Medium Access Layer Performance Issues in Wireless Sensor Networks

Size: px
Start display at page:

Download "Medium Access Layer Performance Issues in Wireless Sensor Networks"

Transcription

1 Medium Access Layer Performance Issues in Wireless Sensor Networks Ilker S. Demirkol 13-June-08 CMPE, Boğaziçi University

2 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 2 / 66

3 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 3 / 66

4 WSN: Network of sensor nodes 1. Sense the environment 2. Process the sensed data 3. Communicate the processed data towards sink G. Boone, Sensors Magazine, 2004: Internet To browse stored information WSN To browse the reality 4 / 66

5 WSN: Many Application Areas Environmental applications e.g., habitat monitoring Health applications e.g., telemonitoring of human physiological data Military applications e.g., battlefield surveillance Home applications e.g., home automation... 5 / 66

6 WSN publications in SCI-E (per year) / 66

7 WSN Research No standardization in communication protocols. A challenging subject, since the sensor nodes are limited in: computational capacity: 4 Mhz CPU memory: 60 KB RAM communication bit rate: Kbps power: battery generally infeasible to replace Primary objective is to achieve highest energy efficiency at each operation. 7 / 66

8 Energy Consumption Components Three energy consuming operations: Communication Sensing Computation To conserve energy: Shutdown the sensor (sleep mode) Duty cycle: Sleep-listen schedules e.g., duty cycle of 5 %: Work 5 unit time and sleep 95 unit time Energy Consumption (mj) mj 8 / 66

9 Two Important MAC Layer Energy Wastes Idle listening Collision C XB A A good MAC protocol should reduce both types of energy wastes. The energy consumed per bit/packet is a crucial performance criterion. 9 / 66

10 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization 10 / 66

11 Surveillance Wireless Sensor Networks (SWSN) SAFE Sink node UNSAFE 11 / 66

12 Packet Traffic Models for WSN Poisson, Periodic,... SPTM (SWSN Packet Traffic Model) Intrusion-initiated Bursty traffic Depends on: Sensing interval Intrusion detection model Sensor1 Sensor2 MAC Sensor3 12 / 66

13 Detection Models Binary Detection Model Probability of detection: 1 Elfes Detection Model Probability of detection: 1 0 d c Certain detection range sensor-target distance 0 d c d u sensor-target distance Certain detection range Uncertain detection range/sensing range Probabilistic d c d u d c detection degree = # of detecting sensors = 5 # of detecting sensors = detection degree = 3 13 / 66 # of sensors w detection prob.= coverage degree = 5

14 Consecutive Coverage Degrees Consecutive coverage degrees are not independent, i.e., can be repsented by: Markov process of order n = 2d v t T u s target speed sampling interval 14 / 66

15 SPTM Framework We provided complete analytical model for: generation of first coverage degree relations of consecutive coverage degrees detection degree for a given coverage degree 15 / 66

16 SPTM Framework 16 / 66

17 SPTM Framework 17 / 66

18 Validation of SPTM Simulation parameters: p distance Validation of coverage degree dependency: 18 / 66

19 Validation of SPTM Coverage degree distribution for all points: Coverage degree dependency example: Subsequent detection points of coverage degree 2: Different distributions! Simulations validates the analysis presented 19 / 66

20 Validation of SPTM Detection degree PMF for a given coverage degree. Correct PMF can be derived with analysis. 20 / 66

21 SPTM An application specific packet traffic model is derived by first defining a framework. The components of the framework is formulated analytically which are verified by simulations. The proposed PTM is adaptive: The detection parameter settings can be set according to the sensor type deployed The specifications of the SWSN application implemented can be incorporated such as the target area and density. 21 / 66

22 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 22 / 66

23 Packet Traffic Models for WSN Poisson, Periodic,... SPTM,... What is the importance of a realistic PTM? 23 / 66

24 Impact of Realistic PTM Performance of S-MAC is evaluated for three different PTMs: Periodic Binomial SPTM Simulation Parameters: 24 / 66

25 Load vs. Delay Similar average load results in very different average delays! 25 / 66

26 Effect of Scenario Parameters Investigated parameter: Target speed To use correct system parameters is also very crucial. 26 / 66

27 Limited Buffer Case Buffer size: 10 packets Packet drops start at lower loads with SPTM. 27 / 66

28 Impact of Using a Realistic Packet Traffic Model It is shown that, for surveillance applications, evaluating a MAC protocol with a packet traffic model other than SPTM may give misleading performance results. The results presented belong to performance evaluation for one-hop communication which will be accumulated in evaluations of the end-to-end performances. In fact, that will lead to higher divergence from the realistic results. 28 / 66

29 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 29 / 66

30 Energy and Delay Optimized Contention for Wireless Sensor Networks Contention-based MAC protocols Majority of the WSN MAC protocols are contention-based Optimize the energy consumed the delay incurred by the contentions of the nodes 30 / 66

31 Contention-based MAC protocols Medium access with contention slots: IEEE , IEEE S-MAC, B-MAC, SCP-MAC, Z-MAC Packet tx time Procedure: Randomly select a slot Carrier sense till the slot you select If no tx before your slot, start tx. Contention Window (CW) What to do, in case of collisions? 31 / 66

32 Collisions ****Collision*** Succ. packet tx Backoff: collision timeout Binary Exponential Backoff (BEB) IEEE , IEEE Uniform Backoff (UB) S-MAC, Z-MAC, Sift, SCP-MAC, B-MAC time 32 / 66

33 The Significance of the Contention Window Size S-MAC defines the following settings: 63 contention slots Slot time: 20 bit tx. If only one node is contending : Expected contention delay (carrier sense duration): 600 bits tx The packet to be sent is 400 bits (S-MAC default)! 33 / 66

34 Trade-off Lower CW size: Mean carrier sense duration Probability of collision Higher CW size: Mean carrier sense duration Probability of collision 34 / 66

35 Impact of CW size on WSN performance We formulate the two crucial WSN objectives analytically: Overall energy consumed for contentions Delay incurred by contentions Parameters of the derived analytical formulas: Contention window size Number of contending nodes Collision timeout duration, communication speed, energy consumption values 35 / 66

36 Analysis vs Simulation Simulation results are average of 1000 runs. Parameters: Bandwidth: 20 Kbps Slot time: 1 ms The collision timeout: ms (RTS+CTS+SIFS) 36 / 66

37 Contention Delay # of contending nodes = 5 : collision duration : carrier sense duration : contention delay 37 / 66

38 Contention Delay for Different Number of Contending Nodes The optimum CW size changes with the number of contending nodes. 38 / 66

39 Performance Comparison for Contention Delay SSCW propose an approximation for optimum Setting CW CW size. size to W* t reveals lower delays compared to other alternatives. SMAC defines fixed 63 slots. W t *: Delay optimizing CW size SSCW: IEEE Tran. on Wireless Comm., Nov 06, by Tian et al. 39 / 66

40 Energy Consumption Results # of contending nodes = 5 40 / 66

41 Performance Comparison for Energy Consumed W E *: Energy optimizing CW size 41 / 66

42 Energy-Delay Trade-off W E * vs. W t * Minimization of one metric can increase the value of the other 7.5% higher delay 8% higher energy 42 / 66

43 Optimized CW Size Conclusions Contention delay Derived analytically Delay optimizing CW size (W t *) Energy consumed for contention resolution Derived analytically Energy optimizing CW size (W E *) First work to present the optimization of CW size in WSN. The analytical work presented can be applied to all networks that defines uniform backoff. 43 / 66

44 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 44 / 66

45 ENCO: A Heuristic for CW Size Setting We need a method for incorporating CW size optimizations into a distributed implementation. Estimated Number of Contenders (ENCO) method for event-based applications average coverage degree ~ average of the number of contending nodes use optimized CW for average coverage degree throughout the network. 45 / 66

46 Estimated Number of Contenders (ENCO) Method Two types of event-driven applications: Random Event Locations (REL) application Correlated Event Locations (CEL) application SPTM is used for traffic generation of CEL application. 46 / 66

47 Simulation Parameters for Evaluation of the ENCO Method Parameter Value Range Number of nodes Area 300 x 300 m 2 Sensing Range Target speed Sampling interval 50 m 10 m/s 1 second 1000 simulation runs with new deployments. At each run, 10 event points are logged. for CEL: 10 consecutive target detection points. 47 / 66

48 Simulation Results of the ENCO Method Sample REL Application: Sample CEL Application: W* ENCO W* E 48 / 66

49 ENCO A heuristic that utilize the contention optimization work is presented. It is defined for event-driven applications where the ENCO method is shown to successfully approximate the performance of the optimum contention window size. 49 / 66

50 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 50 / 66

51 Effect of CW Optimization on Video Sensor Networks Sensor nodes are equipped with video cameras: Controllable video frame rate Limited buffers (Motes: 60 KB RAM) Limited communication rate Mica2: 20 Kbps, MicaZ: 250 Kbps Low computational capacity Limited encoding alternatives 51 / 66

52 Simulation Parameters for VSN Performance Evaluation Network stack: S-MAC + GPSR Comm. range: 80 m 52 / 66

53 Simulation Results for ENCO in VSN Throughput: Latency: Increases throughput for all DC values Decreases latency 53 / 66

54 VSN Performance Improvement with ENCO In this work, we investigated a promising and challenging type of WSN, namely VSN. We show that with current hardware capabilities of the sensor nodes, VSNs can easily saturate even for low video rates. However, the ENCO method is shown to improve the VSN performance for both throughput and latency values which are important criteria for time-critical VSN applications such as border surveillance. 54 / 66

55 Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 55 / 66

56 A Better Slot Selection Method? Mostly used slot selection: uniformly random IEEE , S-MAC, Z-MAC,... p* slot selection method is proposed to minimize the collision probability: (IEEE JSAC, 04) 56 / 66

57 Is It Really Better? Collision Probabilities (N=5): Average Contention Delays (N=5): 57 / 66

58 Which CW Size to Compare? For W* t : For individual W* s: Uniformly random slot selection results in better performance with W* t! 58 / 66

59 Choice of Slot Selection Method We showed that although p* results in fewer collisions, its producing a better overall performance depends on the contention window size used. The uniformly random slot selection performance is shown to be better than the p* method if it is used with the CW size of W* t that is derived analytically in this thesis. 59 / 66

60 Conclusions (1) The performance studies of MAC protocols are generally performed with either periodic or Poisson data traffic. However, in reality, the data traffic generated in WSNs depends on the application. We developed an analytical packet traffic model for surveillance wireless sensor networks which utilize a parametric and probabilistic sensor detection model. This model can be used to generate the time-based packet traffic load generated by an intrusion to a target area. Moreover, the analytical model derived can be used for performance evaluations of MAC protocols for SWSNs. By doing detailed simulations, we showed that the performance results of a communication protocol depend on the packet traffic model employed. Using a different model than SPTM can overestimate the performance of a MAC protocol. 60 / 66

61 Conclusions (2) Another work presented in this thesis is the energy and delay optimization of contentions for contention-window based MAC protocols. The importance of the contention window size setting on the energy consumption and the delay incurred is depicted both analytically and by simulations. Separate optimum contention window size setting methods are presented for the energy consumption and the incurred contention delay. It is shown that the performance of contention-based MAC protocols can be significantly improved using the optimum contention window sizes. The presented analysis and optimizations are also applicable to other wireless networks that define a fixed contention window size and uniformly random contention. 61 / 66

62 Conclusions (3) For practical implementation of the CW size optimization in event-triggered WSN, a heuristic namely, the ENCO method, is proposed. The simulations on two different type of event-triggered WSN applications show that the ENCO method achieves close performance results to the optimum contention window size results. In the simulations of ENCO for correlated event location scenario, the information of the number of nodes detecting the events is generated with the proposed SWSN packet traffic model. As a future work, the performance of the ENCO method can be increased with spatio-temporal information such as the history of number of contending nodes. 62 / 66

63 Conclusions (4) We also investigated the improvements in the capabilities of VSNs by using the contention optimization methods and the ENCO heuristic proposed. It is shown that increasing the quality of video capture frame rates results in a drop in the video quality received at the sink even for low rates with currently available hardware and encoding technology. The network performance results of VSN with the ENCO method show that this method can extend the capabilities of VSN by both decreasing the end-to-end delay and increasing the average number of frames received at the sink, i.e., the system throughput at the same time. As a future work, the ENCO method can be improved for QoS-aware WSN where different priority classes can use different CW sizes. 63 / 66

64 Conclusions (5) The CW size studies presented in this thesis base on the uniformly random slot selection method which is the most widely used slot selection method. However, an alternative method was proposed which minimizes the collision probability. This method is compared to the uniformly random method for the contention delay metric. It is found that depending on the CW size used, the slot selection method that resuls in better performance values changes. However, it is shown that the uniformly random slot assignment performs better when used with the optimized CW size. We state that the best slot seletion method investigation should be done in cooperation with the optimum contention window size for the method. As a future work, this joint optimization problem can be investigated. 64 / 66

65 Publications Journal Papers: I. Demirkol, F. Alagöz, H. Deliç and C. Ersoy, Wireless sensor networks for intrusion detection: packet traffic modeling, IEEE Communications Letters, vol. 10, no.1, pp , January I. Demirkol, C. Ersoy and F. Alagöz, MAC protocols for wireless sensor networks: a survey, IEEE Communications Magazine, vol. 44, no. 4, pp , April I. Demirkol, F. Alagöz, H. Deliç and C. Ersoy, The impact of a realistic packet traffic model on the performance of surveillance wireless sensor networks, Accepted to Elsevier Computer Networks, I. Demirkol and C. Ersoy, Energy and delay optimized contention for wireless sensor networks, under revision, Elsevier Computer Networks, I. Demirkol, E. Onur and C. Ersoy, Wake-up receivers for wireless sensor networks: Benefits and Challenges, under revision, IEEE Wireless Communications, I. Demirkol and C. Ersoy, Does minimizing the collision probability reveal the best performance? In preparation, I. Demirkol, A. Ozgovde, and C. Ersoy, Improving latency and throughput by intelligent contention window size adjustment for video sensor networks, In preparation, International Conference Papers: A. Ozgovde, I. Demirkol and C. Ersoy, Effect of sleep schedule and frame rate on the capabilities of video sensor networks, International Symposium on Wireless Pervasive Computing - ISWPC 08, Greece, May Y. Durmus, A. Ozgovde, I. Demirkol and C. Ersoy, Exploring the effect of the network parameters of video sensor networks, Accepted to International Symposium on Computer Networks, I. Demirkol, Evaluation of cluster-based cross layer protocols for wireless sensor networks, Accepted to IEEE INFOCOM 2006 Student Workshop, I. Demirkol, Evaluation of cluster-based cross layer protocols for wireless sensor networks, Accepted to ICN 06. National Conference Papers: A. Ozgovde, I. Demirkol and C. Ersoy, Uyuma çizelgesi ve çerçeve hızının görüntülü algılayıcı ağların başarımına etkisi, Akademik Bilişim, Çanakkale, I. Demirkol, K. Basol, O. B. Orhan and S. Sevinc, Sorgu-tabanlı telsiz algılayıcı ağları sınama ortamı çalışmaları, 65 / 66 Proceedings of Bilgi Teknolojileri Kongresi, pp , Denizli, Turkey, 9-11 February 2006.

66 Comments/Questions? 66 / 66

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite

More information

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). 2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Internet of Things. Exam June 24

Internet of Things. Exam June 24 Internet of Things Exam June 24 Exercise 1 A personal area network (PAN) is composed of 100 motes and a PAN Coordinator. The PAN works in beacon- enabled mode. 50 motes of Type 1 are equipped with light

More information

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk

More information

Mac Protocols for Wireless Sensor Networks

Mac Protocols for Wireless Sensor Networks Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Agriculture: Methods and Experiences

Agriculture: Methods and Experiences Wireless Sensor Networks for Precision Agriculture: Methods and Experiences Novel Sensor Technologies for Plant Phenotyping September 13 th 14 th, 2012 Wageningen, The Netherlands Antonio Javier Garcia

More information

c 2012 by Kien Nguyen. All rights reserved.

c 2012 by Kien Nguyen. All rights reserved. c 22 by Kien Nguyen. All rights reserved. EFFICIENT MAC PROTOCOL DESIGN FOR WIRELESS SENSOR NETWORKS BY KIEN NGUYEN DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Introduction to Wireless Sensor Network Security

Introduction to Wireless Sensor Network Security Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK

PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: xuedonl@ifi.uio.no Ilangko Balasingham 2 2 The

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

MEDIUM ACCESS CONTROL LAYER PERFORMANCE ISSUES IN WIRELESS SENSOR NETWORKS

MEDIUM ACCESS CONTROL LAYER PERFORMANCE ISSUES IN WIRELESS SENSOR NETWORKS MEDIUM ACCESS CONTROL LAYER PERFORMANCE ISSUES IN WIRELESS SENSOR NETWORKS by Ilker Seyfettin Demirkol B.S, Computer Engineering, Boğaziçi University, 1998 M.S, Computer Engineering, Boğaziçi University,

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS Chapter 5 A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS Piyush Naik and Krishna M. Sivalingam Dept. of CSEE, University of Maryland, Baltimore County, Baltimore, MD 21250 piyush.naik@umbc.edu,krishna@umbc.edu

More information

ENERGY MANAGEMENT IN WIRELESS SENSOR NETWORKS: A CROSSLAYER, CHANNEL ADAPTIVE APPROACH TOWARDS PERFORMANCE OPTIMIZATION

ENERGY MANAGEMENT IN WIRELESS SENSOR NETWORKS: A CROSSLAYER, CHANNEL ADAPTIVE APPROACH TOWARDS PERFORMANCE OPTIMIZATION Ph.D Thesis ENERGY MANAGEMENT IN WIRELESS SENSOR NETWORKS: A CROSSLAYER, CHANNEL ADAPTIVE APPROACH TOWARDS PERFORMANCE OPTIMIZATION Submitted to Cochin University of Science and Technology for the award

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab. How to deal with a thousand nodes: M2M communication over cellular networks A. Maeder NEC Laboratories Europe andreas.maeder@neclab.eu Outline Introduction to M2M communications The M2M use case landscape

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

Protocol Design and Implementation for Wireless Sensor Networks

Protocol Design and Implementation for Wireless Sensor Networks Protocol Design and Implementation for Wireless Sensor Networks PIERGIUSEPPE DI MARCO Masters Degree Project Stockholm, Sweden April 2008 XR-EE-RT 2008:005 Abstract Designing efficient and reliable communication

More information

A Receiver Oriented MAC Protocol for Wireless Sensor Networks

A Receiver Oriented MAC Protocol for Wireless Sensor Networks A Receiver Oriented MAC Protocol for Wireless Sensor Networks Luca Campelli, Antonio Capone, Matteo Cesana Dipartimento di Elettronica e Informazione Politecnico di Milano, Milan, Italy {campelli, capone,

More information

Wireless Sensor Network MAC Protocol: SMAC & TMAC

Wireless Sensor Network MAC Protocol: SMAC & TMAC Wireless Sensor Network MAC Protocol: SMAC & TMAC SARIKA KHATARKAR M.Tech Scholar Technocrats Institute of Technology, Rajiv Gandhi Technical University, Anand Nagar, Bhopal, Madhya Pradesh, 462021, India

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks He Ba, Ilker Demirkol, and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester,

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT

More information

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research

More information

Enhancement of VoIP over IEEE 802.11 WLANs by Adapting Transmitting Interval

Enhancement of VoIP over IEEE 802.11 WLANs by Adapting Transmitting Interval Enhancement of VoIP over IEEE 82.11 WLANs by Adapting Transmitting Interval Zhuo Chen, Lingyun Wang, and Xinbing Wang School of Electronic, Information and Electrical Engineering Shanghai Jiao Tong University

More information

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1

More information

Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca) Renuka Rani (rra7@sfu.ca) www.sfu.ca/~rra7

Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca) Renuka Rani (rra7@sfu.ca) www.sfu.ca/~rra7 ENSC 427: Communication Networks Spring 2010 Final Project Presentation Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca) Renuka Rani (rra7@sfu.ca) www.sfu.ca/~rra7 1 Introduction Overview and Motivation

More information

How To Improve Quality Of Service For A Smart Grid Distribution Monitoring System

How To Improve Quality Of Service For A Smart Grid Distribution Monitoring System Quality of Service Networking for Smart Grid Distribution Monitoring Wei Sun, Xiaojing Yuan, Jianping Wang, Dong Han and Chongwei Zhang School of Electrical Engineering and Automation, Hefei University

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

Medium Access Control Optimization For Structural Health Monitoring Using Wireless Sensor Network

Medium Access Control Optimization For Structural Health Monitoring Using Wireless Sensor Network Medium Access Control Optimization For Structural Health Monitoring Using Wireless Sensor Network by Saurabh Singh A thesis submitted to the Victoria University of Wellington in fulfilment of the requirements

More information

Performance of Host Identity Protocol on Nokia Internet Tablet

Performance of Host Identity Protocol on Nokia Internet Tablet Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007

More information

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks Sensors 2015, 15, 16162-16195; doi:10.3390/s150716162 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process

More information

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,

More information

On Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks

On Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks On Backoff Mechanisms for Wireless Mobile Ad Hoc Networks A Thesis Submitted By Saher S. Manaseer For The Degree of Doctor of Philosophy To The Faculty of Information and Mathematical Sciences University

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

MAC Protocols for Wireless Sensor Networks: A Survey

MAC Protocols for Wireless Sensor Networks: A Survey TOPICS IN AD HOC AND SENSOR NETWORKS MAC Protocols for Wireless Sensor Networks: A Survey Ilker Demirkol, Cem Ersoy, and Fatih Alagöz, Bogazici University ABSTRACT Wireless sensor networks are appealing

More information

Duty-Cycle MAC Protocols and Networking Overhaul

Duty-Cycle MAC Protocols and Networking Overhaul RMAC: A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks Shu Du Amit Kumar Saha David B. Johnson Department of Computer Science, Rice University, Houston, TX, USA Abstract Duty-cycle

More information

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi levi@sabanciuniv..edu Sabancı University Computer Science and

More information

How To Determine The Capacity Of An 802.11B Network

How To Determine The Capacity Of An 802.11B Network Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

CSC 774 Advanced Network Security. Outline. Related Work

CSC 774 Advanced Network Security. Outline. Related Work CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

FAMA/TDMA Hybrid MAC for Wireless Sensor Networks

FAMA/TDMA Hybrid MAC for Wireless Sensor Networks FAMA/TDMA Hybrid MAC for Wireless Sensor Networks Nuwan Gajaweera Dialog-University of Moratuwa Mobile Communication Research Lab, University of Moratuwa, Katubedda, Moratuwa, Sri Lanka Email: nuwang@ent.mrt.ac.lk

More information

A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks

A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks Wireless Sensor Network, 2011, 3, 61-72 doi:10.4236/wsn.2011.32007 Published Online February 2011 (http://www.scirp.org/journal/wsn) A New MAC Protocol for Moving Target in Distributed Wireless Sensor

More information

ENERGINO: Hardware and Software Solution for Energy Consumption Monitoring

ENERGINO: Hardware and Software Solution for Energy Consumption Monitoring ENERGINO: Hardware and Software Solution for Energy Consumption Monitoring Karina Gomez, Roberto Riggio, Tinku Rasheed, Daniele Miorandi, Fabrizio Granelli CREATE-NET Research, Trento, Italy Email: first.secondname@create-net.org

More information

Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks

Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks Junaid Ansari, Janne Riihijärvi and Petri Mähönen Department of Wireless Networks

More information

MAC Scheduling for High Throughput Underwater Acoustic Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

Drahtlose Kommunikation. Sensornetze

Drahtlose Kommunikation. Sensornetze Drahtlose Kommunikation Sensornetze Übersicht Beispielanwendungen Sensorhardware und Netzarchitektur Herausforderungen und Methoden MAC-Layer-Fallstudie IEEE 802.15.4 Energieeffiziente MAC-Layer WSN-Programmierung

More information

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Dionysia Triantafyllopoulou, Tao Guo, and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford,

More information

THE development of media access control (MAC) protocols

THE development of media access control (MAC) protocols 710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

Master s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System

Master s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System Master s Thesis Title Load Balancing Techniques for Lifetime Prolonging in Smart Metering System Supervisor Professor Masayuki Murata Author Chuluunsuren Damdinsuren February 14th, 2012 Department of Information

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University

More information

A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks

A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks Ayşegül Tüysüz Erman, Thijs Mutter, Lodewijk van Hoesel, and Paul Havinga University of Twente

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Versatile Low Power Media Access for Wireless Sensor Networks

Versatile Low Power Media Access for Wireless Sensor Networks Versatile Low Power Media Access for Wireless Sensor Networks Joseph Polastre Computer Science Department University of California, Berkeley Berkeley, CA 9472 polastre@cs.berkeley.edu Jason Hill JLH Labs

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel

More information

Wireless Video Best Practices Guide

Wireless Video Best Practices Guide Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager

More information

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. 1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

MAC Protocols for Wireless Sensor Networks: a Survey

MAC Protocols for Wireless Sensor Networks: a Survey 1 MAC Protocols for Wireless Sensor Networks: a Survey Ilker Demirkol, Cem Ersoy, and Fatih Alagöz Abstract Wireless sensor networks are appealing to researchers due to their wide range of application

More information

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1 802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course

More information

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks

WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks Amre El-Hoiydi and Jean-Dominique Decotignie CSEM, Swiss Center for Electronics and Microtechnology, Inc, Rue Jaquet-Droz

More information

Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Department of Electrical Engineering, Mathematics and Computer Science Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Master Thesis Thijs Mutter 439 Supervisors

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information