Deterministic Allocation by Oriented Edge Coloring for Wireless Sensor Networks

Size: px
Start display at page:

Download "Deterministic Allocation by Oriented Edge Coloring for Wireless Sensor Networks"

Transcription

1 Deterministic Allocation by Oriented Edge Coloring for Wireless Sensor Networks Lilia Lassouaoui 1, Stephane Rovedakis 1, Linqing Gui 2, Anne Wei 1 1 CEDRIC Laboratory, Conservatoire National des Arts et Métiers, 292 rue Saint-Martin, Paris, France {lilia.lassouaoui, stephane.rovedakis, anne.wei}@cnam.fr 2 Department of Electronic and Optical Engineering, Nanjing University of Science and Technology, 200 Xiaolingwei Street, Nanjing, China guilinqing@gmail.com Abstract: In wireless sensor networks, network lifetime is among the most important criteria. Network lifetime mainly depends on the link scheduling established at the Medium Access Control layer. Indeed, the avoidance of transmission conflicts enable energy savings since there are no message retransmissions. We are interested in deterministic allocation of the wireless medium for data collection in tree based sensor networks. In this paper, we consider a generalization of the distance 2-edge coloring problem, in which transmission and interference edges are taken into account. We propose a distributed algorithm for this problem, called D2EC, which ensures that conflicts are avoided. We also carry out simulations to compare D2EC with a random allocation strategy of the wireless medium. The simulation results show that there is a significant reduction on packet loss by using D2EC. Moreover, D2EC extends the lifetime of 250% in the best case regarding the random allocation of the wireless medium. Keywords Wireless Sensor Networks, deterministic link scheduling, distance-2 edge coloring. I. INTRODUCTION In the last decade, a large number of applications, such as security surveillance, health care, or monitoring, have emerged thanks to the deployment of sensor networks. One of the main tasks that a sensor network has to fulfill is the collection of sensed data at a particular node, called sink node. The data collected by the sink are analyzed in order to make decisions, e.g., fire detection in a forest or animal tracking [1]. Most of the time, sensor nodes are battery powered and it is either difficult or impossible to recharge batteries of nodes since they can be spread in inaccessible areas. Therefore, an important issue is to reduce the energy consumption in order to increase the network lifetime. Among actions performed by sensors, wireless communication is the most energy consuming. As a result, an effective allocation of the wireless medium allows reducing energy consumptions. Spanning tree is a well used routing structure for data collection, which avoids loops. However, in wireless networks message collisions can arise at a node when several messages sent simultaneously by nodes in the same communication range are received. When messages collide, the messages have to be transmitted again which involve additional energy consumption. The Medium Access Control (MAC) layer is in charge to avoid collisions and to turn off the transceiver node as soon as possible to improve the energy efficiency for data transmission. A lot of works has been devoted to the design of efficient MAC protocols for multi-hop wireless networks [2,3,4,5,7]. It exists three categories of MAC protocols: (a) contention based protocols, such as CSMA/CA (Carrier Sense Multiple Access with collision avoidance), (b) schedule based protocols, such as TDMA (Time Division Media Access), and (c) hybrid protocols. A TDMA approach achieves high energy efficiency since the transceiver of a node is switched off when it is neither in transmission nor in receiving mode. In this case, a TDMA protocol computes an allocation of time slots to sensor nodes, by taking into account possible communication interferences in the network. We consider that each sensor node is equipped with a half-duplex transceiver using a single frequency. Two concurrent transmissions are interfering with each other if and only if (cf. Figure 1): (i) they have the same receiver, (ii) the transmitter of one transmission is also the receiver of the other transmission, or (iii) at least one of the receivers is within the communication range of the non-intended transmitter. Interferences of types (i) and (ii) are known as primary conflicts, while interferences of type (iii) are secondary conflicts [6]. To avoid collisions, two interfering transmissions cannot occur during the same time slot. An assignment of time slots to links is referred to as link scheduling. Figure 1: primary and secondary conflicts. In order to increase the network lifetime, we are interesting in TDMA approach. In this context, such a resource allocation can be modeled as a vertex or edge coloring problem, where each color corresponds to a unique time slot. A solution for the minimum vertex (or edge) coloring problem is to find a color allocation to vertices (or edges) of minimum cardinality such that two neighboring vertices (or edges) have distinct colors. It is known that the vertex and edge coloring problems are NP-complete to solve for the class of general graphs [9]. A solution to the minimum edge coloring problem cannot avoid

2 all the possible collisions in the network, since only primary conflicts are taken into account. Indeed, an edge coloring can allocate the same color to two distinct links e 1 and e 2 which are not neighboring but are both neighboring of a third link e 3. If the common extremity node x of e 1 and e 3 is a transmitter and the common extremity node y of e 2 and e 3 is a receiver, then x corresponds to a non-intended transmitter for y considered in secondary conflicts. In such a case a collision occurs at node y. To take into account primary and secondary conflicts, it is necessary to compute distance-2 edge coloring. It means that every pair of edges with neighboring extremity nodes has distinct colors [10]. In the example described above, edges e 1, e 2 and e 3 form a path of length three and distinct colors are allocated. Faudree and Schelp [11] show that every arbitrary graph with maximum degree has a distance-2 edge coloring that uses at most colors, and it can be computed in polynomial time. Moreover, for the class of tree graphs a distance-2 edge coloring uses 2-1 colors. Our contributions. We propose a distributed algorithm to establish a deterministic allocation of wireless medium by computing a distance-2 edge coloring. We perform simulation to evaluate our algorithm with random allocation strategy. The obtain results show that our approach allows a significant reduction of the packet loss and an increase of the network life time. The reminder of the paper is organized as follows. In Section II, we introduce some related work on edge coloring. Section III defines the model considered in this paper. We present the oriented edge coloring with conflicts problem and our algorithm D2EC in Section VI. Simulation results are presented in Section V. Finally, we conclude the paper in last section. II. RELATED WORK A high number of MAC allocation algorithms have been proposed to handle the characteristics of wireless sensor networks. Some related works joint graph coloring and TDMA scheduling in wireless multi-hop networks. To efficiently use the time slots, vertex coloring has been used for node scheduling in [12]. The objective is to enable the maximum nodes in transmission mode without generating communication interferences in each time slot. Edge coloring problems have been used for link scheduling in wireless networks. Gandham et al. proposed a distributed distance-2 edge coloring algorithm based on links orientation (transmitter or receiver) using at most 2 ( + 1) time slots [8]. An edge coloring is computed in a first phase. Then, in a second phase a mapping of each color to a unique time slot is performed based on an edge orientation following a depth first traversal of the network. The algorithm proposed in [8] takes into account the hidden and exposed terminal problems, but it requires an even number of edges in any cycle. The best distributed approximation algorithm for edge coloring is obtained by Grable et al. in [14], which generates a valid edge coloring with using (1+ε) colors in O(polylog(n)) time. Herman et al. [15] expanded the approach of Grable et al. [14] to oriented (distance-2) edge coloring. In their distributed algorithm, an edge coloring is computed in a first step by using the algorithm of Grable et al. [14], and then edges are randomly re-colored with probability p. Finally, an orientation is assigned to each edge to obtain an oriented (distance-2) edge coloring. Compared with [8], Herman et al. improved the time complexity from linear to O(polylog(n)), but the problem with odd cycles remains. In [13] the authors proposed a centralized algorithm to assign time slots to directional links by coloring the edges of a directed graph. The proposed algorithm colors the edges selected following a Breadth First traversal of the network and considering interfering edges at distance 2. It tries to assign the smallest free color to non interfering edges. The problem with odd cycles is solved by the approach used to compute an edge coloring. All the works mentioned above color all the edges of the network, and thus allocate them a time slot, even if they are not used for data transmission. Ghosh et al. are interested in the minimization of the maximum delay for data collection in tree-based sensor networks [6]. They proposed a centralized approach to compute a Multi-Channel scheduling. Secondary conflicts and a part of primary conflicts are taken into account by assigning different frequencies, while the other primary conflicts are avoided using distinct time slots. They show that multiple frequencies can be used to give approximation guarantees on the minimization of the link scheduling problem. The frequencies and slots assignment can be considered as a distance-2 edge coloring, however contrary to previous approaches only the tree edges are colored, reducing the link schedule. However, the approach given in [6] is a centralized algorithm, which cannot be easily spread out on a real sensor networks. Contrary to the existing works, we propose a deterministic algorithm for oriented (distance-2) edge coloring problem with conflicts. Our algorithm computes a solution to this problem in a distributed manner (only information at distance two are needed). III. MODEL AND ASSUMPTIONS We model the sensor network as a graph G = (V, E), where V is the set of nodes and E is the set of edges that represent communication links. Each node v V is identified by a unique identifier. Let r ϵ V be the sink node and T = (V, E T ) be a directed spanning tree of G rooted at r. We assume a static network topology and each node is equipped with a single half-duplex radio that can be turned either to transmission or receiving mode. We consider an asynchronous system, i.e., nodes do not have access to a global clock. The time complexity of a distributed algorithm can be defined as the maximum time consumed by any computation. It is assumed that the processing time of an event is zero time units and the transmission time (time between sending and receiving a message) is at most one time unit. Moreover, information are exchanged using local broadcast, i.e., a message sent by each node is received by all its neighbours.

3 IV. ORIENTED EDGE COLORING WITH CONFLICTS In this section, we define the problem considered in this paper and we present the distributed algorithm named D2EC that we propose for this problem. A. Oriented Edge Coloring with conflicts problem The objective is to find a TDMA schedule of minimum length in which each node is activated at least once to send data. This is equivalent to computing an oriented edge coloration enabling a maximum of concurrent transmissions at each time. To this end, it is not necessary to color all the edges of the graph. Indeed, data transmissions only occur along the edges of the spanning tree, from each node to the sink node. Therefore, we must compute an oriented edge coloring only for the edges of the directed spanning tree. However, we have to take into account the conflicts between concurrent transmissions. We consider two types of edges in the graph G: communication links are the edges of the directed spanning tree T of G (i.e., E T ), and conflict links are all the edges not in T (i.e., E-E T ). Given a directed spanning tree T rooted at the sink r of a graph G, the Oriented Edge Coloring with conflicts problem is an edge coloring of T such that any two edges e 1 and e 2 of T neighbours in G have the same color if the following conditions are satisfied: (a) Either x ϵ e 1 and y ϵ e 2 are neighbours in G and both head (i.e., receiver) of e 1 and e 2 respectively, (b) or x ϵ e 1 and y ϵ e 2 are neighbours in G and both tail (i.e., transmitter) of e 1 and e 2 respectively. B. Distributed algorithm for Oriented Edge coloring with Conflicts 1) Overview of the algorithm Each node has in input the same static set of colors that is used for the edge coloring, noted C. We can define a total order of the edges of the directed tree following the distances and the identifiers of their extremity nodes, i.e., following the pairs ((d u, u), (d v, v)) with d x the distance of x to the sink r, u the head and v the tail of edge (u, v). The tree edges are colored in a top-down fashion in the tree, and we follow the total order defined above to establish a coloration priority among the interfering transmissions (or edges) at same level in the spanning tree T. Each node has two roles (transmitter and receiver) for data collection, except the sink and the leaves of T which are only receiver and transmitters respectively. In each role, each node cannot use the same color. Therefore, each node maintains a set of authorized colors for each role, i.e., colors which are not used by interfering edges of highest priority for each role. When a new tree edge has been colored, the assigned color is broadcasted in its neighbourhood. This information is used by the nodes of interfering edges with a lowest priority to update their sets of authorized colors. 2) Detailed description In this subsection, we give more details on Algorithm D2EC executed by every node of the network; a formal description is given in Figures 2 and 3. Each node p ϵ V has input information: its neighbors in the network (Neig p ), its parent and children in the spanning tree T (par p and Child p respectively) and its distance in T to the sink (dist p ). Three types of messages are used by our algorithm: <PropCE, q, ece> is used by a node q to send to its parent its set of authorized colors ece in transmission mode, <Diff, q, ecr> is used by each node q to send the ecr set containing the colors in transmission mode for its children, and <DiffAck, q, ce> is used by a node q to inform its neighbors that the color ce has been assigned for transmissions with its parent. Each parent (receiver node) p is waiting for the message PropCE from its children q with their authorized colors in transmission mode. Each child q can send a message PropCE when it has received a message Diff from all its priority neighbors given by PrioE(q). When receiving a message Diff, a node q updates its ace q set by removing the colors contained in the message. By using the edge priority (defined by PrioE(p) and PrioR(p) at p), D2EC ensure a determinist oriented (distance-2) edge coloring, avoiding the hidden and exposed terminal problems. Figure 2: First part of Algorithm D2EC.

4 V. EVALUATION BETWEEN D2EC AND RANDOM ALLOCATION In this section, we present simulation results to evalute the path loss performance and energy efficiency of Algorithm D2EC in compraison with a random allocation strategy. In the random allocation that we consider each color has the same probability to be allocated for each transmission in the network. According to [16], in a wireless network the smallest number of possible colors follows O( ), with the maximum degree in the network. Table 2: parameters of algorithm. Symbol of Physical meaning of parameter parameter n Total number of sensor nodes Maxium degree Total number of levels in the network num_col Total number of colors We have considered four different scenarios in our simulation to evaluate and to compare the performance of algorithms. These scenarios are defined by the value of the simulation parameters listed in the following table. Table 3: value for parameters in each scenario. num_col n Scenario Scenario Scenario Scenario In a first step, we consider network topologies without conflict links (i.e., tree networks). This is a subset of topologies in which solutions for oriented edge coloring and oriented edge coloring with conflicts are identical. In this case, according to Gandham et al. [8] +1 colors are needed. Figure 4 shows the topologies considered in each scenario. (a) Scenario 1 (b) Scenario 2 Figure 3: Second part of Algorithm D2EC. A. Scenarios of Simulation The main parameters used for our simulations of Algorithm D2EC and the random allocation strategy are listed in the following table. (c) Scenario 3 (d) Scenario 4 Figure 4: Network topology of each scenario. B. Evaluation based on Simulation Results Upon the above four scenarios, we simulate both Algorithm D2EC and the random allocation strategy and considering three metrics are used for performance evaluation: average end-toend delay, average packet loss rate, and network lifetime. Here, end-to-end delay is the delay of data transmission from every node to the sink, so average end-to-end delay is the average of all end-to-end transmissions. The average packet loss rate is calculated as the number of collided packets divided by the number of all packets sent in the network. Network lifetime is inversely proportional to the energy used for transmitting all packets. Note that for comparison convenience the network lifetime of D2EC in the first scenario is normalized to 1. Simulation results are shown in Figure 5, 6 and 7. From simulation results, we can find that D2EC algorithm has much better performance than the random allocation strategy.

5 average end-to-end delay average packet loss rate network lifetime (normalized) D2EC, scenario 2 D2EC, scenario 1 Figure 5: Simulation results of average end-to-end delay. &4 Figure 6: Simulation results of average packet loss rate. D2EC, scenario 1&2 D2EC, scenario 1 D2EC, scenario 2 D2EC, scenario 3&4 D2EC, scenario 3 D2EC, scenario 4 Figure 7: Simulation results of network lifetime. As shown in Figure 5, the average end-to-end delay achieved by D2EC in networks with two levels is only 4 slots (in Scenario 1) and 5.17 slots (in Scenario 2), while the delay of the random allocation is 9.22 slots (in Scenario 1) and slots (in Scenario 2). The difference on delay performance between D2EC and the random allocation is more obvious in Scenarios 3 and 4 when the network has three levels. The average end-to-end delay increases with the number of levels, since it takes more time to fulfill the end-to-end transmission from the lowest level to the sink. This indicates that when the number of levels in tree networks increases D2EC algorithm has a more obvious advantage on end-to-end delay than the random allocation. As shown in Figure 6, the average packet loss rate of D2EC is equal to zero since the computed oriented edge coloring is collision free. Although the random allocation is simpler than D2EC, it has a much higher packet loss rate because of collisions. When the network has two levels, the average packet loss rate of the random allocation is as high as 46.7% (in Scenario 1) and 54.2% (in Scenario 2). The loss rate increases with the number of levels since when colors are randomly allocated there will be a higher probability for two D2EC, scenario 4 D2EC, scenario 3 nodes to have the same color. As shown in Figure 7, the network lifetime obtained with D2EC is higher in every scenario (extended up to 250% in Scenario 1 compared with the random allocation). VI. CONCLUSION AND FUTURE WORK In this paper, we consider a variation of the oriented edge coloring problem to perform the maximum number of concurrent non interfering transmissions. We propose a distributed algorithm D2EC for this problem. Moreover, we evaluate the performances of our algorithm in comparison with a random allocation strategy through simulations. The obtained results show that D2EC reduces the packet loss considerably. Moreover, D2EC allows to extend the network lifetime up to 250%. Our future work focus on fault-tolerance guarantees, as the fault-tolerance is also an important problem related in wireless sensor networks. VII. REFERENCES [1] P. Rawat, K.D. Singh, H. Chaouchi, J.M. Bonnin, "Wireless sensor networks: a survey on recent developments and potential synergies", The Journal of Supercomputing 68(1), pp. 1-48, 2014 [2] Katarzyna Kosek-Szott, A survey of MAC layer solutions to the hidden node problem in ad-hoc networks, Ad Hoc Networks (ADHOC) 10(3), pp , 2012 [3] I.Demirkol, F.Alagöz 'MAC Protocols for Wireless Sensor Networks: a Survey '', IEEE Communications Letters 10(1), pp , 2006 [4] V.Rajendran, K.Obraczka, ''Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks'', Wireless Networks, 12(1), pp , 2006 [5] I. Rhee, A. Warrier, M. Aia, J. Min, M.L. Sichitiu, Z-MAC: a hybrid MAC for wireless sensor networks. IEEE/ACM Transactions on Networking, 16(3), pp , 2008 [6] A. Ghosh, O.D. Incel, V.S.A. Kumar, B. Krishnamachari, Multichannel Scheduling and Spanning Trees: Throughput-Delay Tradeoff for Fast Data Collection in Sensor Networks, IEEE/ACM Transactions on Networking, 19(6), pp , 2011 [7] B. Zeng, Y. Dong, A Collaboration-based Distributed TDMA Scheduling Algorithm for Data Collection in Wireless Sensor Networks, JNW 9(9), pp , 2014 [8] S. Gandham, M. Dawande, R. Prakash, Link scheduling in wireless sensor networks: Distributed edge-coloring revisited, J. Parallel Distrib. Comput. (JPDC) 68(8), pp , 2008 [9] I. Holyer, The NP-completeness of edge-coloring, SIAM J. Comput., 10(4), pp , [10] M. Mahdian, On the computational complexity of strong edge coloring, Discrete Applied Mathematics, 118(3), pp , [11] R.J. Faudree and R.H. Schelp, The strong chromatic index of graphs, Ars Comb, 29 (B), pp , [12] V. Rajendran, J.J. Garcia-Luna-Aveces, K. Obraczka, Energy-efficient, application-aware medium access for sensor networks, MASS [13] Maggie X. Cheng, Li Yin, Transmission Scheduling in Sensor Networks via Directed Edge Coloring, pp , ICC 2007 [14] D.A. Grable and A. Panconesi, Nearly optimal distributed edge colouring in o(log log n) rounds, Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms, pp , 1997 [15] T. Herman, S. Pemmaraju, and I. Pirwani, Oriented edge colorings and link scheduling in sensor networks, in First International Conference on Communication System Software and Middleware, pp. 1 6, 2006 [16] Moscibroda Thomas, Roger Wattenhofer. Coloring unstructured radio networks, Distributed Computing, 21, no. 4, pp , 2008.

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). 2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs

More information

NEW applications of wireless multi-hop networks, such

NEW applications of wireless multi-hop networks, such 870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

TDMA Scheduling Algorithms for Sensor Networks

TDMA Scheduling Algorithms for Sensor Networks TDMA Scheduling Algorithms for Sensor Networks Sinem Coleri Ergen and Pravin Varaiya Department of Electrical Engineering and Computer Sciences University of California, Berkeley, CA 94720 Email: {csinem,

More information

CONVERGECAST, namely the collection of data from

CONVERGECAST, namely the collection of data from 1 Fast Data Collection in Tree-Based Wireless Sensor Networks Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar Krishnamachari, and Krishnakant Chintalapudi Abstract We investigate the following fundamental

More information

Scheduling Algorithms for Tree-Based Data Collection in Wireless Sensor Networks

Scheduling Algorithms for Tree-Based Data Collection in Wireless Sensor Networks Chapter 14 Scheduling Algorithms for Tree-Based Data Collection in Wireless Sensor Networks Ozlem Durmaz Incel and Amitabha Ghosh and Bhaskar Krishnamachari Abstract Data collection is a fundamental operation

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Protocol Design for Neighbor Discovery in AD-HOC Network

Protocol Design for Neighbor Discovery in AD-HOC Network International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

Spatially Limited Contention for Multi-Hop Wireless Networks

Spatially Limited Contention for Multi-Hop Wireless Networks Spatially Limited Contention for Multi-Hop Wireless Networks Fikret Sivrikaya, Sahin Albayrak DAI-Labor / TU Berlin, Germany Bülent Yener Rensselaer Polytechnic Institute, NY, USA Abstract With rapid developments

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Interference Reduction in Wireless Networks Using Graph Coloring Methods

Interference Reduction in Wireless Networks Using Graph Coloring Methods Interference Reduction in Wireless Networks Using Graph Coloring Methods Andrew Chickadel Computing Research Department of Computer Science Villanova University Villanova, PA 19085 Andrew.Chickadel@villanova.edu

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University

More information

-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks

-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks -MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks Andre Barroso, Utz Roedig and Cormac Sreenan Mobile & Internet Systems Laboratory, University College Cork, Ireland Email: a.barroso

More information

Efficient Throughput for Wireless Mesh Networks by CDMA/OVSF Code Assignment

Efficient Throughput for Wireless Mesh Networks by CDMA/OVSF Code Assignment Ad Hoc & Sensor Wireless Networks Vol. 00, pp. 1 27 Reprints available directly from the publisher Photocopying permitted by license only 2008 Old City Publishing, Inc. Published by license under the OCP

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

Broadcasting in Wireless Networks

Broadcasting in Wireless Networks Université du Québec en Outaouais, Canada 1/46 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 2/46 Outline Intro Known Ad hoc

More information

MAC Scheduling for High Throughput Underwater Acoustic Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

Recent advances in microelectromechanical

Recent advances in microelectromechanical COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area

More information

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,

More information

TDMA scheduling algorithms for wireless sensor networks

TDMA scheduling algorithms for wireless sensor networks Wireless Netw (2010) 16:985 997 DOI 10.1007/s11276-009-0183-0 TDMA scheduling algorithms for wireless sensor networks Sinem Coleri Ergen Æ Pravin Varaiya Published online: 27 May 2009 Ó The Author(s) 2009.

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

TDMA Scheduling for Event-Triggered Data Aggregation in Irregular Wireless Sensor Networks

TDMA Scheduling for Event-Triggered Data Aggregation in Irregular Wireless Sensor Networks TDMA Scheduling for Event-Triggered Data Aggregation in Irregular Wireless Sensor Networks Mario Orne Díaz-Anadón Kin K. Leung Electrical & Electronic Engineering Department, Imperial College, London,

More information

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard Performance Evaluation of the IEEE 8.p WAVE Communication Standard Stephan Eichler (s.eichler@tum.de), Institute of Communication Networks, Technische Universität München Abstract In order to provide Dedicated

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Distributed Power Control and Routing for Clustered CDMA Wireless Ad Hoc Networks

Distributed Power Control and Routing for Clustered CDMA Wireless Ad Hoc Networks Distributed Power ontrol and Routing for lustered DMA Wireless Ad Hoc Networks Aylin Yener Electrical Engineering Department The Pennsylvania State University University Park, PA 6 yener@ee.psu.edu Shalinee

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network

Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network A thesis report submitted for partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.295 MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Mohamed Mostafa

More information

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: rurgaon@us.ibm.com Prithwish Basu and Saikat Guha

More information

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks Sensors 2015, 15, 16162-16195; doi:10.3390/s150716162 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process

More information

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Siuli Roy 1, Dola Saha 1, Somprakash Bandyopadhyay 1, Tetsuro Ueda 2, Shinsuke

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information