Professional Documents
Culture Documents
Presentation 1
Definition : Small embedded device
deployed on large scale network
with capability to sense, compute,
and communicate [1]
[1] Krishnamachari Bhaskar. Mathematical Modeling and Algorithm for Wireless Sensor Network. Autonomous
Network Research Group Department of Electrical Engineering-Systems USC Viterbi School of
Engineering.
Challenges in Wireless Sensor Area [1] and [2]:
Large scale network : monitoring scope is very wide, the number of sensor
nodes is very large, unattended ad-hoc deployment
Scarce energy, low bandwidth
Processing, communication and storage ability is limitted
High Noise and fault rate
Dynamic / uncertain environtment : dynamic topology, self-organization
network, multi-hop routing
Data Centric : High variation Application in application-spesific
requirements
[1] Krishnamachari Bhaskar. Mathematical Modeling and Algorithm for Wireless Sensor Network.
Autonomous Network Research Group Department of Electrical Engineering-Systems USC Viterbi
School of Engineering.
[2] Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-
layer MAC Protocol for Wireless Sensor Networks . The IEEE Fifth International Conference on Genetic
and Evolutionary Computing, 2011, IEEE.
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
A large number of sensor nodes are randomly deployed in the
target monitoring area, or manually deployed in a fixed position
of the monitoring area, constituting a self-organize sensor
network.
After sensing data, the sensor nodes firstly fuse the monitoring
data, then send data to the sink node in the form of single-hop, or
in the form of multi-hop through neighbor nodes, the data can be
processed by many sensor nodes during transmission.
lastly the monitoring data is sent to the management node
through internet or the satellite. The user configures and manages
the wireless sensor network, releases monitoring task, and collect
monitoring data through the management node
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
Solutions developed
in research
community or by
groups of
enthusiasts.
Commercial
solutions from
particular
producers
Modules assembled
by companies trying
to sell software
solutions
System VM
virtualize hardware resources and can run directly on hardware.
In embedded systems they implement functions of the OS and completely replace it
Squawk, .NET Micro
Application (process) VM
typically run on top of an OS as an application and support a single process.
Mate, Darjeeling, VM*, SwissQM, CVM, DVM
Advantage
Reduce the distribution energy costs for software updates
VM code smaller than native machine code
Simpler reprogramming process
Disadvantage
Additional overhead
Increased time and memory requirements for execution
Increased energy spent in interpreting the code
has strong capability in the procession power, storage capacity
and communication;
connects the sensor network and the Internet and other external
networks;
achieves conversion of communication protocol between two
stacks, then releases the monitoring task of management node
and transmits the collected data to the external network;
can be an enhancement of sensor nodes, with sufficient energy
supply and more memory, computing resource, also can be
gateway devices that have the wireless communication interfaces,
without monitoring function.
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
can be called the user node.
is used to configure and manage the wireless sensor
network, and release monitoring task and collect
monitoring data.
during data transmission, sensor nodes not only can act as
sensing nodes, but also can act as a router to forward
data.
in recent years, the software and hardware technology of
sensor node is the major issue in the research of wireless
sensor networks.
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
Chapter 2
Holger Karl, Andreas Willig. “Protocols And Architectures For Wireless Sensor
Networks” . John Wiley & Sons Ltd. 2005
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
The sensor : monitoring the target area and data conversion.
The processor : controlling operation of sensor node, storage and
procession of the data that is collected itself and from other nodes.
The wireless communication : wireless communication with other
sensor nodes, exchanging control messages, sending and receiving
the monitoring data. Wireless Sensor Networks typically use
communication frequencies between about 433 MHz and 2.4 GHz.
The Power Unit : supplies energy for operation of sensor nodes,
generally it adopts micro-batteries.
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
Passive, omnidirectional sensors.
These sensors can measure a physical quantity at the point of the sensor node
without actually manipulating the environment by active probing – in this sense, they
are passive. Moreover, some of these sensors actually are self-powered in the sense
that they obtain the energy they need from the environment – energy is only needed to
amplify their analog signal. There is no notion of “direction” involved in these
measurements
Typical examples for such sensors include thermometer, light sensors, vibration,
microphones, humidity, mechanical stress or tension in materials, chemical sensors
sensitive for given substances, smoke detectors, air pressure, and so on.
Active sensors
This last group of sensors actively probes the environment, for example, a sonar or
radar sensor or some types of seismic sensors, which generate shock waves by small
Sumber : Holger Karl, Andreas Willig. “Protocols And Architectures For Wireless Sensor Networks” . John Wiley & Sons Ltd. 2005
The Processor is the core of a wireless sensor node. It collects
data from the sensors, processes this data, decides when and
where to send it, receives data from other sensor nodes, and
decides on the actuator’s behavior.
Sumber : Holger Karl, Andreas Willig. “Protocols And Architectures For Wireless Sensor Networks” . John Wiley & Sons Ltd. 2005
The memory component is fairly straightforward. Evidently, there is a need for
Random Access Memory (RAM) to store intermediate sensor readings, packets
from other nodes, and so on. While RAM is fast, its main disadvantage is that it
loses its content if power supply is interrupted.
Program code can be stored in Read-Only Memory (ROM) or, more typically, in
Electrically Erasable Programmable Read-Only Memory (EEPROM) or flash
memory (the later being similar to EEPROM but allowing data to be erased or
written in blocks instead of only a byte at a time).
Flash memory can also serve as intermediate storage of data in case RAM is
insufficient or when the power supply of RAM should be shut down for some
time. The long read and write access delays of flash
Sumber : Holger Karl, Andreas Willig. “Protocols And Architectures For Wireless Sensor Networks” . John Wiley & Sons Ltd. 2005
Mostly performed in unlicensed bands according to open standards
Standard: IEEE 802.15.4 - Low Rate WPAN
▪ 868/915 MHz bands with transfer rates of 20 and 40 kbit/s, 2450 MHz
band with a rate of 250 kbit/s
▪ Technology: ZigBee, WirelessHART
Standard: ISO/IEC 18000-7 (standard for active RFID)
▪ 433 MHz unlicensed spectrum with transfer rates of 200 kbit/s
▪ Technology: Dash7
Standard: IEEE 802.15.1 – High Rate WPAN
▪ 2.40 GHz bands with transfer rates of 1-24 Mbit/s
▪ Technology: Bluetooth (BT 3.0 Low Energy Mode)
Standard: IEEE 802.11x – WLAN
▪ 2.4, 3.6 and 5 GHz with transfer rates 15-150 Mbit/s
▪ Technology: Wi-Fi
Sometimes in licensed bands
Standard: 3GPP – WMAN, WWAN cellular communication
▪ 950 MHz, 1.8 and 2.1 GHz bands with data rate ranging from 20 Kbit/s to 7.2
Mbit/s, depending on the release
▪ Technology: GPRS, HSPA
For practical purposes, it is usually convenient to use a device that combines these two
tasks in a single entity. Such combined devices are called transceivers.
Transmitter State :
• Transmit : the transmit part of the transceiver is active
and the antenna radiates energy.
Sumber : Holger Karl, Andreas Willig. “Protocols And Architectures For Wireless Sensor Networks” . John Wiley & Sons Ltd. 2005
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
The physical layer provides a interface between data link layer and
physics wireless signal path with radio frequency firmware and hardware.
The physical layer is the bottom layer, charging with the task of directly
action with the outside.
Meanwhile, the physical layer offers physical layer data service and
physical layer management service, also maintains the information base
of physical layer.
The major tasks of the physical layer:
Open and close wireless transceiver;
Energy detection;
Link quality indication;
Clear channel assessment;
Channel selection;
Data transmission and data reception.
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
The MAC layer offers MAC layer data service and MAC layer
management service.
The MAC layer data service guarantees right sending and receiving
data of MAC protocol data unit in physical layer data service.
The MAC layer data service maintains the database that stores the
relevant information of MAC sub layer protocol state.
Sumber : Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. Research on Architecture, Cross-layer MAC Protocol
for Wireless Sensor Networks . 2011 Fifth International Conference on Genetic and Evolutionary Computing. IEEE.
Chapter 1 Application of Industrial Wireless Sensor Networks
Book of Industrial Wireless Sensor Networks Applications, Protocols, and Standards
CRC Press . Edition 2013
Reliability
Provide accurate and real time information regarding monitored
process even in harsh industrial environments under extreme
vibration, noise, humadity, and temperature condition.
System Security
The information gathered during the monitoring process is vital for
proper system operation, given that even the smallest error can
produce fatal consequrnces for both system and product.
Propagation Environment
The designer has to deal with interferrence and the radio environment
produced by production machine. If the sensor is deployed at outdoor, the
radio propagation can be assimilated to a free-range perturbation.
Heterogenity
Heterogenity of data collected : Proper data fusion/aggregation schemes,
Powerful technique of data analysis for the reception side
Heterogenity of objective network : Focus on logistic application where the
IWSN used to monitor the transportation of some good must be able to
integrate with the IWSN deployed both production site and delivery site.
Enviromental Sensing
Problem of air, water, pollution, fire, flood, landside
Condition Monitoring
Health information (building, construction, bridges, supply
route, etc), Machine condition (factory automation),
health care information
Process Automation
Resource of production and service provision including
material, stock, supply chain status. The most important
issue from human perpective is the production
performance monitoring, evaluation, and improvement
General objective in the environmental monitoring is an efficient
information gathering, used both for prevention (real-time or
postponed) and analysis.
The importance of the pollution detection both in materials
for production as well as in the production ambients make
the pollution monitoring one of the most widely spread field
of application in enviromental sensing.
Some related research :
A Low cost, Fully automated, end-to-end in sewer gas monitoring
system based on floatting-drifting embedded sensor platform
Some technique to allow web users to access high-resolution
polution data gathered from large number of vehicle-mounted
mobile sensing devices coupled with highly-accurate static sensor
data in an easy-to-use, intuitive interface.
Prototype of a platform for collection and logging of the outdoor
noise pollution measurements. These measurements can be used
for analysis of pollution effect on manpower productivity and social
behaviour.
Industrial facilities are often localized in
environments taht are riskier than residentalo
areas, especially in the case of oil, gas, coal mining
industries, or agricultural companies. Therefore,
proper early warnings or predictive disaster
detection might be a valuable asset, resource, and
life saver.
Some related research :
River Flood detection. A sensor network is used for
flood prediction based on the previous
measurements. By Using a small number of sensor
nodes with self-monitoring for failure capabilities,
they cover and secure large geographical area under
the threat of disaster
the debris flow monitoring system that allows in-situ
real-time debris flow tracking. A number of robust
sensors with self-localization capabilities are thrown
into the flow, thus providing the real time flow
direction and volume information used for early
warning issuing.
The security refers to the security of the
information and the security of the people,
products and equipment
Related Research :
Developing the wireless network system for a team of
underwater collaborative autonomous agents that are
capable of locating and repairing scale formations in
tanks and pipes within inaccessible environments
WSN whose aim is to detect, localize and quantify
bursts, leaks and other anomalies (blockages or
malfunctioning control valves) in water transmission
pipelines.
Process monitoring focuses on tracking the quality of the entire
life of a product, step by step from the materials provision used for
its production till its disposal.
The role of IWSNs in these applications is driven by the need for
evaluating and improving each and every step of goods production-
distribution-consumption process as well as the cycle as a whole.
NETWORK ARCHITECTURE
Sink mobility.
While this can be a special case of node mobility, the important aspect is the mobility of
an information sink that is not part of the sensor network, for example, a human user
requested information via a PDA while walking in an intelligent building.
Event mobility
In applications like event detection and in particular in tracking applications, the cause
of the events or the objects to be tracked can be mobile.
In such scenarios, it is (usually) important that the observed event is covered by a
sufficient number of sensors at all time. Hence, sensors will wake up around the object,
engaged in higher activity to observe the present object, and then go back to sleep.
Quality of Service
Energy Efficiency
Scalability
Robustness
Event detection/reporting probability.
probabilitas di mana event yang muncul tidak terdeteksi atau tidak dilaporkan ke sink ?
Missing Report
Aplikas yang membutuhkan laporan secara periodik, probabilitas laporan yang tidak
terkirim harus kecil
Approximation Accuracy
Untuk fungsi aplikasi aproksimasi, berapa rata-rata/nilai error maksimum absolut atau
relatif terhadap nilai aktual
Tracking accuracy
Aplikasi tracking tidak boleh kehilangan obyek yang sedang di-track. Posisi yang
dilaporkan harus semirip mungkin dengan posisi real-nya. Hal ini erkait dengan sensitifitas
sensor.
Energy per correctly received bit
Berapa rata-rata energi yang dikonsumsi untuk mengirim satu bit informasi (payload)
dari sumber ke tujuan.
Delay/Energy Trade-Off
Ada beberapa aplikasi yang difungsikan untuk mendeteksi “urgent” events, di mana
dapat dijustifikasi adanya investasi energi yang meningkat untuk melaporkan event
itu secara cepat. Di sini adanya trad-off antara delay dengan overhead energi
Network Lifetime
Time to first node death. Kapan energi node pertama di jaringan kehabisan energi dan
berhenti beroperasi
Network half-life . Kapan 50% dari total node kehabisan energi dan berhenti beroperasi.
Time to partition. Kapan partisi jaringan pertama tidak terhubung.
Time to loss of coverage. Kapan pertama kali area spot tidak dapat lagi di-cover olehsensor
yang terpasang di dalamnya.
Skalabilitas : Kemampuan untuk memelihara
karakteristik-karakteristik kinerja sebuah jaringan
WSN
A service interface would allow to raise the level of abstraction with which an
application can interact with the WSN . Such a service interface can hide considerable
complexity and is actually conceivable as a “middleware” in its own right.
Support for Simple request/response
Support for asynchronous event notification
Addresses should be definable in several way
For both types of interactions, the addressees should be definable in several
ways.
The simplest option is an explicit enumeration of the single or multiple
communication peers to whom a (synchronous or asynchronous) request is made
The need to access location, timing, or network status information (e.g. energy reserves
available in the nodes or the current rate of energy scavenging) via the service interface.
The need for an explicit description of the set of available capabilities of the node/the
network – for example, which physical parameters can be observed or which entities can be
controlled
Security Requirement
While not a direct part of an actual service interface, additional management functionality,
for example, for updating components, can be convenient to be present in the interface as
well
For practical deployment, a sensor network only concerned with itself
is insufficient. The network rather has to be able to interact with other
information devices, for example, a user equipped with a PDA moving
in the coverage area of the network or with a remote user, trying to
interact with the sensor network via the Internet .
For example, a sensor node wants to deliver an alarm message to some Internet host. The first
problem to solve is akin to ad hoc networks, namely, :
how to find the gateway from within the network. ? – Integrating routing and service discovery
If several such gateways are available, how to choose between them? How to handle several gateways, each
capable of IP networking, and the communication among them? - One option is to build an IP overlay network on
top of the sensor
how does a sensor node know to which Internet host to address such a message? Or even worse, how to map a
semantic notion (“Alert Alice”) to a concrete IP address? Even if the sensor node does not need to be able to
process the IP protocol, it has to include sufficient information (IP address and port number, for example) in
its own packets; the gateway then has to extract this information and translate it into IP packets. An ensuing
question is which source address to use here .
The gateway in a sense has to perform tasks similar to that of a Network Address Translation (NAT)
How Internet-based entity trying to access services of a WSN ?
The more general case is, however, a terminal “far away” requesting
the service, not immediately able to communicate with any sensor
node and thus requiring the assistance of a gateway node.
How to find out that there actually is a sensor network in the desired
location ? and
how to find out about the existence of a gateway node?
Once the requesting terminal has obtained this
information, how to access the actual services?
The requesting terminal can instead send a properly formatted request to this gateway,
which acts as an application-level gateway or a proxy for the individual/set of sensor nodes
that can answer this request;
The gateway translates this request into the proper intrasensor network protocol
interactions. This assumes:
that there is an application-level protocol that a remote requester and gateway can use;
that is more suitable for communication over the Internet than the actual sensor network protocols; and
that is more convenient for the remote terminal to use.
The gateway can then mask, for example, a data-centric data exchange within the network
behind an identity-centric exchange used in the Internet.
There are some clear parallels for such an application-level protocol with so-called Web
Service Protocols, which can explicitly describe services and the way they can be accessed.
The Web Service Description Language (WSDL) [166], in particular, can be a promising
starting point for extension with the required attributes for WSN service access – for
example, required accuracy, energy trade-offs, or data-centric service descriptions.
Moreover, the question arises as to :
how to integrate WSN with general middleware architectures [699] or how to make WSN services
accessible
From a standard Web browser (which should be an almost automatic by-product of using WSDL and
related standards in the gateway). However, research here is still in its early infancy [384, 508, 656].
WSDL
The gateways can also act as simple extensions of one
WSN to another WSN. The idea is to build a larger,
“virtual” WSN out of separate parts, transparently
“tunneling” all protocol messages between these two
networks and simply using the Internet as a transport
network.
Seminar Presentation
Agent
otonom : memasukkan notasi otonom yang lebih kuat dari obyek.
Agent memutuskan sendiri apakah perlu atau tidak melakukan
aksi yang diminta agent lainnya
agent harus cerdas : punya kapabilitas fleksibel (reactive- pro
active- social)
agent adalah aktif : bukan provider layanan yang pasif.
entitas yang perilakunya dapat diprediksi dengan mengatributkan
belief, desires, dan kecerdasan rasional
Mobile Agent (MA) adalah entitas piranti
lunak yang me-enkapsulasi perilaku dinamis
dan punya kemampuan untuk bermigrasi dari
satu node komputasi ke node lainnya untuk
menyelesaikan tugas-tugas terdistribusi.
Mobile Agent Naming (MAN) merupakan komponen yang mengelola penamaan agent
berbasis proxy. MAN juga mengelola daftar dinamis dari node sensor tetangganya.
Timer Service (TS) mengelola layanan timer untuk mendukung operasi MA.
Resource Manager (RM) mengatur akses ke sumber daya Sun SPOT node seperti sensor (
accelerometer, temperature, cahaya), switch, battery, led, dan flash memory.
Perilaku dinamis MA dimodelkan dengan multi-plane state machine (MPSM).
Setiap plane dapat merepresentasikan perilaku MA pada peran yang spesifik
sehingga memungkinkan pemrograman berbasis peran (role-based
programming)
Service
RadiogramMTS merepresentasikan layanan transport
untuk transmisi data ke remote node atau base station
Rule.
TerImplication terdiri dari deskripsi Java auto-
generate untuk rule-rule perilaku agent yang
didefinisikan ke dalam script file.
Rule 1
Memungkinkan timer untuk pnerimaan pesan dari
DataViewerAgent dan membuat goFalse belief
message(inform, sender(dataViewer, addresses(“radiogram:’/”
+ DataViewerAgentNodeAddr)), ?content), !goFlase >
par(timerActivationAct, adobBelief(always(goFalse)));
Rule 2
Me-state bahwa jika setelah kadaluarsa timer, operasi
pembacaan sensor diaktifasi dan juga timer di re-aktivasi
Rule 3, 4, 5
Digunakan untuk menyimpan data sensor dan pada saat yang
sama me-disable perseptor pengindraan.
3. temperatur(?value) > par(deactTempSensorAct,
registerTempValueAct(?value));
Rule 7
Memverifikasi bahwa fitur telah dikomputasi dengan benar.
Jika hal ini terjadi, DataMessengerAgent dinotifikasi
dengan sebuah pesan.
featuresComputed(?computedFeatures) > par(resetValuesAct,
inform(agentID(messenger, addresses(“radiogram://” +
DataMessengerAgentNodeAddr)), value(?computedFeature)));
Rule 8
Me-state bahwa jika user menekan switch, pesan dengan fitur
yang terkomputasi terakhir yang akan dikirim ke
DataViewerAgent.
Rule 9
Cek penerimaan pesan dari DataViewerAgent dan karena
goFalse, maka operasi penginderaan dihentikan. (timer di
reset dan pembacaan sensor disable)
Message(inform, sender(dataViewer, addresses(“radiogram://” +
DataViewerAgentNodeAddr)), ?content), goFalse > resetTimerAct,
deactAccSensorAct, deactLightSensorAct, deactTempSensorAct
A special case asigning task utilities to
histories is to assign 0 (false) or 1 (true) to a
run
ψ: R {0,1}
Anachievement task is spesified by set G of
“Good” or “Goal” states : G С E
The agent succeed if it is guaranteed to bring about at
least one of these state (we don’t care which one – they
are considered equally good)
Sumber : Multiple mobile agents’ itinerary planning in wireless sensor networks: survey and evaluation
X. Wang, M. Chen, T. Kwon,H.C. Chao
Published in IET Communications Received on 14th July 2010 doi: 10.1049/iet-com.2010.0638
In Special Issue on Distributed Intelligence and Data Fusion for Sensor Systems
Sink mengirimkan satu MA
untuk berkeliling ke semua
sensor secara berurutan
untuk mengumpulkan
informasi yang di-sense oleh
sensor.
Isu-isu terkait dengan Single
MA :
Delay scalability.
Potential Route inefficiency
Trafik Load Balancing
Sumber : Multiple mobile agents’ itinerary planning in wireless sensor networks: survey and evaluation
X. Wang, M. Chen, T. Kwon,H.C. Chao
Published in IET Communications Received on 14th July 2010 doi: 10.1049/iet-com.2010.0638
In Special Issue on Distributed Intelligence and Data Fusion for Sensor Systems
Untuk mendisain WSN berbasis MA dengan
efisiensi tinggi, terdapat 4 katageori isu :
Arsitektur.
Itinerary Planning.
Middleware Design
Hardware Design
Tujuan sistem MA multiple adalah
membagi beban data fusion task ke
beberapa MA.
Kinerja pendekatan ini lebih baik
daripada Sistem MA tunggal jika
node-node dikelompokkan dengan
baik dan rute MA didisain dengan
baik
Namun, Sistem MA multiple
menghasilkan lebih banyak trafik
daripada Sistem MA single.
Ada trade-aff antarta performance
dengan efisiensi
Sumber : Multiple mobile agents’ itinerary planning in wireless sensor networks: survey and evaluation
X. Wang, M. Chen, T. Kwon,H.C. Chao
Published in IET Communications Received on 14th July 2010 doi: 10.1049/iet-com.2010.0638
In Special Issue on Distributed Intelligence and Data Fusion for Sensor Systems
Itinerari adalah rute yang dilalui selama migrasi mobile
agent.
Itinerari planning mencakup dua isu yang harus
diselesaikan oleh sink dan mobil agent secara otonom
Pemilihan set node-node sumber yang akan dikunjungi oleh
mobile agent.
Penentuan urutan kunjungan ke sumber-sumber dengan
mempertimbangkan efisiensi energi
Asumsikan bahwa LCF dan GCF berjalan pada sensor node yang sama yang
dekat denan dispatcher. LCF mencari node berikutnya dengan jarak
terpendek dengan node yang saat ini berjalan, sedangkan GCF mencari
nnode berikutnya yang dekat dengan dispatcher.
Algoritma genetik dapat digunakan untuk mobile agent itinerary planning
dimana setiap node tidak dikunjungi berulang-ulang dalam satu putaran.
Meskipun optimasi global akan diperoleh, namun penggunaan algoritma ini
bukan solusi yang ringan untuk sensor node yang memiliki energi terbatas.
Dynamic planning memungkinkan mobile agent untuk
menentukan node berikutnya untuk dikunjungi pada setiap titik
pemberhentian di jalur migrasinya.
Rute agent dinamis harus memperhatikan trade-off antara cost
migrasi dan keakuratan migrasi.
Pendekatan Dynamic planning mencari sensor node yang :
Memiliki sisa energi yang terbesar
Memerlukan konsumsi energi untuk migrasi agent
Menyediakan informasi yang lengkap
Michael Wooldridge
Hal utama yang dimiliki oleh Agent adalah OTONOM :
kapabilitas melakukan aksi yang independent.
sense–decide–act–sense–decide
Thermostat
Tujuan yang didelegasikan kepadanya adalah menjaga
kestabilan suhu di ruangan.
Aksinya-aksinya adalah HEAT on/off
U N I X biff program
Tujuan yang didelegasikan kepadanya adalah memonitor
email yang masuk dan menandainya dengan sutau flag.
Aksinya-aksinya adalah GUI action .
Agent
otonom : memasukkan notasi otonom yang lebih kuat dari obyek. Agent
memutuskan sendiri apakah perlu atau tidak melakukan aksi yang diminta agent
lainnya
agent harus cerdas : punya kapabilitas fleksibel (reactive- pro active- social)
agent adalah aktif : bukan provider layanan yang pasif.
entitas yang perilakunya dapat diprediksi dengan mengatributkan belief, desires,
dan kecerdasan rasional
AI ditujukan untuk membangun sistem yang dapat memahami bahasa natural, mengenali,
dan memahami suasana, menggunakan pengindraan umum, berfikir kreatif, dsb.
Jadi, tidakkah kita perlu menyelesaikan masalah AI untuk membangun sebuah Agent ?
Ketika membangun sebuah agent, secara sederhananya kita menginginkan sebuah sistem
yang dapat memilih aksi yang tepat untuk dilakukannya, biasanya dalam domain terbatas.
Kita tidak perlu menyelesaikan semua permasalahan AI untuk membangun sebuah agent
yang bermanfaat
a little intelligence goes along way!
W e made our agents dumber and dumber and dumber...until finally they made money .
Accessible dan inaccesible
Lingkungan yang accessible adalah lingkungan di mana
di dalamnya sebuah agent dapat memperoleh
informasi tentang state lingkungan secara lengkap,
akurat, dan up-to-date,
Environment :
Fungsi transformer state merepresentasikan perilaku lingkungan :
Jika , maka tidak ada state successor untuk r sehingga dikatakan bahwa run telah berakhir
(Game over)
Kemungkinan yang lain : menempatkan sebuah utilitas bukan ke setiap individu state,
melainkan ke run itu sendiri.
Dari mana asalnya bilangan real tersebut ?
Orang-orang tidak memahami istilah utilitas – Sulit
bagi orang untuk menggunakan istilah ini. Namun
demikian istilah ini bekerja baik di skenario lain
sebagai contoh TileWorld :
Disimulasikan lingkungan grid dua dimensi di mana
terdapat agent, tile, obstacle, dan lubang.
Agent dapat bergerak dalam 4 arah, ke atas, ke bawah, ke
kiri, dan ke kanan. Jika agen diletakkan ke sebuah tile,
maka agent dapat menekan tile
Lubang harus diisi tile oleh agent dimana agent bertugas
untuk mengisi sebanyak mungkin lubang yang ia mampu.
Fungsi Utilitas didefinisikan sebagai berikut :
Jadi :
Jika agent mengisi semua lubang, utility = 1
Jika agent tidak mengisi satu pun lubang, utility = 0
Representation/reasoning problem
Bagaimana secara simbolik merepresentasikan informasi
tentang entitas-entitas dan proses-proses dunia nyata yang
komplek, dan bagaimana membuat agent untuk menalar
(reason) dengan informasi ini dalam menentukan
keputusannya.
.... Knowledge representation, automated reasoning, automatic planning
Sebagian besar peneliti menganggap bahwa
tidak ada masalah di semua area yang
diselesaikan secara sempurna.
Masalah kompleksitas algoritma manipulasi
simbol :
Beberapa atau bahkan hampir semua algoritma
manipulasi simbol tidak menyelesaikan masalah
Diberikan :
ρ adalah teori tersebut (biasanya set aturan)
Δ adalah database logik yang mendeskripsikan state saat ini
dari lingkungan
Ac adalah aksi-aksi yang dapat dilakukan agent
Δ Φ berarti bahwa Ф dibuktikan dari Δ menggunakan ρ
Goal adalah Robot membersihkan semua kotoran
Gunakan 3 predikat domain berikut :
In(x,y) berarti agent berada pada (x,y)
Dirt(x,y) berarti ada kotoran pada (x,y)
Facing(d) berarti agent sedang menghadap ke arah d
Problem :
Bagaimana mengkonversi input kamera ke Dirt(0,1) ?
Pengambilan keputusan mengasumsikan lingkungan statik : rasionalitas kalkulatif
Pengambilan keputusan melalui Theorem proving adalah komplek (mungkin bisa tdak
berkeputusan/undecidable)
Ide kunci :
Memprogram agent dalam istilah intentional
notion seperti belief, commitment , dan intention
Setiap agent pada AGENT0 memiliki 4 komponen :
Set capability (Hal yang bisa dilakukan agent)
Set belief awal
Set commitment awal (hal yang akan agent lakukan)
Set commitment rule
Commitment Rule
Komponen kunci yang menentukan bagaimana agent
beraksi
Commitment rule terdiri dari :
▪ message condition
▪ mental condition
▪ Sebuah aksi
Setiap siklus keputusan........
Kondisi message dicocokkan dengan message yangtelah diterima agent;
Kondisi mental dicocokkan dengan belief-nya agent
Jika aturan dieksekusi, agent menjadi commit pada action (action
ditambahkan kepada set komitmen agent)
Aturan pertama memastikan bahwa sebuah ‘ask’ pada akhirnya diikuti dengan ‘give’
Aturan kedua memastikan bahwa hanya saty ‘give’ yang dilakukan pada satu waktu
Sistem Concurrent Metatem terdiri dari sejumlah agent (obyek), setiap obyek memiliki 3 atribut :
Nama
Interface
Program Metatem
Analoginya :
Jika A memiliki $500 juta
Jika B memiliki $0
Jika C memiliki $1 juta untuk didonasikan
Apa yanbg terjadi pada utilitas B, jika B diberi uang oleh C $1 juta. Maka penambahan
utilitas B akan signifikan . B akan berubah dari tidak memiliki uang sama sekali menjadi
milionair.
Presentasi ke-6
Chapter 8 – 9
An Introduction to MultiAgent Systems
Michael Wooldridge
We now consider agent communication languages (ACLs) — standard
formats for the exchange of messages .
The best known ACL is KQML, developed by the ARPA knowledge
sharing initiative. KQML is comprised of two parts:
The knowledge query and manipulation language (KQML); and
The knowledge interchange format(KIF).
Coordination
The degree to which [the agents] can avoid “extraneous”
activity [such as] synchronizing and aligning their activities
(Bond and Gasser).
If the system is perfectly coordinated, agents will not get in
each others ’ way, in a physical or a metaphorical sense .
How does a group of agents work together to
solve problems?
Solution Synthesis
In this stage solutions to sub-
problems are integrated
again this may be
hierarchical
▪ Different solutions at different
levels of abstraction.
Given this model of
cooperative problem
solving, we have two
activities that are likely to
be present:
Task sharing :
▪ Components of a task are
distributed to component
agents;
▪ How do we decide how to
allocate tasks to agents ?
Result sharing :
▪ Information (partial results,
etc) is distributed.
▪ How do we assemble a
complete solution from the
parts ?
Well known task-sharing protocol for task
allocation is the contract net .
Factors:
agent must decide whether it is capable of expediting
task;
agent must determine quality constraints & price
information (if relevant).
Inconsistent beliefs arise because agents have different views of the world.
May be due to sensor faults or noise or just because they can’t see everything.
Inconsistent goals may arise because agents are built by different people with different
objectives.
Different agents plan to achieve their goals using these operators and then do:
Interaction analysis :do different plans affect one another?
Saf ety analysis : which interactions are problematic?
Interaction resolution : treat the problematic interactions as critcal sections and enforce
mutual e xclusion.