Design of Wireless Sensor Networks

Size: px
Start display at page:

Download "Design of Wireless Sensor Networks"

Transcription

1 Energy-Efficiency Efficiency Issues in Cross-Layer Design of Wireless Sensor Networks Sergio Palazzo Sensor Networks: : a small world Main Features small in size small transmission ranges low-powered cheap cost-effective Energy Efficiency is a major issue! Design Guidelines (1/3) Production Costs: considering that sensor networks are composed of a large number of sensor devices, reducing the cost of a single node is very important Hardware Constraints: a sensor node is made up of four basic components Sensing Unit: it performes SENSING UNIT sensing tasks and analog to digital conversion Sensor ADC Processing Unit: it is composed of a processor and of a small storage unit Transceiver Unit: it is a radio frequency modem that uses more than one coding technique to connect the node to the network Power Unit: it may be supported by solar cells GPS Unit: optionally a GPS unit may be required PROCESSING UNIT Processor Storage POWER UNIT TRANSCEIVER UNIT POWER GENERATION Design Guidelines (2/3) Network Topology: changes in sensor network s topology can happen during pre-deployment and deployment phase, post-deployment phase and re-deployment phase. They are caused by misfunctioning, low available energy, etc, Then,, in a network with a high number of nodes that can fail, it is necessary to implement special routing protocols that re-route route packets and re-organize the network Transmission Media: wireless connection between sensors can be performed through radio links infrared links optical links Much of the current hardware for sensor nodes is based upon RF circuit design. Infrared mode is license-free and robust to interference from electrical devices. Optical transmission is under development. Nonetheless, the transmitted information must be protected through robust coding and modulation schemes Design Guidelines (3/3) Operating Environment: a biologically or chemically contaminated field,, the bottom of an ocean,, a river moving,, fast moving vehicles, animals body Power Consumption: sensors lifetime is strongly dependent on battery lifetime.. A wireless sensor node is typically equipped with a limited power source (<.5 Ah, 1.2 V) to maintain low the size and weight. Power conservation and power management are of primary importance: researchers are currently focusing on the design of power-aware protocols and algorithms for sensor networks Scalability: nodes density depends on the particular application (the number of sensor nodes can vary from hundreds to thousands devices Fault tolerance and Reliability: the fault tolerance level depends on the application. Infact, if the environment, where the sensor nodes are deployed, is subject to interference or is hostile, then the protocols must be implemented with a high fault tolerance Energy-Efficiency Efficiency related issues Application requirements Sensing accuracy Reliability Coverage Wireless Technology Network Connectivity MAC Protocols Routing and Forwarding schemes Positioning and Localization Algorithms Congestion control Data aggregation In-network network Processing 1

2 Energy Conserving in the layered framework In principle, energy conserving strategies can be effectively introduced at all individual layers of the traditional layered architecture framework At the physical layer energy can be saved by proper selection of batteries,, hardware (for( example,, power amplifiers), antennas (diversity, beamsteering,, MIMO techniques), coding (turbocodes,, turbo trellis coded modulation), transmission power control (waterfilling( strategies), multiuser detection. In the following, only strategies that coarsely refer to MAC and network layers will be considered. Energy Conserving Approaches To meet energy conserving requirements in ad hoc networks, three approaches have been mostly used so far: 1. Power save protocols attack the problem of high idle state energy consumption by maximizing the amount of time nodes spend in the sleep state 2. Power control techniques increase network capacity and reduce energy consumption by allowing nodes to determine the minimum transmit power level required to maintain network connectivity and forward traffic with least energy cost 3. Maximum lifetime routing selects paths that maximize network lifetime by balancing energy consumption across the nodes of the network Operating Modes of a Sensor Node (1/2) The energy consumed by an interface depends on its operating mode Sleep Mode: an interface can neither transmit nor receive very low energy consumption Idle Mode: an interface can transmit or receive data at any time (this requires time and energy) it consumes more energy than it does in the sleep state Receive Mode and Transmit Mode: the energy consumption is of the same order of magnitude than idle state. Transmitting requires more energy than receiving, but the difference is generally less than a factor of two Pow er (m W) TX Operating Modes of a Sensor Node (2/2) Power consumption of node subsystems Sensing Unit Processing Unit TX RX IDLE SLEEP E E E >> E RX IDLE SLEEP Transceiver Unit Power-Save Switch-off Approaches MAC layer Power-Save mechanisms To save energy the nodes must spend more time in the sleep mode The unavailability of sleeping nodes may interrupt the flow of traffic through a multihop ad hoc network Power-save protocols have been introduced at MAC and network layers The nodes periodically wake up to listen the announcements of pending traffic and, if it is necessary, they remain awake to receive and d exchange traffic It is important to determine time windows to maximize energy saving while minimizing impact on throughput and latency In this approach the nodes must also maintain a globally synchronized nized sleep-wakeup cycle Practical Problem to establish the phase synchronization in a dynamic multi-hop ad hoc network 2

3 Signalling-based Power-Save Protocols MACA-based protocols exploit the media access control process to find intervals during which the network interface does not need to be awake While a packet is being transmitted, nearby nodes, whose transmissions might interfere with the ongoing transmission, must remain silent Therefore these nodes can sleep with little or no impact on throughput PAMAS PAMAS (Power Aware Multi-Access with Signalling for Ad Hoc Networks) uses an RTS/CTS mechanism as the IEEE MAC It relies on a separate control signaling channel (busy tone) A node that is going to transmit or is in the process of receiving a transmission causes other nodes to go to sleep by generating a busy tone When a sleeping node wakes up, it has no information about the state of channel, then it transmits a sequence of probe messages and awaits a response on the control channel Power-Save Based on Network Topology (1/2) A subset of nodes that are topologically representative of the full f network is selected This covering set must be chosen so as to maintain the effective capacity of the network and minimize the impact of the power save protocol on o throughput and latency A few selected nodes in the covering set remain in the idle state e and are responsible to forward traffic in the network Other nodes spend most of their time sleeping, consuming much less energy. They wake up periodically to participate in subset election or to receive pending traffic in the sleep state The rotation between the two roles among nodes in the network is necessary to maximize the network lifetime Power-Save Based on Network Topology (2/2) Selecting the optimal covering set is a non-trivial problem, especially when it is based on localized computation with minimal overhead and when it must be recomputed in response to nodes failure and mobility The protocols that use this approach are inherently asynchronous,, but they may rely on synchronized mechanisms for buffering traffic for f sleeping nodes. In the asynchronous protocols Connectivity information can be used to determine the covering set: s the nodes that are not currently part of the covering set must exchange traffic to determine their connectivity. It is also possible to select a covering set indirectly, for example, by using position information Topology-Based Power-Save Protocols: Dominating Sets (1/3) In a cluster-based algorithm - named CEDAR - each node selects a core-node as dominator, which will give access to the services offered by the core Each core node has a domain of non core- nodes A subset of nodes,, S V, is a dominating set for V if each node in V is included in S or it is distant 1 hop from S. The dominating set with the minimum number of nodes is called minimum dominating set (MDS) Topology-Based Power-Save Protocols: Dominating Sets (2/3) Heavy computation is required to find a minimal-size dominating set: to this purpose distributed algorithms are necessary Most of these algorithms use a two phase approach In the first phase nodes exchange neighbor information and any node that has two unconnected neighbors marks itself as part of the connected dominating set The second phase eliminates any marked node that is redundant (its one-hop neighborhood is contained within the one-hop neighborhood of an adiacent marked node or is contained within the union of two such one-hop neighborhoods) 3

4 Topology-Based Power-Save Protocols: Dominating Sets (3/3) Whenever possible,, the node with the lower energy supplies is preferentially removed from the dominating set: this allows to increase network lifetime The incremental cost of a dominating node is specified as a function of the routing overhead (proportional to the number of nodes) ) and the forwarding overhead (inversely proportional to the number of forwarders): the relative magnitude of these factors depends on the average node degree, path length, path lifetime (i.e. mobility) ) and the relative costs of transmitting and receiving PERFORMANCE Simulation results show that after the elimination phase 3-4% of the nodes are in the dominating set and the network lifetime is longer When no using power-save protocols, for all values of routing overhead and for all mobility levels,, network lifetime decreases asymptotically as the node density increase; instead, fixed energy consumption models yield a linear increase in network lifetime as a function of density (SPAN and GAF protocol) Topology-Based Power-Save Protocols: SPAN (1/3) The covering set in SPAN is a connected dominating set, whose nodes are called coordinators Coordinators are in the idle state. They act as low latency routing backbone nodes and buffer traffic for sleeping destinations (using mechanisms derived from IEEE 82.11) Non-coordinator nodes wake up periodically to exchange traffic with the coordinator nodes and participate in coordinator election Topology-Based Power-Save Protocols: SPAN (2/3) The coordinator election algorithm A. The nodes periodically exchange HELLO messages to discover their two-hop neighborhood B. A node marks itself as eligible coordinator if it discovers that two neighbors cannot comunicate directly or via other coordinators C. Each marked node schedules a backoff interval (it has both random and adaptive elements), ), during which it listens for announcements from other nodes D. If after this interval the node is still eligible, it sends its own coordinator announcement.. The nodes with greater connectivity and higher energy reserves announce themselves as coordinators more quickly E. After spending some time as a coordinator,, a node withdraws The rotation of the coordinator role tends to balance nodes energy reserves, even in the case of initially unequal distribution Topology-Based Power-Save Protocols: SPAN (3/3) SPAN is a synchronous power save protocol for two reasons 1. the buffering and announcements are based on the synchronous IEEE power save mechanism, also some form of asynchronous polling is a possible alternative 2. the nodes must be awake simultaneously to exchange traffic to determine their connectivity and participate in coordinator election PERFORMANCE Simulations and experimental energy measurements corroborate that SPAN provides about 5% energy saving in dense networks, with only minimal impact on throughput and packet loss Network lifetime increases roughly linearly with network density Also latency increases with node density Rotation of the roles allows a 5-1% increase of the network lifetime Topology-Based Power-Save Protocols: Geographic Adaptive Fidelity - GAF (1/2) GAF is a power save protocol that selects its representative nodes based on position (by GPS receiver, for example), rather than membership in a dominating set GAF partitions the network using a geographic grid The grid size of R/ 5, where R is the nodes transmission range, guarantees that each node in a grid square is within the transmission range of every node in each adjacent grid square All nodes in a grid square are regarded as equivalent with respect to their ability of forwarding packets One non-sleeping node in each grid square is sufficient to maintain the connectivity of the original network Topology-Based Power-Save Protocols: Geographic Adaptive Fidelity - GAF (2/2) Each node passes among three states: sleep, discovery and active Sleeping nodes in the grid periodically wake up and go to the discovery state Discovery (A): in this state a node send a State A discovery message containing its grid E positon ID and energy status, and B C listens for other discovery messages. If Sleep Active the node hears no higher ranking D State State announcements, it passes to the active state (B), otherwise it goes back to the sleep state (C) If an active node hears a discovery message from an active node of higher rank, it immediately goes to the sleep state (D). After spending some time in the active state, a node passes to the discovery state (E), allowing the active role s rotation between the nodes in the grid square 4

5 Power Control Techniques With these techniques, nodes modify their transmit power to reduce energy consumption and increase network capacity Low power transmissions reduce contention and increase network capacity, while at the same time consuming less energy This implies that a route with a larger number of low power hops may be more energy efficient than one with fewer high power hops Minimum Energy Routing Problem The problem is to minimize the energy consumed in forwarding a packet p from source to destination Minimum energy routing can exploit exponential path loss by forwarding traffic using a sequence of low power transmissions rather than a single direct transmission In a basic path loss model, received signal strength decreases exponentially with distance: therefore the minimum transmit power required to transmit from node i to node j must be Pminmin ij d α i,j with 2 α 4.. Besides, the signal to noise ratio (SNR) at the receiver must be greater than some threshold, which depends on the target bit error rate In general, because of the effects of terrain and other obstacles, s, a node can not determine the transmission power level required for nodes s to communicate given their position Topology Control Problem This problem consists of assigning per-node transmit powers that minimize the total transmit power, while still maintaining network connectivity Most strategies are focused on increasing throughput by reducing interference, with the associated reduction in energy consumption as a beneficial side effect Examples of Topology Control Strategies 1. Link state topology information is used to maintain a connected topology. When a route update indicates a link failure,, the appropriate nodes increase their transmission power (using slotted backoff) ) until the network is connected. In the absence of topology information,, each node increases its transmission power until its degree is sufficiently large, based on estimated node density 2. Each node modifies its transmission power until it has discovered d at least one neighbor in every direction with cones of angle α 2π/3: these neighbors combined wireless coverage provides connectivity (this guarantees to each node to be connected to the network). Besides,, thanks to topology of this neighbor set,, nodes can further reduce their transmission power by eliminating redundant nodes from the set 3. Given a broadcast source node,, the minimum energy broadcast problem is to select a set of re-broadcasters and transmission powers, such that the message is distributed to all nodes with minimum total energy cost. This type of strategies is not very used because minimum energy broadcast is an NP-complete problem Maximum Lifetime Routing Saving energy in the whole network is so much important as doing it at the individual nodes. This may be done balancing energy consumption across the nodes of the network Problem of Maximum Lifetime Routing three main Route Metrics used in selecting energy aware routes have been proposed alternative approaches have also been proposed Minimum Energy Routing Route Selection Metrics (1/2) This metric minimizes the total energy consumed as a packet is forwarded on a route It does not maximize network lifetime Nodes residual energy is not taken into account, therefore the nodes will suffer early failure due to their heavy forwarding load Max-Min Min Routing It selects the route which maximizes the minimum residual energy of any node on the route itself The routes selected may be longer or have higher total energy consumption than the minimum energy route This makes neither this metric succeeds in maximizing the network lifetime, though it generally performs much better than Minimum Energy Routing 5

6 Minimum Cost Routing Route Selection Metrics (2/2) It minimizes the total cost of forwarding the packet at each node, selecting the route that minimizes the sum of the link costs c ij The cost function controls the presence of a high-cost node on a route which may deflect traffic from that route In general, the cost function is increasing, so reflecting a node s increasing reluctance to forward traffic, as its residual energy decreases Alternatively, a capacity cost function incorporates both the link energy cost and the residual energy at a node: so it has ability to balance to maximize energy reserves and to minimize forwarding cost MACRO: a MAC/ROuting cross-layer protocol for WSNs MACRO is a cross-layer protocol developed at the WiNe-Lab (Wireless Network Laboratory) of the University of Catania. Unlike former solutions s (e.g. GeRaF) ) it doesn t t involve any location information exchanging. Each node only needs eds to know its own position in the coverage area. The metric to establish the t next hop is: Advantages of using different power levels Weighted Progress Factor (WPF) Set of power levels and coverage range R R S 1( R ') S 2 ( R') S ( R 3 ') D M=4 P 1 =.11W R 1 =62.5m P 2 =.176W R 2 =125m P 3 =.892W R 3 =182.5m P 4 =.2818W R 4 =25m M=3 P 1 =.35W R 1 =83.4m P 2 =.556W R 2 =166.7m P 3 =.2818W R 3 =25m M=2 P 1 =.176W R 1 =125m P 2 =.2818W R 2 =25m M=1 P 1 =.2818w R 1 =25m MACRO MAC Functionalities To select the next relay node R R triggers a competition Let R R be the winner of the competition in the set S 1 (R ) ) and G R R1 R1 its WPF If R R estimates that a higher WPF can be obtained increasing P, a new competition is triggered in the set S 2 (R ) The procedure is repeated until no better relay nodes can be found R R D S ( R 1 ') Nodes periodically switch ON and OFF to reduce energy consumption Synchronization is not needed A wake up phase is required for R R to identify the best relay node in S i (R ) To this purpose R R transmits several short WAKE UP messages for a period T Cycle Then R R sends a GO MESSAGE which triggers competition among nodes in S i (R ) A node in S i (R ) ) hearing the WAKE UP messages calculates its WPF and stays awake waiting for the GO MESSAGE T ON T Cycle T T 2T In WU ON TX WU Then, upon hearing the GO MESSAGE, a node sends randomly to R R its WPF so that R R performs the choice of the best relay in S i (R ) 6

7 MACRO Analytic Framework What is the probability that outside the coverage area obtained using P i, exists at least one node whose WPF is higher than g,, provided that G (M) i = G i? Once the probability is known, when is it worth enlarging the coverage area? Where f ) ( g G ) G ( M ) ( 1 G M i i+ i using the previous results as is the probability density function which can be evaluated Ri g Pi +1 Ri > g Pi +1 Where z is the nodes density and a(g G i ) is the area where a node B must be located in order to belong to S i+1 (R ) and have a WPF higher than g. Performance Evaluation GPSR (with STEM-B B MAC protocol) B. Karp and H.T. Hung, GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. Proc. of ACM Mobicom 2. C. Schurgers,, V. Tsiatis,, G. Ganeriwal,, and M. Srivastava.. Optimizing Sensor Networks in the Energy-Latency Latency-Density Design Space. IEEE Transactions on Mobile Computing.. Vol. 1, No. 1, January-March 22. GeRaF (same MAC as MACRO) M. Zorzi and R.R. Rao.. Geographic Random Forwarding (GeRaF( GeRaF) ) for Ad Hoc and Sensor Networks: Multihop Performance. IEEE Transactions on Mobile Computing.. Vol. 2, No. 4. October-December 23. M. Zorzi and R.R. Rao.. Geographic Random Forwarding (GeRaF( GeRaF) ) for Ad Hoc and Sensor Networks: Energy and Latency Performance. IEEE Transactions on Mobile Computing.. Vol. 2, No. 4. October-December 23. Area 1 x 1 m 2 Number of nodes in the range [5,25] Four traffic sources; packet rate r in the range [.2,2]; packet size 512 bytes Duty cycle time.1 s, T ON three times Wake UP message transmission time Signal propagation model two-ray ground model (accurate in outdoor environment) Two nodes in the radio coverage if the received signal is higher r than.365e-6 6 W Four possible transmission power levels Impact of node density Impact of node density GPSR+STEM MACRO GPSR+STEM Average power consumption vs nodes nominal radio area GeRaF GeRaF MACRO GPSR+STEM MACRO GeRaF Ninra=NπR 2 /Ξ 2 Average power consumption Average number of hops 7

8 Number of packets delivered at destination Data Aggregation MACRO GeRaF MACRO GeRaF GPSR+STEM GPSR+STEM Scenario Applications: : Sensor Networks for phenomenon monitoring Sensor nodes notify the sink about the phenomenon they sense The sink uses this data to create a map of the phenomenon (spatial al propagation, temporal evolution, etc.) Data is funneled towards the sink and causes congestion Aggregation Due to sensors density and the kind of applications, redundant and highly correlated data (both( in space and time) are often propagated throughout the network. This can lead to energy waste which reduces network lifetime Mechanisms for combining data at forwarding intermediate nodes so as to propagate only useful and not redundant information should be considered Data aggregation is aimed at aggregating data coming from multiple sensors into useful non redundant fused data Data aggregation = gathering + fusion Relevant Metrics Metrics to be considered when performing aggregation are Energy efficiency: fairness in energy consumption at each aggregation round is to be searched. Network lifetime: the number of rounds until the first sensor is depleted of energy should be maximized Fidelity/distortion distortion rate: difference between the data collected at the sink when no aggregation is performed and when it is, should be evaluated Latency: aggregation implies additional processing of data. The delay introduced by these operations should be considered and should not have excessive impact on the timeliness of the system Two-phase pull mechanism: Direct Diffusion Phase 1: the sink pulls for information from sources using the propagation of interests for specific information. Sources answer using multiple paths Phase 2: the sink initiates reinforcement,, i.e. asks some specific nodes (based on considerations related to delay, quality, etc.) to increase their event sending rate Data arriving at intermediate nodes and coming from multiple sources can be aggregated when referring to the same interest Reinforcement can be incorporated into Phase 1, so the two phase process can become one phase Direct Diffusion can be costly because all nodes are required to send their data to the sink 8

9 LEACH To reduce the overhead of each node transmitting data directly to the sink, clusterhead solutions have been proposed. These allow to drastically reduce energy consumption In LEACH sensor nodes organize themsleves into clusters.. In each one, a node, denoted as clusterhead (CH), takes care of fusing data coming from other nodes in the cluster and sends the fused data to the sink. LEACH is useful for constant monitoring and periodic data reporting applications 2 phases: Set up: nodes organize themselves into clusters and CHs are randomly selected Steady state: CHs perform data aggregation Limitations: Nodes assumed to have the same energy capabilities so that random rotation of leadership can be performed Consequently all nodes are thought to be CHs and are assumed to be able to reach the sink in one hop transmission CONCERT: focus on congestion control Congestion typically occurs in nodes close to the sink and causes waste of bandwidth and energy resources Congestion leads to losses and thus causes inaccuracy in phenomenon monitoring New approach to solve the congestion problem in sensor networks using adaptive data-aggregation aggregation Previous works on congestion control used back-pressure to regulate sources transmission rate -> decrease in sources throughput and increase in signaling Data aggregation has been used for increasing network lifetime Positive effects on the distribution of the load in the network have been observed Data-aggregation aggregation used for counteracting congestion problem and guaranteing fidelity in the network Aggregation for congestion control purposes should be done while preserving information entropy To this purpose we focus on loss less aggregation which exploits spatial correlation of data We study the impact of aggregator nodes positioning on network performance in terms of loss probability and network overload We estimate the impact of data aggregation on energy consumption both at aggregator nodes and overall in the network Aggregator nodes positioning: Example 25 sink The load due to control packets forwarding for aggregator nodes control and management cannot be neglected Aggregating one hop away from the funneled nodes (i.e. node 9) performs well especially for high values of the aggregation function (i.e. ) There is not great adavntage in aggregating at all network nodes with respect to aggregating only at few nodes. It also results cheaper!,16,16 PLoss,14,12,1,8,6,4,2 Nodes P Loss,14,12,1,8,6,4,2 Node s Energy Cost Aggr=9 Aggr=3 Aggr=4 Aggr=7 Aggr=3, 9 Aggr=3, 4 Aggr=3, 7 Aggr=4, 9 Aggr=4, 7 Aggr=7, 9 Aggr=3, 4, 7 Aggr=3, 7, 9 Aggr=4, 7, 9 Aggr=3, 4, 7, 9,16,16.6,14,14,12,12 PLoss,1,8,6 PLoss,1,8,6 Cost [W].5,4,4.4,2,2.3 Nodes Nodes.2 PLoss,2,18,16,14,12,1,8,6,4,2 Nodes PLoss,2,18,16,14,12,1,8,6,4,2 Nodes.1 1 MAX α j Energy cost depending on aggregation function value and aggregator nodes positioning 9

10 Some slippery arguments and some remarks about layer integration 1. Energy is consumed not only through transmission, but through processing as well (so, for example, minimum energy routing subject to throughput constraints only can lead to select a multi-hop low-transmit transmit-power route that might be not the best from the viewpoint of the overall processing energy dissipated in too many nodes) 2. Modeling the optimization problem treating energy as a cost function and treating it as a hard constraint are two different things (the former f is appropriate in personal nomadic communications, where we may want t the batteries deliver as much functionality as possible before they are recharged or replaced, the latter is appropriate in sensor networks where the energy is not renewable at all) 3. In finite-energy energy cases, the relative importance of performance objectives being selected can be definitely argued (which strategy should be preferred between one that privileges throughput and another that privileges es network longevity?) 1. So far research efforts have mainly targeted isolated strategies,, thereby ignoring layer interdependencies, which actually exist at conceptual level and sometimes lead to antagonistic effects. 2. Example 1. The most efficient routing protocol in an ad hoc network may suggest to use a temporarily centrally-located located node to forward packets to other nodes. However, the battery of that node will be quickly exhausted. e 3. Example 2. According to the Shannon theory (the energy required to communicate one bit of information decrease as the bit time increases) energy can be conserved by transmitting a bit over a longer period of time. However, this will clearly impact the MAC protocol efficiency. 4. As a general indication, to support an adaptive cross-layer design, information should be exchanged across all layers in the protocol l stack and all strategies should be jointly optimized with respect to the energy e constraints of the global system. Nevertheless 1. the different timescales of the variations that may affect each layer should be considered anyway. 2. Example.. Variations in wireless link SINR are typically very fast (order r of microseconds), in network topology are slower (order of seconds),, in user traffic are even slower (order of tens to hundreds of seconds). So, by the time the information about weak link connectivity is relayed to a higher layer of the protocol stack (i.e., the network layer for rerouting or the application layer for reduced-rate rate compression), the link SINR will most likely have changed again. 3. Therefore, as a further indication, each layer should attempt to compensate for variation at that layer first. If the local adaptation is insufficient, the performance metrics at the next layer of the protocol stack will degrade as a result. Adaptation at this next layer will then try to mitigate the problem that could not be fixed through local adaptation, and so forth. Conclusions Energy efficient communication is a multi-faceted problem Focusing on only one aspect of the problem, or optimizing a single element of the protocol stack, can lead to sub-optimal performance with respect to maximizing node and battery lifetime It is necessary to find an appropriate tradeoff between the various approaches when applied to the same network to obtain good performance for every context Much work is still needed to understand how the various intra-layer mechanisms can effectively interact in a cross-layer approach 4. The OSI original sin still makes a sense! 1

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Wireless Sensor Network: Improving the Network Energy Consumption

Wireless Sensor Network: Improving the Network Energy Consumption Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that

More information

Wireless Sensor Networks Chapter 3: Network architecture

Wireless Sensor Networks Chapter 3: Network architecture Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Mac Protocols for Wireless Sensor Networks

Mac Protocols for Wireless Sensor Networks Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). 2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK By: Peter Croy, Sr. Network Architect, Aviat Networks INTRODUCTION LTE mobile broadband technology is now being launched across the world with more than 140 service providers committed to implement it

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA)

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA) ACM MOBILE NETWORK AND APPLICATIONS Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA) Bharat Bhargava, Xiaoxin Wu, Yi Lu, and Weichao Wang Abstract A mobile

More information

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

Survey on different attacks in Wireless Sensor Networks and their prevention system

Survey on different attacks in Wireless Sensor Networks and their prevention system Survey on different attacks in Wireless Sensor Networks and their prevention system Ruchita Dhulkar, Ajit Pokharkar, Mrs. Rohini Pise 1 BE IT, Department of Information Technology, PCCOE, Maharashtra,

More information

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan 1 and Leslie C. Milton 2 1 Jackson State University, 1400 John Lynch

More information

Defining the Smart Grid WAN

Defining the Smart Grid WAN Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

Recent advances in microelectromechanical

Recent advances in microelectromechanical COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur

More information

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

THE development of media access control (MAC) protocols

THE development of media access control (MAC) protocols 710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Technologies Supporting Smart Meter Networks

Technologies Supporting Smart Meter Networks Technologies Supporting Smart Meter Networks Isamu Kitagawa Shinichi Sekiguchi The power crisis that Japan confronted in the wake of the Great East Japan Earthquake in 2011 underscored the need for managing

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Wireless Sensor Network Performance Monitoring

Wireless Sensor Network Performance Monitoring Wireless Sensor Network Performance Monitoring Yaqoob J. Al-raisi & David J. Parish High Speed Networks Group Loughborough University MSN Coseners 12-13th 13th July 2007 Overview The problem we are trying

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

Energy Efficiency of Wireless Sensor Networks

Energy Efficiency of Wireless Sensor Networks Microwave & RF, Olivier Berder, 20/03/14 1 / 23 Energy Efficiency of Wireless Sensor Networks O. BERDER, M. GAUTIER, O. SENTIEYS, A. CARER ENSSAT, Université de Rennes1 INRIA/IRISA EPC CAIRN March 20,

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

WIRELESS communication channels have the characteristic

WIRELESS communication channels have the characteristic 512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,

More information