the algorithm.In particular,we use u→v to denote the neighbor relation in G.u A←→v if and only if u A?→v and v A?→u.The Neighbor Set of node u is N A(u)={v∈V(G):u A?→v}.

De?nition4(Topology):The topology generated by an al-

gorithm A is a directed graph G A=(E(G A),V(G A)),where V(G A)=V(G),E(G A)={(u,v)∈E(G):u A?→}.

De?nition5(Radius):The radius,R u,of node u is de?ned as the distance between node u and its farthest neighbor(in terms of Euclidean distance),i.e,R u=max v∈N

A

(u)

{d(u,v)}. De?nition6(Connectivity):For any topology generated by an algorithm A,node u is said to be connected to node v(denoted u?v)if there exists a path(p0= u,p1,...,p m?1,p m=v)such that p i A?→p i+1,i= 0,1,...,m?1,where p k∈V(G A),k=0,1,...,m.It follows that u?v if u?p and p?v for some p∈V(G A). De?nition7(Bi-Directionality):A topology generated by an algorithm A is bi-directional,if for any two nodes u,v∈V(G A),u∈N A(v)implies v∈N A(u).In other words,the topology generated by A is bi-directional if all edges in the topology are bi-directional.

De?nition8(Bi-Directional Connectivity):For any topol-ogy generated by an algorithm A,node u is said to be bi-directionally connected to node v(denoted u?v)if there exists a path(p0=u,p1,...,p m?1,p m=v)such that p i A←→p i+1,i=0,1,...,m?1,where p k∈V(G A),k= 0,1,...,m.It follows that u?v if u?p and p?v for some p∈V(G A).

Deriving network topology consisting of only bi-directional links facilitates link level acknowledgment,which is a critical operation for packet transmissions and retransmissions over unreliable wireless media.Bi-directionality is also important in ?oor acquisition mechanisms such as the RTS/CTS mechanism in IEEE802.11.

De?nition9(Addition and Removal):The operation Addi-tion is to add an extra edge(v,u)into G A if(u,v)∈E(G A), (v,u)/∈E(G A),and d(u,v)≤r v.The operation Removal is to delete any edge(u,v)∈E(G A)if(v,u)/∈E(G A).

Let G+

A

and G?

A

denote the resulting topologies after applying Addition and Removal to G A,respectively.

Both the Addition and Removal operations attempt to create a bi-directional topology by removing uni-directional edges or converting uni-directional edges into bi-directional.The result-ing topology after Removal is alway bi-directional,although it may not be strongly connected.The resulting topology after Addition is not necessarily bi-directional,as it essentially tries to increases the transmission power of a node v to a level that may be beyond its capability.

III.R ELATED W ORK AND W HY T HEY C ANNOT BE

D IRECTLY A PPLIED TO H ETEROGENEOUS N ETWORKS Several topology control algorithms[3]–[10]have been proposed.In this section,we?rst summarize these algorithm and then give examples on why they cannot be directly applied to heterogeneous networks.

A.Related Work

Rodoplu et al.[4](denoted R&M)introduced the notion of relay region and enclosure for the purpose of power control.Instead of transmitting directly,a node chooses to

be de?ned in Section

III-B).

be de?ned in Section IV).

Fig.1.The de?nition of the Directed Relative Neighborhood Graph. relay through other nodes if less power will be consumed.It is shown in the paper that the network is strongly connected if every node maintains links with the nodes in its enclosure and the resulting topology is a minimum power topology. The major drawback is that it requires an explicit propagation channel model to compute the relay region(in the simulation study presented in Section VI,we assume that the free-space model is used),hence the resulting topology is sensitive to the model used in the computation.Also,it assumes there is only one data sink(destination)in the network.

Ramanathan et al.[5]presented two centralized algorithms to minimize the maximal power used per node while maintain-ing the(bi)connectivity of the network.They introduced two distributed heuristics for mobile networks.Both centralized algorithms require global information,and thus cannot be directly deployed in the case of mobility.On the other hand, the proposed heuristics cannot guarantee the preservation of the network connectivity.

COMPOW[3]and CLUSTERPOW[7]are approaches im-plemented in the network layer.Both hinge on the idea that if each node uses the smallest common power required to main-tain network connectivity,the traf?c carrying capacity of the entire network is maximized,the battery life is extended,and the MAC-level contention is mitigated.The major drawback is its signi?cant message overhead,since each node has to run multiple daemons,each of which has to exchange link state information with their counterparts at other nodes.

CBTC(α)[6]is a two-phase algorithm in which each node ?nds the minimum power p such that some node can be reached in every cone of degreeα.The algorithm has been proved to preserve network connectivity ifα<5π/6.Several optimization methods(that are applied after the topology is derived under the base algorithm)are also discussed to further reduce the transmitting power.

To facilitate the following discussion,the de?nition of the Relative Neighborhood Graph(RNG)is given below.

De?nition10(Neighbor Relation in RNG):For RNG[13], [14],u RNG

←??→v if and only if there does not exist a third node p such that w(u,p)

Borbash and Jennings[8]proposed to use RNG for the topology initialization of wireless networks.Based on the local knowledge,each node makes decisions to derive the network topology based on RNG.The network topology thus derived has been reported to exhibit good overall performance in terms of power usage,low interference,and reliability.

Li et al.[9]presented the Localized Delaunay Triangula-tiona,a localized protocol that constructs a planar spanner of the Unit Disk Graph(UDG).The topology contains all edges that are both in the unit-disk graph and the Delaunay triangulation of all nodes.It is proved that the shortest path in this topology between any two nodes u and v is at most a constant factor of the shortest path connecting u and v in UDG. However,the notion of UDG and Delaunay triangulation cannot be directly extended to heterogeneous networks.

In[10],we proposed LMST(Local Minimum Spanning Tree)for topology control in homogeneous wireless multi-hop networks.In this algorithm,each node builds its local minimum spanning tree independently and only keeps on-tree nodes that are one-hop away as its neighbors in the ?nal topology.It is proved that(1)the topology derived under LMST preserves the network connectivity;(2)the node degree of any node in the resulting topology is bounded by 6;and(3)the topology can be transformed into one with bi-directional links(without impairing the network connectivity) after removal of all uni-directional links.Simulation results show that LMST can increase the network capacity as well as reduce the energy consumption.

Instead of adjusting the transmission power of individual devices,there also exist other approaches to generate power-ef?cient topology.By following a probabilistic approach,Santi et al.derived the suitable common transmission range which preserves network connectivity,and established the lower and upper bounds on the probability of connectedness[15].In[16], a“backbone protocol”is proposed to manage large wireless ad hoc networks,in which a small subset of nodes is selected to construct the backbone.In[17],a method of calculating the power-aware connected dominating sets was proposed to

trol)is strongly connected.

23

mization is not strongly connected:there is no path from v 1to v 3.

Fig.2.An example that shows CBT C (23

π)may render disconnectivity in heterogeneous networks.There is no path from v 1to v 3due to the loss of edge (v 2,v 3),which is discarded by v 2since v 1and v 4have already provided the necessary

coverage.

trol)is strongly

connected.nected:there is no path from v 5to v 2

.

Fig.3.An example that shows RNG may render disconnectivity in heterogeneous networks.There is no path from v 5to v 2due to the loss of edge (v 4,v 2),which is discarded since |(v 4,v 5)|<|(v 4,v 2)|,and |(v 2,v 5)|<|(v 4,v 2)|

.

trol)is strongly

connected.nected:there is no path from v 3to v 5

.

Fig.4.An example that shows MRNG may render disconnectivity in heterogeneous networks.There is no path from v 3to v 5due to the loss of edge (v 2,v 5),which is discarded since |(v 2,v 3)|<|(v 2,v 5)|,and |(v 5,v 3)|<|(v 2,v 5)|

.

topology control)is strongly

connected.

at v 8.

at v 7.

strongly connected:there is no path from v 7to v 4.

Fig.5.An example that shows the algorithm in which each node builds a local directed minimum spanning tree and only keeps the one-hop neighbors may result in disconnectivity.

establish an underlying topology for the network.

B.Why Existing Algorithms Cannot be Directly Applied to Heterogeneous Networks

Most existing topology control algorithms(except[4])as-sume homogeneous wireless nodes with uniform transmission ranges.When directly applied to heterogeneous networks, these algorithms may render disconnectivity.In this subsec-tion,we give several examples to motivate the need for new topology control algorithms for heterogeneous networks.

As shown in Fig.2(a)-(b)(note that in Figs.2–5we use arrows to indicate the direction of the links to represent a link

from u to v),the network topology derived under CBT C(2

3π)

(without optimization)may not preserver the connectivity, when the algorithm is directly applied to a heterogeneous

network.CBT C(5

6π)also has the same problem.

Similarly we show in Fig.3(a)-(b)that the network topology derived under RNG may be disconnected when the algorithm is directly applied to a heterogeneous network.As RNG is de?ned for undirected graphs,one may tailor the de?nition of RNG for directed graphs.

De?nition11(Neighbor Relation in MRNG):For Modi?ed Relative Neighborhood Graph(MRNG),u MRNG

?????→v if and only if there does not exist a third node p such that w(u,p)< w(u,v),d(u,p)≤r u and w(p,v)

As shown in Fig.4(a)-(b),the topology derived under MRNG may still be disconnected(we will give another variation of RNG for directed graphs in the next section). One possible extension of LMST[10]is for each node to build a local directed minimum spanning tree[18]–[20] and keep only neighbors within one hop.Unfortunately,the resulting topology does not preserve the strong connectivity, as shown in Fig.5.In the next section,we will improve on this approach to preserve the connectivity.

IV.DRNG AND DLSS

In this section,we propose two localized topology con-trol algorithms for heterogeneous wireless multi-hop net-works with non-uniform transmission ranges:Directed Rela-tive Neighborhood Graph(DRNG)and Directed Local Span-ning Subgraph(DLSS).In both algorithms,the topology is derived by having each node build its neighbor set and adjust its transmission power based on locally collected information. Several nice properties of both algorithms will be discussed in Section V.

Both algorithms are composed of three phases:

1)Information Collection:each node collects the local

information of neighbors such as position and id,and identi?es the Reachable Neighborhood N R.

2)Topology Construction:each node de?nes(in compli-

ance with the algorithm)the proper list of neighbors for the?nal topology using the information in N R.

3)Construction of Topology with Only Bi-Directional Links

(Optional):each node adjusts its list of neighbors to make sure that all the edges are https://www.wendangku.net/doc/767867144.html,rmation collection

The information needed by each node u for topology control is the information of its reachable neighborhood N R.This can be obtained locally,in the case of homogeneous networks, by having each node broadcast periodically a Hello message using its maximal transmission power.The information con-tained in a Hello message should at least include the node id and the position of the node.These periodic messages can be sent either in the data channel or in a separate control channel. In heterogeneous networks,having each node broadcast a Hello message using its maximal transmission power may be insuf?cient.For example,as shown in Fig.6,v1is unable to know the position of v4since v4cannot reach v1.We will treat this issue rigorously in Section V-D.For the time being, we assume that by the end of the?rst phase every node u obtains its N R u.

Fig.6.An example that shows having each node broadcast a Hello message using its maximal transmission power may be insuf?cient for some nodes (e.g.,node v1)to know their reachable neighborhood.This?gure also serves to show that given an arbitrary direct graph,it may be impossible to derive a bi-directional topology.

B.Topology construction

First we de?ne the neighbor relation used in both algo-rithms.

De?nition12(Neighbor Relation in DRNG):For Directed Relative Neighborhood Graph(DRNG),u DRNG

?????→v if and only if d(u,v)≤r u and there does not exist a third node p such that w(u,p)

De?nition13(Neighbor Relation in DLSS):For Directed Local Spanning SubGraph(DLSS),u DLSS

????→v if and only if (u,v)∈E(T u),where T u is obtained by applying Algorithm1 to G R u.T u is a directed local spanning subgraph that spans N R u.Hence node v is a neighbor of node u if and only if node v is on node u’s directed local MST T u,and is one-hop away from node u.

DLSS is a natural extension of LMST[10]for hetero-geneous networks.Instead of computing a directed local MST(which minimizes the total cost of the all edges in the subgraph,and is shown to be wrong in Section III-B),

Algorithm1DLSS(u)

INPUT:G R u,the induced subgraph of G that spans the reachable neighborhood of u;

OUTPUT:T u=(V T

u ,E T

u

),a local spanning subgraph of

G R u;

1:V T u:=V,E T u:=?;

2:sort all edges in E(G R u)in the ascending order of weight (as de?ned in De?nition2);

3:for each edge(u,v)in the order do

4:if u is not connected to v in T u then

5:E T u:=E T u∪{(u,v)};

6:end if

7:if u is connected to all nodes in N R u then

8:exit;

9:end if

10:end for

each node u computes a directed local subgraph according to Algorithm1(which minimizes the maximum cost of all edges in the subgraph)and takes on-tree nodes that are one-hop away as its neighbors.

Each node can broadcast its own maximal transmission power in the Hello message.By measuring the receiving power of Hello messages,each node u can determine the speci?c power level required to reach each of its neighbors [10].Node u then uses the power level that can reach its farthest neighbor as its transmission power.This approach can be applied without knowing the actual propagation model. C.Construction of topology with only bi-directional edges As illustrated in the previous section,some links in G DLSS may be uni-directional.There also exist uni-directional links in G DRNG.We can apply either Addition or Removal to G DLSS and G DRNG to obtain bi-directional topologies.We will discuss some properties of these solutions in Section V-B.

V.P ROPERTIES OF DRNG AND DLSS

In this section,we discuss the connectivity,bi-directionality and degree bound of DLSS and DRNG.We always assume G is strongly connected,i.e.,u?v in G for any u,v∈V(G).

A.Connectivity

Lemma1:For any edge(u,v)∈E(G),we have u?v in G DLSS.

Proof:Let all the edges(u,v)∈E(G)be sorted in the increasing order of weight,i.e.,w(u1,v1)

1)Basis:The?rst edge(u1,v1)satis?es w(u1,v1)=

min(u,v)∈E(G){w(u,v)}.According to Algorithm1, (u1,v1)and(v1,u1)will be inserted into G DLSS,i.e., u1DLSS

←??→v1.

2)Induction:Assume the hypothesis holds for all edges

(u i,v i),1≤i

If u k DLSS

????→v k,then u k?v k.Otherwise in the local

topology construction of u,before edge(u k,v k)was inserted into T u

k

,there must already exist a path p= (w0=u k,w1,w2,···,w m?1,w m=v k)from u k to v k, where(w i,w i+1)∈E(T u

k

),i=0,1,···,m?1.Since edges are inserted in a ascending order of weight,we have w(w i,w i+1)

Theorem1:G DLSS preserves the connectivity of G,i.e., G DLSS is strongly connected if G is strongly connected.

Proof:Suppose G is strongly connected.For any two nodes u,v∈V(G),there exists at least one path p= (w0=u,w1,w2,···,w m?1,w m=v)from u to v,where (w i,w i+1)∈E(G),i=0,1,···,m?1.Since w i?w i+1 by Lemma1,we have u?v.

Lemma2:Given three nodes u,v,w∈V(G DLSS)satisfy-ing w(u,v)>w(u,w)and w(u,v)>w(w,v),d(w,v)≤r w, then u v in G DLSS.

Proof:We only need to consider the case where d(u,v)≤r u since d(u,v)>r u would imply u v.Consider the local topology construction of u.Before we insert(u,v) into T u,the two edges(u,p)and(p,v)have already been processed since w(u,p)

Theorem2:The edge set of G DLSS is a subset of the edge set of G DRNG,i.e.,E(G DLSS)?E(G DRNG).

Proof:We prove by contradiction.Given any edge (u,v)∈E(G DLSS),assume(u,v)/∈E(G DRNG).According to the de?nition of DRNG,there must exist a third node p such that w(u,p)

Theorem3(Connectivity of DRNG):If G is strongly con-nected,then G DRNG is also strongly connected.

Proof:This is a direct result of Theorem1and Theo-rem2.

B.Bi-directionality

Now we discuss the bi-directionality property of DLSS and DRNG.Since Addition may not always result in bi-directional topologies,we?rst apply Removal to topologies by DLSS and DRNG.It turns out the simple Removal operation may lead to disconnectivity.Examples are given in Figs.7–8to show, respectively,that DLSS and DRNG with Removal may result in disconnectivity.

In general,G may not be bi-directional if the transmission ranges are non-uniform.Since the maximal transmission range can not be increased,it may be impossible to?nd a bi-directional connected subgraph of G for some cases.An

trol)is strongly connected.

strongly connected:there are 2components.

Fig.7.

An example that shows DLSS with Removal may result in

disconnectivity.

trol)is strongly

connected.

nected.

strongly connected:there are 2components.

Fig.8.

An example that shows DRNG with Removal may result in disconnectivity.

example is given in Fig.6:v 1can reach v 2and v 4,v 2can reach v 1and v 3,v 3can reach v 2and v 4,and v 4can reach v 2only.Addition does not lead to bi-directionality since all edges entering or leaving v 4are uni-directional with all nodes already transmitting with their maximal power.On the other hand,Removal will partition the network.In this example,although the graph G is strongly connected,its subgraph with the same vertex set cannot be both connected and bi-directional.

Now we show that bi-directionality can be ensured if the original topology is both strongly connected and bi-directional.Theorem 4:If the original topology G is strongly connected and bi-directional,then G DLSS and G DRNG are also strongly connected and bi-directional after Addition or Removal .Proof:Since E (G DLSS )?E (G DRNG ),we have E (G ?DLSS )?E (G +DLSS )and E (G ?DLSS )?E (G ?DRNG )?E (G +DRNG ).Therefore,we only need to prove that G ?DLSS preserves the strong connectivity.

In the Induction step in Lemma 1,the only reason we

cannot prove that u k DLSS

←??→v k is that edge (v k ,u k )may not exist.Given that G is bi-directional,we are able to prove

that u k DLSS

←??→v k .Hence for any edge (u,v )∈E (G ),we have u ?v in G DLSS .The removal of asymmetric edges in G DLSS does not affect this property.Therefore,G ?DLSS is still strongly

connected.

u

Fig.9.The de?nition of Cone (u,α,v ).

C.Degree Bound

It has been observed that any minimum spanning tree of a simple undirected graph in the plane has a maximum node degree of 6[21].However,this bound does not hold for directed graphs.An example is shown in Fig.10,where node u has 18neighbors.In this section,we will discuss the node degree in the topology by DLSS and DRNG.

De?nition 14(Disk):Disk (u,r )is the disk centered at node u with a radius of r .

De?nition 15(Cone):Cone (u,α,v )is the unbounded shaded region shown in Fig.9.

The following corollary is a direct result of Lemma 1.Corollary 1:If v is a neighbor of u ’s in G DLSS ,and d (u,v )≥r min ,then u can not have any other neighbor inside Disk (v,r min ).

Theorem 5:For any node u ∈V (G DLSS ),the number of

Fig.10.An example that shows the out degree in a heterogenous network can be very large.The transmission range of u is r max and the transmission range for all other nodes is r min ,where r max =2(r min + ), >0.All nodes are so arranged that the distance between any node and its closest neighbor is r min + .Therefore,the only links in the network are those from u to all the other nodes.Since relaying packets is impossible,u has to use its maximal transmission power and keeps all 18neighbors.

neighbors in G DLSS that are inside Disk (u,r min )is at most 6.

Proof:Let N (u )be the set of neighbors of u in G DLSS that are inside Disk (u,r min ).Let the nodes in N (u )be ordered such that for the i th node w i and the j th node w j (j >i ),w (u,w j )>w (u,w i ).By Lemma 2,we have w (u,w j )≤w (w i ,w j )(otherwise u w j ).Thus ∠w i uw j ≥π/3,i.e.,node w j cannot reside inside Cone (u,2π/3,w i ).Therefore,node u cannot have neighbors other than node w i inside Cone (u,2π/3,w i ).By induction on the rank of nodes in N (u ),the maximal number of neighbors that u can have is at most 6.

Theorem 6:The out degree of node in G DLSS is bounded by a constant that depends only on r max and r min .

Proof:For any node u in G DLSS ,there are at most 6neighbors inside Disk (u,r min )from Theorem 5.Also from Corollary 1,the set of disks {Disk (v,r min

2):v ∈

N DLSS (u ),v /∈Disk (u,r min )}are disjoint.Therefore,the total number of neighbors of u is bounded by:

c 1=6+ π[(r max +r min

2)2?(r min 2)2]π(r min 2

)2 =4 β(β+1) +6,where β=r max

r min .Actually we can observe that Fig.10shows the scenario where the maximum out degree of u is achieved if →0.Therefore,we can further tighten the bound.Since the hexagonal area (as shown in Fig.10)centered at every neighbor of u is disjoint with each other,the total number of neighbors of u is bounded by:

c 2=

π(r max +r min √3)2√32r 2min

?1= 2π

√3(β+1√3)2 ?1.Fig.11.The out degree may be unbounded in G DRNG .

The bound given in Theorem 5is actually quite large.We

will show in Section VI that the average maximum degree is much smaller for networks with random distributed nodes.Also note that what has been discussed so far is actually the logical node degree,i.e.,the number of logical neighbors.In practice,it is more important to consider the physical node degree,i.e.,the number of nodes within the transmission radius.If omni-directional antennas are used,the physical degree cannot be bounded for an arbitrary topology.However,with the help of directional antennas,we will be able to bound the physical degree given that the logical degree is bounded under DLSS (except in some extreme cases, e.g.,a large number of nodes are of the same distance from one node).The idea is that,when transmitting to a speci?c neighbor,node u should adjust the direction and limit the transmission power so that no other nodes will be affected.

Notice that the out degree is not bounded in G DRNG .An example is given in Fig.11.For all p i that lies inside the shaded area,as long as r p i

As mentioned in Section IV,in the case that nodes may have different maximal transmission powers,the operation of having each node u broadcast its own position information to all the other nodes within r u is not suf?cient to ensure each

node u obtains the information of reachable neighborhood N R

u (Fig.(6)).Fortunately with the desirable properties of DRNG and DLSS proved in Sections V-A and V-B,we show that it is suf?cient for node u to collect neighborhood information only from nodes whose maximal transmission range covers node u .That is,the original information exchange algorithm that requires only “one-hop”information suf?ces.

Consider a directed simple graph with less edges:G =(V (G ),E (G )),where E (G )={(u,v ):d (u,v )≤min(r u ,r v ),u,v ∈V (G )}.For any edge (u,v )∈E (G ),since d (u,v )≤min(r u ,r v ),we have (v,u )∈E (G ),which

means G is bi-directional.De?ne N R u

={v ∈V (G ):

d (u,v )≤min(r u ,r v )},r u

=max v ∈N R u {d (u,v )},where

Fig.12.Topologies derived by R&M,DRNG,and DLSS.

r u ≤r u since for any v∈N R u ,d(u,v)≤r u.Let r min = min v∈V{r v }and r max =max v∈V{r v }.By requiring each node u to broadcast its position and id to all other nodes within r u,we are able to determine N R u and r u .We can then apply DRNG and DLSS on top of G and prove that Theorems1-5 still hold even if the original topology is G .

Theorem7:Theorems1–6still holds if the original topol-ogy is G .

Proof:We replace G,r u,N R u,r min,and r max with G ,r u ,N R u ,r min and r max in the proof of Lemma1–2and Theorem1–6.Then following the same line of arguments,we can prove that they still hold if the original topology is G . Theorem8:If the original topology is G (which is a subgraph of G),G DLSS and G DRNG are bi-directional after Addition or Removal.

Proof:We apply Theorem4to G ,for G is bi-directional.

VI.S IMULATION S TUDY

In this section,we evaluate the performance of R&M,DRNG,and DLSS by simulations.All three algorithms are known to preserve network connectivity in heterogeneous networks.

In the ?rst simulation,50nodes are uniformly distributed in a 1000m ×1000m region.The transmission ranges of nodes are uniformly distributed in [200m,250m ].Fig.12gives the topologies derived using the maximal transmission power (labeled as NONE),R&M (under the two-ray ground model),DRNG,and DLSS for one simulation instance.As shown in Fig.12,R&M,DRNG and LMST all signi?cantly reduce the average node degree,while maintaining network connectivity.Moreover,both DRNG and DLSS outperforms R&M in the sense that fewer edges are formed in the topology.

# Nodes

A v e r a g e R a d i u s (m )

(a)Average

radius.

# Nodes

A v e r a g e L i n k L e n g t h (m )

(b)Average link length

https://www.wendangku.net/doc/767867144.html,parison of DLSS,DRNG and R&M with respect to average radius and average edge length.

In the second simulation,we vary the number of nodes in the region from 100to 300,and each data point is an average

100

120140160180200220240260280300

22.5

3

3.5

(a)Average logical out degree.

# Nodes

A v e r a g e P h y s i c a l D e g r e e

(b)Average physical out degree.

https://www.wendangku.net/doc/767867144.html,parison of R&M,DRNG and DLSS with respect to average out degree.

of 50simulation runs.The transmission ranges of nodes are uniformly distributed in [200m,250m ].Fig.13shows the average radius and the average link length for the topologies derived under NONE(no topology control),R&M,DRNG,and DLSS.DLSS outperforms the others,which implies that DLSS can provide a better spatial reuse and use less energy to communicate.

We also compare the out degree of the topologies by different algorithms.The result of NONE is not shown because its out degrees increase almost linearly with the number of nodes and are signi?cantly larger than those under R&M,DRNG,and DLSS.Fig.14shows the average logical/physical out degree for the topologies derived by R&M,DRNG,and DLSS.The average out degrees under R&M and DRNG increase with the increase in the number of nodes,while those under DLSS actually decrease.Fig .15shows the average maximum logical degree and the largest maximum logical

# Nodes

A v e r a g e M a x L o g i c a l D e g r e e

(a)Average maximum logical out degree.

# Nodes

L a r g e s t M a x L o g i c a l D e g r e e

(b)Largest maximum logical out degree.

https://www.wendangku.net/doc/767867144.html,parison of R&M,DRNG and DLSS with respect to the maximum logical degree.

out degree for each number of nodes.The largest maximum logical degree under DLSS is at most 4,and is well below the theoretical upper bound obtained in Theorem 6.Also DLSS has much smaller degrees than the other topologies.Similar results can be observed in Fig.16for physical degrees.The only difference is that the physical degrees are in general larger than the logical degrees for the same network.

VII.C ONCLUSIONS

In this paper,we have proposed two local topology control algorithms,Directed Relative Neighborhood Graph (DRNG)and Directed Local Spanning Subgraph (DLSS),for heteroge-neous wireless multi-hop networks in which each node may have different maximal transmission ranges.We show that as most existing topology control algorithms (except R&M [4])do not consider the fact that nodes may have different maximal transmission ranges,they render disconnected network

topol-

# Nodes

A v e r a g e M a x P h y s i c a l D e g r e e

(a)Average maximum physical out

degree.

# Nodes

L a r g e s t M a x P h y s i c a l D e g r e e

(b)Largest maximum physical out degree.

https://www.wendangku.net/doc/767867144.html,parison of R&M,DRNG and DLSS with respect to the maximum physical degree.

ogy when directly applied to heterogeneous networks.Then we devise DRNG and DLSS and prove that (i)both DRNG and DLSS preserve network connectivity;(ii)both DRNG and DLSS preserve network bi-directionality if Addition and Remove operations are applied to the topologies derived under these algorithms;and (iii)the out degree of any node is bounded in the topology derived under DLSS,while that may be unbounded under DRNG.The simulation study validates the superiority of DRNG and DLSS over R&M.

As part of our future research,we will pursue the following open problems:(1)given a topology in which each node transmits with different maximal transmission power,what is the probability that the topology is bi-directional with respect to the distribution and the density of nodes,and the distribution of the transmission ranges?and (2)How will MAC-level interference affect network connectivity and bi-directionality?

R EFERENCES

[1] C.E.Jones,K.M.Sivalingam,P.Agrawal,and J.C.Chen,“A survey

of energy ef?cient network protocols for wireless networks,”Wireless Networks,vol.7,no.4,pp.343–358,Aug.2001.

[2]P.Gupta and P.R.Kumar,“The capacity of wireless networks,”IEEE

https://www.wendangku.net/doc/767867144.html,rm.Theory,vol.46,no.2,pp.388–404,Mar.2000.

[3]S.Narayanaswamy,V.Kawadia,R.S.Sreenivas,and P.R.Kumar,

“Power control in ad-hoc networks:Theory,architecture,algorithm and implementation of the COMPOW protocol,”in Proc.of European Wire-less2002,Next Generation Wireless Networks:Technologies,Protocols, Services and Applications,Florence,Italy,Feb.2002,pp.156–162. [4]V.Rodoplu and T.H.Meng,“Minimum energy mobile wireless net-

works,”IEEE J.Select.Areas Commun.,vol.17,no.8,pp.1333–1344, Aug.1999.

[5]R.Ramanathan and R.Rosales-Hain,“Topology control of multihop

wireless networks using transmit power adjustment,”in Proc.IEEE INFOCOM2000,Tel Aviv,Israel,Mar.2000,pp.404–413.

[6]L.Li,J.Y.Halpern,P.Bahl,Y.-M.Wang,and R.Wattenhofer,

“Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks,”in Proc.ACM Symposium on Principles of Distributed Computing(PODC),Newport,RI,USA,Aug.2001,pp.

264–273.

[7]V.Kawadia and P.Kumar,“Power control and clustering in ad hoc

networks,”in Proc.IEEE INFOCOM2003,San Francisco,CA,USA, Apr.2003.

[8]S.A.Borbash and E.H.Jennings,“Distributed topology control algo-

rithm for multihop wireless networks,”in Proc.2002World Congress on Computational Intelligence(WCCI),Honolulu,HI,USA,May2002.

[9]X.-Y.Li,G.Calinescu,and P.-J.Wan,“Distributed construction of planar

spanner and routing for ad hoc networks,”in Proc.IEEE INFOCOM 2002,New York,NY,USA,June2002.

[10]N.Li,J. C.Hou,and L.Sha,“Design and analysis of an MST-

based topology control algorithm,”in Proc.IEEE INFOCOM2003,San Francisco,CA,USA,Apr.2003.[11] C.Kee,H.Jun,D.Yun,B.Kim,Y.Kim,B.W.Parkinson,https://www.wendangku.net/doc/767867144.html,ngen-

stein,S.Pullen,and J.Lee,“Development of indoor navigation system using asynchronous pseudolites,”in Proc.13th International Technical Meeting of the Satellite Division of the Institute of Navigation(ION GPS),Salt Lake City,UT,USA,Sept.2000,pp.1038–1045.

[12]T.He,C.Huang,B.M.Blum,J.A.Stankovic,and T.Abdelzaher,

“Range-free localization schemes for large scale sensor networks,”

in Proc.ACM International Conference on Mobile Computing and Networking(MOBICOM),San Diego,CA,USA,Sept.2003,pp.81–95.

[13]G.Toussaint,“The relative neighborhood graph of a?nite planar set,”

Pattern Recognition,vol.12,pp.261–268,1980.

[14]K.J.Supowit,“The relative neighborhood graph,with an application

to minimum spanning trees,”Journal of the ACM,vol.30,no.3,pp.

428–448,July1983.

[15]P.Santi, D.M.Blough,and F.Vainstein,“A probabilistic analysis

for the range assignment problem in ad hoc networks,”in Proc.ACM Symposium on Mobile Ad Hoc Networking and Computing(MOBIHOC), Long Beach,CA,USA,Aug.2000,pp.212–220.

[16]S.Basagni,D.Turgut,and S.K.Das,“Mobility-adaptive protocols

for managing large ad hoc networks,”in Proc.IEEE International Conference on Communications(ICC),Helsinki,Finland,June2001, pp.1539–1543.

[17]M.G.J.Wu and I.Stojmenovic,“On calculating power-aware connected

dominating sets for ef?cient routing in ad hoc wireless networks,”in Proc.International Conference on Parallel Processing,Vancouver,BC, Canada,Aug.2002,pp.346–354.

[18]Y.J.Chu and T.H.Liu,“On the shortest arborescence of a directed

graph,”Science Sinica,vol.14,pp.1396–1400,1965.

[19]J.Edmonds,“Optimum branchings,”Journal of Research of the National

Bureau of Standards,vol.71B,pp.233–240,1967.

[20] F.Bock,“An algorithm to construct a minimum spanning tree in a

directed network,”in Developments in Operations Research.New York, NY:Gordon and Breach Science Publishers,1971,pp.29–44.

[21] C.Monma and S.Suri,“Transitions in geometric minimum spanning

trees,”in Proc.ACM Symposium on Computational Geometry,North Conway,NH,USA,1991,pp.239–249.

系泊系统的设计和探究

赛区评阅编号(由赛区组委会填写): 2016年高教社杯全国大学生数学建模竞赛 承诺书 我们仔细阅读了《全国大学生数学建模竞赛章程》和《全国大学生数学建模竞赛参赛规则》(以下简称为“竞赛章程和参赛规则”,可从全国大学生数学建模竞赛网站下载)。 料 我们的报名参赛队号(12位数字全国统一编号): 参赛学校(完整的学校全称,不含院系名): 参赛队员 (打印并签名) :1. 2.

3. 指导教师或指导教师组负责人 (打印并签名): (指导教师签名意味着对参赛队的行为和论文的真实性负责) 日期:年月日 送全国评阅统一编号(赛区组委会填写): 全国评阅随机编号(全国组委会填写): (请勿改动此页内容和格式。此编号专用页仅供赛区和全国评阅使用,参赛队打印后装订到纸质论文的第二页上。注意电子版论文中不得出现此页。)

系泊系统的设计和探究 摘要 本文利用牛顿力学定律,力矩平衡原理、非线性规划、循环遍历法等方法对系泊系统进行了设计与探究。通过对系泊系统各组件和浮标运用牛顿经典力学体系进行分析,得到了各个情况下的钢桶倾斜角度、锚链状态、浮标吃水深度和游动区域。 ?, 。当风 对于第二问,求解当海面风速为36m/s时,浮标的吃水深度和游动区域、钢桶以及钢管的倾斜角度和锚链形态。利用第一问中的力学方程和程序,求得钢桶的倾角为19.5951?和四节钢管的倾斜角度依次为19.756?、19.755?、19.916?、20.076?。浮标的游动区域为以锚在海面上的投影为圆心,半径为18.8828m的圆。由于部分数据与问题二中钢桶的倾斜角度不超过5?,锚链在锚点与海床的夹角不超过16?的要求不符,所以通过调节重物球的质量使钢桶的倾斜角度和锚链在锚点与海床的夹角处在要求的范围之内。借助MATLAB程序中的循环遍历法,可以求得重物球的质量3770kg。

usb驱动程序教程

编写Windows https://www.wendangku.net/doc/767867144.html,的usb驱动程序教程 Windows https://www.wendangku.net/doc/767867144.html, 是微软推出的功能强大的嵌入式操作系统,国内采用此操作系统的厂商已经很多了,本文就以windows https://www.wendangku.net/doc/767867144.html,为例,简单介绍一下如何开发windows https://www.wendangku.net/doc/767867144.html, 下的USB驱动程序。 Windows https://www.wendangku.net/doc/767867144.html, 的USB系统软件分为两层: USB Client设备驱动程序和底层的Windows CE实现的函数层。USB设备驱动程序主要负责利用系统提供的底层接口配置设备,和设备进行通讯。底层的函数提本身又由两部分组成,通用串行总线驱动程序(USBD)模块和较低的主控制器驱动程序(HCD)模块。HCD负责最最底层的处理,USBD模块实现较高的USBD函数接口。USB设备驱动主要利用 USBD接口函数和他们的外围设备打交道。 USB设备驱动程序主要和USBD打交道,所以我们必须详细的了解USBD提供的函数。 主要的传输函数有: abourttransfer issuecontroltransfer closetransfer issuein te rruptransfer getisochresult issueisochtransfer gettransferstatus istransfercomplete issuebulktransfer issuevendortransfer 主要的用于打开和关闭usbd和usb设备之间的通信通道的函数有: abortpipetransfers closepipe isdefaultpipehalted ispipehalted openpipe resetdefaultpipe resetpipe 相应的打包函数接口有: getframelength getframenumber releaseframelengthcontrol setframelength takeframelengthcontrol 取得设置设备配置函数: clearfeature setdescriptor getdescriptor setfeature

2016数学建模A题系泊系统设计

系泊系统的设计 摘要 对于问题一,建立模型一,已知题目给出的锚链长度与其单位长度的质量,得到悬链共210环。对各节锚链,钢桶,四节钢管受力分析得出静力平衡方程,使用分段外推法,可以得到静力平衡下的迭代方程。其中锚对锚链的拉力大小方向为输入变量,迭代的输出变量为浮标的位置和对钢管的拉力,在给定的风速下,输入和输出满足关系2)2(25.1cos 水v h T -=α,αθcos cos 11T T =,通过多层搜索算法得出最符合的输入输出值,即可得到给定风速下浮标的吃水深度,浮标拉力、锚链与海床夹角。利用MATLAB 软件编程求解模型得到:风力12m/s 时,钢桶与竖直方向上的角度1.9863度,从下往上四节钢管与竖直方向夹角为1.9652度、1.9592度、1.9532度、1.9472度,浮标吃水0.7173m ,以锚为圆心浮标的游动区域16.5125m ,锚链末端切线与海床的夹角3.8268度。风力24m/s 时,锚链形状,钢桶与竖直方向上的夹角3.9835度,从下往上四节钢管与竖直方向夹角为3.9420度、3.9301度、3.9183度、3.9066度,浮标吃水0.7244m ,以锚为圆心浮标的游动区域18.3175m 。锚链末端切线与海床夹角15.9175度。 对于问题二的第一小问,使用模型一求解,当风速36m/s 时,锚链末端切线与海床夹角26.3339度,浮标吃水0.7482m ,浮标游动区域为以锚为圆心半径为18.9578m 的圆形区域,从下往上四节钢管与竖直方向倾斜角度为8.4463度、8.4225度、8.3989度、8.3753度,钢桶与竖直方向倾斜角度为8.5294度。为满足问题二的要求,在模型一的基础上把重物球质量作为变量,建立模型二,将钢桶倾斜角小于5度和锚链前端夹角小于16度当做两个约束条件,通过MATLAB 编程求解得到满足约束条件要求的重物球质量取值范围为3700kg 到5320kg 。 对于问题三,首先取不同水深、水速、风速三种情况,建立模型三,即在模型一的基础上增加水流对系统产生的影响。在三种情况下,找到合适的锚链型号、锚链长度,重物球质量,对吃水深度、游动区域、钢桶的倾斜角三个目标进行优化达到最小。通过MATLAB 编程实现该模型三得到结果:选用Ⅲ型锚链,锚链长度为27.24m ,重物球质量为2580kg 。 关键词:平面静力系分析 多层搜索算法 遗传算法 逐步外推法 多目标优化

USB驱动程序编写

USB驱动程序编写 linux下usb驱动编写(内核2.4)——2.6与此接口有区别2006-09-15 14:57我们知道了在Linux 下如何去使用一些最常见的USB设备。但对于做系统设计的程序员来说,这是远远不够的,我们还需要具有驱动程序的阅读、修改和开发能力。在此下篇中,就是要通过简单的USB驱动的例子,随您一起进入USB驱动开发的世界。 USB骨架程序(usb-skeleton),是USB驱动程序的基础,通过对它源码的学习和理解,可以使我们迅速地了解USB驱动架构,迅速地开发我们自己的USB硬件的驱动。 USB驱动开发 在掌握了USB设备的配置后,对于程序员,我们就可以尝试进行一些简单的USB驱动的修改和开发了。这一段落,我们会讲解一个最基础USB框架的基础上,做两个小的USB驱动的例子。 USB骨架 在Linux kernel源码目录中driver/usb/usb-skeleton.c为我们提供了一个最基础的USB驱动程序。我们称为USB骨架。通过它我们仅需要修改极少的部分,就可以完成一个USB设备的驱动。我们的USB驱动开发也是从她开始的。 那些linux下不支持的USB设备几乎都是生产厂商特定的产品。如果生产厂商在他们的产品中使用自己定义的协议,他们就需要为此设备创建特定的驱动程序。当然我们知道,有些生产厂商公开他们的USB协议,并帮助Linux驱动程序的开发,然而有些生产厂商却根本不公开他们的USB协议。因为每一个不同的协议都会产生一个新的驱动程序,所以就有了这个通用的USB驱动骨架程序,它是以pci 骨架为模板的。 如果你准备写一个linux驱动程序,首先要熟悉USB协议规范。USB主页上有它的帮助。一些比较典型的驱动可以在上面发现,同时还介绍了USB urbs的概念,而这个是usb驱动程序中最基本的。 Linux USB 驱动程序需要做的第一件事情就是在Linux USB 子系统里注册,并提供一些相关信息,例如这个驱动程序支持那种设备,当被支持的设备从系统插入或拔出时,会有哪些动作。所有这些信息都传送到USB 子系统中,在usb骨架驱动程序中是这样来表示的: static struct usb_driver skel_driver = { name: skeleton, probe: skel_probe, disconnect: skel_disconnect, fops: &skel_fops, minor: USB_SKEL_MINOR_BASE, id_table: skel_table,

家装用尺寸一览表

家装用尺寸一览表 Revised by Hanlin on 10 January 2021

家装用尺寸一览表 ▌标准入户门洞0.9m*2m, ▌房间门洞0.9m*2m, ▌厨房门洞0.8m*2m, ▌卫生间门洞0.7m*2m ▌客厅:长沙发:240*90*75cm长方形茶几:130*70*45cm电视柜:200*50*180cm电视离沙发:3m电视高度与电视柜高差:40到120cm走道宽度:100至120cm ▌厨房:橱柜操作台:台面高80cm左右面积90*46(最小20最大60)cm吊柜:离台面60cm左右高度在145cm到150cm餐桌:餐桌高:750—790mm。餐椅高;450—500mm。圆桌直径:二人500mm.二人800mm,四人900mm,五人1100mm,六人1100-1250mm,八人1300mm,十人l500mm,十二人1800mm。方餐桌尺寸:二人700×850(mm),四人1350×850(mm),八人2250×850(mm) ▌卫生间:浴缸长度:一般有三种1220、1520、1680mm;宽:720mm,高:450mm。坐便:750×350(mm)。冲洗器:690×350(mm)。盟洗盆:550×410(mm)。淋浴器高:2100mm。化妆台:长:1350mm;宽450mm。 ▌卧室:标准双人床尺寸:150*190、150*200厘米,被套的尺寸应配180*215和200*230之间的。加大双人床尺寸:180*200厘米,被套一般为200*230或220*240。床头柜宽:400毫米-600毫米,深:350毫米-450毫米高:500毫米-700毫米。衣柜:柜门尺寸,单

USB设备驱动程序设计

USB设备驱动程序设计 引言 USB 总线是1995 年微软、IBM 等公司推出的一种新型通信标准总线, 特点是速度快、价格低、独立供电、支持热插拔等,其版本从早期的1.0、1.1 已经发展到目前的2.0 版本,2.0 版本的最高数据传输速度达到480Mbit/s,能 满足包括视频在内的多种高速外部设备的数据传输要求,由于其众多的优点,USB 总线越来越多的被应用到计算机与外设的接口中,芯片厂家也提供了多种USB 接口芯片供设计者使用,为了开发出功能强大的USB 设备,设计者往往 需要自己开发USB 设备驱动程序,驱动程序开发一直是Windows 开发中较难 的一个方面,但是通过使用专门的驱动程序开发包能减小开发的难度,提高工 作效率,本文使用Compuware Numega 公司的DriverStudio3.2 开发包,开发了基于NXP 公司USB2.0 控制芯片ISP1581 的USB 设备驱动程序。 USB 设备驱动程序的模型 USB 设备驱动程序是一种典型的WDM(Windows Driver Model)驱动程序,其程序模型如图1 所示。用户应用程序工作在Windows 操作系统的用户模式层,它不能直接访问USB 设备,当需要访问时,通过调用操作系统的 API(Application programming interface)函数生成I/O 请求信息包(IRP),IRP 被传输到工作于内核模式层的设备驱动程序,并通过驱动程序完成与UBS 外设通 信。设备驱动程序包括两层:函数驱动程序层和总线驱动程序层,函数驱动程 序一方面通过IRP 及API 函数与应用程序通信,另一方面调用相应的总线驱动 程序,总线驱动程序完成和外设硬件通信。USB 总线驱动程序已经由操作系统 提供,驱动程序开发的重点是函数驱动程序。 USB 设备驱动程序的设计

2017最完整家装尺寸大全

家具设计的基本尺寸(单位:cm) 衣橱:深度:一般60~65;推拉门:70,衣橱门宽度:40~65 推拉门:75~150,高度:190~240 矮柜:深度:35~45,柜门宽度:30-60 电视柜:深度:45-60,高度:60-70 单人床:宽度:90,105,120;长度:180,186,200,210 双人床:宽度:135,150,180;长度180,186,200,210 圆床:直径:186,212.5,242.4(常用) 室内门:宽度:80-95,医院120;高度:190,200,210,220,240 厕所、厨房门:宽度:80,90;高度:190,200,210 窗帘盒:高度:12-18;深度:单层布12;双层布16-18(实际尺寸) 沙发:单人式:长度:80-95,深度:85-90;坐垫高:35-42;背高:70-90 双人式:长度:126-150;深度:80-90 三人式:长度:175-196;深度:80-90 四人式:长度:232-252;深度80-90 茶几:小型,长方形:长度60-75,宽度45-60,高度38-50(38最佳) 中型,长方形:长度120-135;宽度38-50或者60-75 正方形:长度75-90,高度43-50 大型,长方形:长度150-180,宽度60-80,高度33-42(33最佳) 圆形:直径75,90,105,120;高度:33-42 方形:宽度90,105,120,135,150;高度33-42 书桌:固定式:深度45-70(60最佳),高度75 活动式:深度65-80,高度75-78 书桌下缘离地至少58;长度:最少90(150-180最佳) 餐桌:高度75-78(一般),西式高度68-72,一般方桌宽度120,90,75;长方桌宽度80,90,105,120;长度150,165,180,210,240 圆桌:直径90,120,135,150,180 书架:深度25-40(每一格),长度:60-120;下大上小型下方深度35-45,高度80-90活动未及顶高柜:深度45,高度180-200 木隔间墙厚:6-10;内角材排距:长度(45-60)*90

系泊系统的设计和探究

系泊系统的设计和探究 This model paper was revised by the Standardization Office on December 10, 2020

赛区评阅编号(由赛区组委会填写): 2016年高教社杯全国大学生数学建模竞赛 承诺书 我们仔细阅读了《全国大学生数学建模竞赛章程》和《全国大学生数学建模竞赛参赛规则》(以下简称为“竞赛章程和参赛规则”,可从全国大学生数学建模竞赛网站下载)。 我们完全明白,在竞赛开始后参赛队员不能以任何方式(包括电话、电子邮件、网上咨询等)与队外的任何人(包括指导教师)研究、讨论与赛题有关的问题。 我们知道,抄袭别人的成果是违反竞赛章程和参赛规则的,如果引用别人的成果或资料(包括网上资料),必须按照规定的参考文献的表述方式列出,并在正文引用处予以标注。在网上交流和下载他人的论文是严重违规违纪行为。 我们以中国大学生名誉和诚信郑重承诺,严格遵守竞赛章程和参赛规则,以保证竞赛的公正、公平性。如有违反竞赛章程和参赛规则的行为,我们将受到严肃处理。 我们授权全国大学生数学建模竞赛组委会,可将我们的论文以任何形式进行公开展示(包括进行网上公示,在书籍、期刊和其他媒体进行正式或非正式发表等)。 我们参赛选择的题号(从A/B/C/D中选择一项填写): 我们的报名参赛队号(12位数字全国统一编号): 参赛学校(完整的学校全称,不含院系名): 参赛队员 (打印并签名) :1.

2. 3. 指导教师或指导教师组负责人 (打印并签名): (指导教师签名意味着对参赛队的行为和论文的真实性负责) 日期:年月日 (请勿改动此页内容和格式。此承诺书打印签名后作为纸质论文的封面,注意电子版论文中不得出现此页。以上内容请仔细核对,如填写错误,论文可能被取消评奖资格。) 赛区评阅编号(由赛区组委会填写): 2016年高教社杯全国大学生数学建模竞赛 编号专用页 赛区评阅记录(可供赛区评阅时使用): 送全国评阅统一编号(赛区组委会填写): 全国评阅随机编号(全国组委会填写):

最新开发usb驱动程序的方法连载一

最新开发usb驱动程序的方法连载一 开发usb驱动程序的方法(连载二) NT还有更多其他的对象,例如中断对象、Controller对象、定时器对象等等,但在我们开发的驱动程序中并没有用到,因此在这里不做介绍。 I/O缓冲策略 很明显的,驱动程序和客户应用程序经常需要进行数据交换,但我们知道驱动程序和客户应用程序可能不在同一个地址空间,因此操作系统必须解决两者之间的数据交换。这就就设计到设备的I/O缓冲策略。 读写请求的I/O缓冲策略 前面说到通过设置Device对象的Flag可以选择控制处理读写请求的I/O缓冲策略。下面对这些缓冲策略分别做一介绍。 1、缓冲I/O(DO_BUFFERED_IO) 在读写请求的一开始,I/O管理器检查用户缓冲区的可访问性,然后分配与调用者的缓冲区一样大的非分页池,并把它的地址放在IRP的AssociatedIrp.SystemBuffer域中。驱动程序就利用这个域来进行实际数据的传输。 对于IRP_MJ_READ读请求,I/O管理器还把IRP的UserBuffer域设置成调用者缓冲区的用户空间地址。当请求完成时,I/O管理器利用这个地址将数据从驱动程序的系统空间拷贝回调用者的缓冲区。对于IRP_MJ_WRITE写请求,UserBuffer被设置为NULL,并把用户缓冲区的数据拷贝到系统缓冲区中。 2、直接I/O(DO_DIRECT_IO) I/O管理器首先检查用户缓冲区的可访问性,并在物理内存中锁定它。然后它为该缓冲区创建一个内存描述表(MDL),并把MDL的地址存放在IRP的MdlAddress域中。AssociatedIrp.SystemBuffer和 UserBuffer 都被设置为NULL。驱动程序可以调用函数 MmGetSystemAddressForMdl得到用户缓冲区的系统空间地址,从而进行数据操作。这个函数将调用者的缓冲区映射到非份页的地址空间。驱动程序完成I/O请求后,系统自动从系统空间解除缓冲区的映射。 3、这两种方法都不是 这种情况比较少用,因为这需要驱动程序自己来处理缓冲问题。 I/O管理器仅把调用者缓冲区的用户空间地址放到IRP的UserBuffer 域中。我们并不推荐这种方式。 IOCTL缓冲区的缓冲策略 IOCTL请求涉及来自调用者的输入缓冲区和返回到调用者的输出缓冲区。为了理解IOCTL请求,我们先来看看WIN32 API DeviceIoControl函数的原型。 BOOL DeviceIoControl ( HANDLE hDevice, // 设备句柄 DWORD dwIoControlCode, // IOCTL请求操作代码 LPVOID lpInBuffer, // 输入缓冲区地址 DWORD nInBufferSize, // 输入缓冲区大小 LPVOID lpOutBuffer, // 输出缓冲区地址 DWORD nOutBufferSize, // 输出缓冲区大小 LPDWORD lpBytesReturned, // 存放返回字节数的指针

家装基本尺寸大全

家具设计的基本尺寸(单位:厘米) 衣橱:深度:一般60~65;推拉门:70,衣橱门宽度:40~65 推拉门:75~150,高度:190~240 矮柜:?深度:35~45,柜门宽度:30-60 电视柜:深度:45-60,高度:60-70 单人床:宽度:90,105,120;长度:180,186,200,210 双人床:宽度:135,150,180;长度180,186,200,210 圆床:?直径:186,,(常用) 室内门:宽度:80-95,医院120;高度:190,200,210,220,240 厕所、厨房门:宽度:80,90;高度:190,200,210 窗帘盒:高度:12-18;深度:单层布12;双层布16-18(实际尺寸) 沙发:单人式:长度:80-95,深度:85-90;坐垫高:35-42;背高:70-90双人式:长度:126-150;深度:80-90 三人式:长度:175-196;深度:80-90 四人式:长度:232-252;深度80-90 茶几:小型,长方形:长度60-75,宽度45-60,高度38-50(38最佳) 中型,长方形:长度120-135;宽度38-50或者60-75 正方形:?长度75-90,高度43-50 大型,长方形:长度150-180,宽度60-80,高度33-42(33最佳)

圆形:直径75,90,105,120;高度:33-42 方形:宽度90,105,120,135,150;高度33-42 书桌:固定式:深度45-70(60最佳),高度75 活动式:深度65-80,高度75-78 书桌下缘离地至少58;长度:最少90(150-180最佳) 餐桌:高度75-78(一般),西式高度68-72,一般方桌宽度120,90,75; 长方桌宽度80,90,105,120;长度150,165,180,210,240 圆桌:直径90,120,135,150,180 书架:深度25-40(每一格),长度:60-120;下大上小型下方深度35-45,高度80-90 活动未及顶高柜:深度45,高度180-200 木隔间墙厚:6-10;内角材排距:长度(45-60)*90 桌类家具高度尺寸:700mm、720mm、740mm、760mm四个规格; 椅凳类家具的座面高度:400mm、420mm、440mm三个规格。 桌椅高度差应控制在280至320mm范围内。

开发usb驱动程序的方法(连载一)

开发usb驱动程序的方法(连载一) 开始驱动程序设计 下面的文字是从Microsoft的DDK帮助中节选出来的,它让我们明白在开始设计驱动程序应该注意些什么问题,这些都是具有普遍意义的开发准则。应该支持哪些I/O请求在开始写任何代码之前,应该首先确定我们的驱动程序应该处理哪些IRP例程。 如果你在设计一个设备驱动程序,你应该支持和其他相同类型设备的NT驱动程序相同的IRP_MJ_XXX 和IOCTL请求代码。 如果你是在设计一个中间层NT驱动程序,应该首先确认你下层驱动程序所管理的设备,因为一个高层的驱动程序必须具有低层驱动程序绝大多数IRP_MJ_XXX例程入口。高层驱动程序在接到I/O 请求时,在确定自身IRP当前堆栈单元参数有效的前提下,设置好IRP中下一个低层驱动程序的堆栈单元,然后再调用IoCallDriver 将请求传递给下层驱动程序处理。 一旦决定好了你的驱动程序应该处理哪些IRP_MJ_XXX,就可以开始确定驱动程序应该有多少个Dispatch例程。当然也可以考虑把某些 RP_MJ_XXX处理的例程合并为同一例程处理。例如在ChangerDisk 和 VDisk里,对IRP_MJ_CREATE和IRP_MJ_CLOSE处理的例程就是同一函数。对IRP_MJ_READ和IRP_MJ_WRITE处理的例程也是同一个函数。 应该有多少个Device对象? 一个驱动程序必须为它所管理的每个可能成为I/O请求的目标的物理和逻辑设备创建一个命名Device对象。一些低层的驱动程序还可能要创建一些不确定数目的Device对象。例如一个硬盘驱动程序必须为每一个物理硬盘创建一个Device对象,同时还必须为每个物理磁盘上的每个逻辑分区创建一个Device对象。一个高层驱动驱动程序必须为它所代表的虚拟设备创建一个Device 对象,这样更高层的驱动程序才能连接它们的Device对象到这个驱动程序的Device对象。另外,一个高层驱动程序通常为它低层驱动程序所创建的Device对象创建一系列的虚拟或逻辑Device对象。 尽管你可以分阶段来设计你的驱动程序,因此一个处在开发阶段的驱动程序不必一开始就创建出所有它将要处理的所有Device对象。但从一开始就确定好你最终要创建的所有Device对象将有助于设计者所要解决的任何同步问题。另外,确定所要创建的Device对象还有助于你定义Device对象的Device Extension 的内容和数据结构。 开始驱动程序开发 驱动程序的开发是一个从粗到细逐步求精的过程。NT DDK的src\ 目录下有一个庞大的样板代码,几乎覆盖了所有类型的设备驱动程序、高层驱动程序和过滤器驱动程序。在开始开发你的驱动程序之前,你应该在这个样板库下面寻找是否有和你所要开发的类似类型的例程。例如我们所开发的驱动程序,虽然DDK 对USB描述得不是很详细,我们还是可以在src\storage\class目录发现很多和USB设备有关的驱动程序。下面我们来看开发驱动程序的基本步骤。 最简的驱动程序框架 1、写一个DriverEntry例程,在里面调用IoCreateDevice创建一个Device对象。 2、写一个处理IRP_MJ_CREA TE请求的Dispatch例程的基本框架 (参见DDK Kernel-Mode Drivers 4.4.3描述的一个DispatchCreate 例程所要完成的最基本工作。当然写了DispatchCreate例程后,要在DriverEntry 例程为IRP_MJ_CREA TE初始化例程入口)。如果驱动程序创建了多于一个Device对象,则必须为IRP_MJ_CLOSE 请求写一个例程,该例程通常情况下可以和DispatchCreate共用一个例程,参见参见DDK Kernel-Mode Drivers 4.4.3。 3、编译连接你的驱动程序。

家装各种最佳尺寸标准大全!

提供全方位装修指南,装修设计知识、丰富设计案例! 家装各种最佳尺寸标准大全! 家装最实际的规格尺寸 标准红砖24*11.5*53; 标准入户门洞0.9米*2米, 房间门洞0.9米*2米, 厨房门洞0.8米*2米, 卫生间门洞0.7米*2米, 标准水泥50kg/袋。 厨房 1.吊柜和操作台之间的距离应该是多少? 60厘米。 从操作台到吊柜的底部,您应该确保这个距离。这样,在您可以方便烹饪的同时,还可以在吊柜里放一些小型家用电器。 2.在厨房两面相对的墙边都摆放各种家具和电器的情况下,中间应该留多大的距离才不会影响在厨房里做家务? 120厘米。 为了能方便地打开两边家具的柜门,就一定要保证至少留出这样的距离。 150厘米。 这样的距离就可以保证在两边柜门都打开的情况下,中间再站一个人。 3.要想舒服地坐在早餐桌的周围,凳子的合适高度应该是多少? 80厘米。 对于一张高110厘米的早餐桌来说,这是摆在它周围凳子的理想高度。因为在桌面和凳子之间还需要30厘米的空间来容下双腿。 4.吊柜应该装在多高的地方? 145至150厘米。

提供全方位装修指南,装修设计知识、丰富设计案例! 餐厅 1. 一个供六个人使用的餐桌有多大? 2. 120厘米。 这是对圆形餐桌的直径要求。 140*70厘米。 这是对长方形和椭圆形捉制的尺寸要求。 2.餐桌离墙应该有多远? 80厘米。 这个距离是包括把椅子拉出来,以及能使就餐的人方便活动的最小距离。 3.一张以对角线对墙的正方形桌子所占的面积要有多大? 180*180平方厘米。 这是一张边长90厘米,桌角离墙面最近距离为40厘米的正方形桌子所占的最小面积。 4.桌子的标准高度应是多少? 72厘米。 这是桌子的中等高度,而椅子是通常高度为45厘米。 5.一张供六个人使用的桌子摆起居室里要占多少面积? 300*300厘米。 需要为直径120厘米的桌子留出空地,同时还要为在桌子四周就餐的人留出活动空间。这个方案适合于那种大客厅,面积至少达到600*350厘米。 6.吊灯和桌面之间最合适的距离应该是多少? 70厘米。 这是能使桌面得到完整的、均匀照射的理想距离。 卫生间 1.卫生间里的用具要占多大地方? 马桶所占的一般面积: 37厘米×60厘米。

USB驱动程序的编写采用WDM驱动程序

U S B驱动程序的编写采用W D M驱动程序 Document serial number【UU89WT-UU98YT-UU8CB-UUUT-UUT108】

USB驱动程序的编写采用WDM 驱动程序。WDM 驱动程序是一些例程的集合,它们被动地存在,等待主机系 统软件(PnP 管理器、I/O 管理器、电源管理器等)来调用或激活它们。具体驱动程序不同,其所包含 的例程也不同。一个WDM 驱动程序的基本组成包括以下5个例程:(1)驱动程序入口例程:处理驱动程序的初始化。 (2)即插即用例程:处理PnP 设备的添加、删除和停止。 (3)分发例程:处理用户应用程序发出的各种 I/O 请求。 (4)电源管理例程:处理电源管理请求。 (5)卸载例程:处理驱动程序的卸载。 包含文件: , , , , , makefile,sources) 在文件中,包含了上述五个例程: 中定义了各种数据结构还有各种IOCTL控制码,用于不同数据的读写。

中实现了各种驱动例程。包含了上述五个所说例程外还包含了其他例程,课程从下面的驱动 程序入口例程得出一些信息。 驱动程序入口例程: NTSTATUS DriverEntry( IN PDRIVER_OBJECT DriverObject, IN PUNICODE_STRING RegistryPath ) { NTSTATUS ntStatus = STATUS_SUCCESS; PDEVICE_OBJECT deviceObject = NULL; DriverObject->MajorFunction[IRP_MJ_CREATE] = Ezusb_Create; DriverObject->MajorFunction[IRP_MJ_CLOSE] = Ezusb_Close; ources. If you want to add a new source # file to this

装修预留的尺寸标准

【精华】室内装修,必须预留的最佳尺寸标准大全 2014-08-29筑龙房地产筑龙房地产 阅读引语 强烈推荐大家存的一份装修预留尺寸标准!!非常实用!! 现在新房子的设计一般都会交给专门的设计师来做,但哪怕是专业设计师制作的设计图稿,没有实地接触的设计师可能还会存在一些设计尺寸上的死角。另 外,落实图稿的是施工队的工人,工人往往疏忽大意就会犯错。于是房子装修完了,总是小错误不断。因此小哥觉得大家有必要存一份尺寸标准,监工时要用起来 哦!且看且分享吧! PART1:【客 厅】 【面积:20平方米~40平方米】 客厅是居室的门面,可以说对家具尺寸的要求是最严格的,多大的沙发配多大的茶几,多远的距离适合摆放电视等等,别看都是一些小数字,却足以令你的客厅成为一个舒适协调的地方。

电视组合柜的最小尺寸? 【200×50×180厘米】 对于小户型的客厅,电视组合柜是非常实用的,这种类型的家具一般都是由大小不同的方格组成,上部比较适合摆放一些工艺品,柜体厚度至少要保持30厘米;而下部摆放电视的柜体厚度则至少要保持50厘米,同时在选购电视柜时也要考虑组合柜整体的高度和横宽与墙壁的面宽是否协调。 长沙发或是扶手沙发的椅背应该有多高? 【85至90厘米】 沙发是用来满足人们的放松与休息的需求,所以舒适度是最重要的,这样的高度可以将头完全放在*背上,让颈部得到充分放松。如果沙发的*背和扶手过低,建议增加一个*垫来获得舒适度,如果空间不是特别宽敞,沙发应该尽量靠墙摆放。 扶手沙发与电视机之间应该预留多大的距离?

【3米左右】 这里所指的是在一个29英寸的电视与扶手沙发或和长沙发之间最短的距离,此外,摆放电视机的柜面高度应该在40厘米到120厘米之间,这样才能让看者非常舒适。 与容纳三个人的沙发搭配,多大的茶几合适呢? 【120×70×45厘米或100×100×45厘米】 在沙发的体积很大或是两个长沙发摆在一起的情况下,矮茶几就是很好的选择,茶几的高度最好和沙发坐垫的位置持平。 目前市场上较为流行的是一种低矮的方几,材质多为实木或实木贴皮的,质感较好。 细节补充: 照明灯具距桌面的高度,白炽灯泡60瓦为100厘米,40瓦为65厘米,25瓦为50厘米,15瓦为30厘米;日光灯距桌面高度,40瓦为150厘米,30瓦为140厘米,20瓦为110厘米,8瓦为55厘米。 PART2:【餐 厅】 【面积:10平方米~20平方米】 用餐的地方是一家人团聚最多的地方,通常也是居室中较为拥挤的一个空间,因为有较多的餐椅需要放置,也是家人同时集中的地方,所以它的尺寸就更要精打细算才能使餐厅成为一个温馨的地方。

数学建模a题系泊系统设计

摘要 本题要求观测近海观测网的组成,建立模型对其中系泊系统进行设计,在不同风速和水流的情况下确定锚链,重物球,钢管及浮标等的状态,从而使通讯设备的工作效果最佳。求解的具体流程如下: 针对问题一,分别对系统中的受力物体在水平方向和竖直方向上的力进行分析,找出锚链对锚无拉力时的临界风速,运用力矩平衡求出钢管与钢桶的倾斜角度。对于锚链,将其等效为悬链线模型,根据风速不同判断锚链的状态,从而求出结果。 ?时能够正常工针对问题二,需要调节重物球的质量,使通讯设备在36m m 作。为了确定重物球的质量,首先将实际风速与临界风速进行比较,判断此时系统中各物体的状态,与题目中已知数据进行比较。在钢桶倾斜角度达到临界角度时,计算锚链与海床的夹角并于题中数据进行比较,计算重物球的质量。在浮标完全没入海面时,计算相应条件下重物球的质量,从而确定满足条件的重物球的质量范围。 针对问题三,要求在不同条件下,求出系泊系统中各物体的状态。以型号I 锚链为例,当水流方向与风速方向相同时,系统条件最差,分析在不同水深条件下的系泊系统设计。由题中已知条件确定系统设计的限制条件,对系统各物体进行受力分析,以使整体结果最小,即可得出最优的系泊系统设计。 # 》 关键词:悬链线多目标非线性规划 @

一、问题重述 近浅海观测网的传输节点由浮标系统、系泊系统和水声通讯系统组成(如图1所示)。某型传输节点的浮标系统可简化为底面直径2m、高2m的圆柱体,浮标的质量为1000kg。系泊系统由钢管、钢桶、重物球、电焊锚链和特制的抗拖移锚组成。锚的质量为600kg,锚链选用无档普通链环,近浅海观测网的常用型号及其参数在附表中列出。钢管共4节,每节长度1m,直径为50mm,每节钢管的质量为10kg。要求锚链末端与锚的链接处的切线方向与海床的夹角不超过16度,否则锚会被拖行,致使节点移位丢失。水声通讯系统安装在一个长1m、外径30cm 的密封圆柱形钢桶内,设备和钢桶总质量为100kg。钢桶上接第4节钢管,下接电焊锚链。钢桶竖直时,水声通讯设备的工作效果最佳。若钢桶倾斜,则影响设备的工作效果。钢桶的倾斜角度(钢桶与竖直线的夹角)超过5度时,设备的工作效果较差。为了控制钢桶的倾斜角度,钢桶与电焊锚链链接处可悬挂重物球。 系泊系统的设计问题就是确定锚链的型号、长度和重物球的质量,使得浮标的吃水深度和游动区域及钢桶的倾斜角度尽可能小。 问题1某型传输节点选用II型电焊锚链,选用的重物球的质量为1200kg。现将该型传输节点布放在水深18m、海床平坦、海水密度为×103kg/m3的海域。若海水静止,分别计算海面风速为12m/s和24m/s时钢桶和各节钢管的倾斜角度、锚链形状、浮标的吃水深度和游动区域。 | 问题2在问题1的假设下,计算海面风速为36m/s时钢桶和各节钢管的倾斜角度、锚链形状和浮标的游动区域。请调节重物球的质量,使得钢桶的倾斜角度不超过5度,锚链在锚点与海床的夹角不超过16度。 问题3 由于潮汐等因素的影响,布放海域的实测水深介于16m~20m之间。布放点的海水速度最大可达到s、风速最大可达到36m/s。请给出考虑风力、水流力和水深情况下的系泊系统设计,分析不同情况下钢桶、钢管的倾斜角度、锚链形状、浮标的吃水深度和游动区域。 二、模型假设 1.不考虑流体对锚链的作用,忽略锚链本身的伸长,锚链沿长度均匀分布; 2.假设风是二维的,只存在平行于水平面的风速,不存在垂直方向上的分量;

编写USB驱动程序步骤

编写USB驱动程序步骤: 1所有usb驱动都必须创建主要结构体struct usb_driver struct usb_driver ->struct module *owner (有他可正确对该驱动程序引用计数,应为THIS_MODULE) ->const char *name (驱动名字,运行时可在查看 /sys/bus/usb/drivers/) ->const struct usb_device_id *id_table (包含该驱动可支持的所有不同类型的驱动设备,没添探测回调函数不会被调用) ->int (*probe)(struct usb_interface *intf,const struct usb_device_id *id) (usb驱动探测函数,确认后struct usb_interface 应恰当初始化,然后返0,如果出错则返负值) ->void(*disconnect)(struct usb_interface *intf) (当struct usb_interface 被从系统中移除或驱动正从usb核心中卸载时,usb核心将调用此函数)代码实例: static struct usb_driver skel_driver={ .owner = THIS_MODULE, .name = "skeleton", .id_table = skel_table, .probe = skel_probe, .disconnect = skel_disconnect, }; ↓ 2usb_register()注册将struct usb_driver 注册到usb核心,传统是在usb驱动程序模块初始化代码中完成该工作的

完整家装尺寸大全

家具设计地基本尺寸(单位:) 衣橱:深度:一般;推拉门:,衣橱门宽度: 推拉门:,高度: 矮柜:深度:,柜门宽度: 电视柜:深度:,高度: 单人床:宽度:,,;长度:,,, 双人床:宽度:,,;长度,,, 圆床:直径:,,(常用) 室内门:宽度:,医院;高度:,,,, 厕所、厨房门:宽度:,;高度:,, 窗帘盒:高度:;深度:单层布;双层布(实际尺寸) 沙发:单人式:长度:,深度:;坐垫高:;背高: 双人式:长度:;深度: 三人式:长度:;深度: 四人式:长度:;深度 茶几:小型,长方形:长度,宽度,高度(最佳) 中型,长方形:长度;宽度或者 正方形:长度,高度 大型,长方形:长度,宽度,高度(最佳) 圆形:直径,,,;高度: 方形:宽度,,,,;高度 书桌:固定式:深度(最佳),高度 活动式:深度,高度 书桌下缘离地至少;长度:最少(最佳) 餐桌:高度(一般),西式高度,一般方桌宽度,,;长方桌宽度,,,;长度,,,,圆桌:直径,,,, 书架:深度(每一格),长度:;下大上小型下方深度,高度 活动未及顶高柜:深度,高度 木隔间墙厚:;内角材排距:长度()* 室内常用尺寸 、墙面尺寸 ()踢脚板高;—. ()墙裙高:—. ()挂镜线高:—(画中心距地面高度). .餐厅

() 餐桌高:—. () 餐椅高;—. () 圆桌直径:二人.二人,四人,五人,六人,八人,十人,十二人. () 方餐桌尺寸:二人×(),四人×(),八人×(), () 餐桌转盘直径;—. 餐桌间距:(其中座椅占)应大于. () 主通道宽:—. 内部工作道宽:—. () 酒吧台高:—,宽. () 酒吧凳高;一. 在客厅 .长沙发与摆在它面前地茶几之间地正确距离是多少? 厘米 在一个(**高厘米)地长沙发面前摆放一个(**高厘米)地长方形茶几是非常舒适地.两者之间地理想距离应该是能允许你一个人通过地同时又便于使用,也就是说不用站起来就可以方便地拿到桌上地杯子或者杂志. b5E2R。 .一个能摆放电视机地大型组合柜地最小尺寸应该是多少? **高厘米 这种类型地家具一般都是由大小不同地方格组成,高处部分比较适合用来摆放书籍,柜体厚度至少保持厘米;而低处用于摆放电视地柜体厚度至少保持厘米.同时组合柜整体地高度和横宽还要考虑与墙壁地面积相协调..如果摆放可容纳三、四个人地沙发,那么应该选择多大地茶几来搭配呢? **高厘米 在沙发地体积很大或是两个长沙发摆在一起地情况下,矮茶几就是很好地选择,高度最好和沙发坐垫地位置持平. .在扶手沙发和电视机之间应该预留多大地距离? 米 这里所指地是在一个英寸地电视与扶手沙发或长沙发之间最短地距离.此外,摆放电视机地柜面高度应该在厘米到厘米之间,这样才能使观众保持正确地坐姿. .摆在沙发边上茶几地理想尺寸是多少? 方形:**高厘米. 椭圆形:*高厘米. 放在沙发边上地咖啡桌应该有一个不是特别大地桌面,但要选那种较高地类型,这样即使坐着地时候也能方便舒适地取到桌上地东西. p1Ean。 .两个面对面放着地沙发和摆放在中间地茶几一共需要占据多大地空间? 两个双人沙发(规格 **高厘米)和茶几(规格**高厘米)之间应相距厘米. .长沙发或是扶手沙发地地靠背应该有多高?

数学建模A题系泊系统设计完整版

数学建模A题系泊系统 设计 HEN system office room 【HEN16H-HENS2AHENS8Q8-HENH1688】

系泊系统的设计 摘要 本题要求观测近海观测网的组成,建立模型对其中系泊系统进行设计,在不同风速和水流的情况下确定锚链,重物球,钢管及浮标等的状态,从而使通讯设备的工作效果最佳。求解的具体流程如下: 针对问题一,分别对系统中的受力物体在水平方向和竖直方向上的力进行分析,找出锚链对锚无拉力时的临界风速,运用力矩平衡求出钢管与钢桶的倾斜角度。对于锚链,将其等效为悬链线模型,根据风速不同判断锚链的状态,从而求出结果。 ?时能够正常工作。为针对问题二,需要调节重物球的质量,使通讯设备在36m m 了确定重物球的质量,首先将实际风速与临界风速进行比较,判断此时系统中各物体的状态,与题目中已知数据进行比较。在钢桶倾斜角度达到临界角度时,计算锚链与海床的夹角并于题中数据进行比较,计算重物球的质量。在浮标完全没入海面时,计算相应条件下重物球的质量,从而确定满足条件的重物球的质量范围。 针对问题三,要求在不同条件下,求出系泊系统中各物体的状态。以型号I锚链为例,当水流方向与风速方向相同时,系统条件最差,分析在不同水深条件下的系泊系统设计。由题中已知条件确定系统设计的限制条件,对系统各物体进行受力分析,以使整体结果最小,即可得出最优的系泊系统设计。 关键词:悬链线多目标非线性规划 一、问题重述 近浅海观测网的传输节点由浮标系统、系泊系统和水声通讯系统组成(如图1所示)。某型传输节点的浮标系统可简化为底面直径2m、高2m的圆柱体,浮标的质量为1000kg。系泊系统由钢管、钢桶、重物球、电焊锚链和特制的抗拖移锚组成。锚的质量为600kg,锚链选用无档普通链环,近浅海观测网的常用型号及其参数在附表中列出。钢管共4节,每节长度1m,直径为50mm,每节钢管的质量为10kg。要求锚链末端与锚的链接处的切线方向与海床的夹角不超过16度,否则锚会被拖行,致使节点移位丢失。水声通讯系统安装在一个长1m、外径30cm的密封圆柱形钢桶内,设备和钢桶总质量为100kg。钢桶上接第4节钢管,下接电焊锚链。钢桶竖直时,水声通讯设备的工作效果最佳。若钢桶倾斜,则影响设备的工作效果。钢桶的倾斜角度(钢桶与竖直线的夹角)超过5度时,设备的工作效果较差。为了控制钢桶的倾斜角度,钢桶与电焊锚链链接处可悬挂重物球。 系泊系统的设计问题就是确定锚链的型号、长度和重物球的质量,使得浮标的吃水深度和游动区域及钢桶的倾斜角度尽可能小。

相关文档