Buffer Control by Delay Limitation for WBAN based Healthcare Monitoring Network Environment
|
|
- Darren Hutchinson
- 7 years ago
- Views:
Transcription
1 Buffer Control by Delay Limitation for WBAN based Healthcare Monitoring Network Environment Rae Hyun Kim, Jeong Gon Kim 1 1 Dept. of Electronic Engineering, Korea Polytechnic University Siheung-si, Gyeonggi-do, KOREA hjkl525@kpu.ac.kr, jgkim@kpu.ac.kr Abstract. Recently, the application of WBSN (Wireless Body Sensor Networks) has been gradually expanding due to the advanced wireless techniques and the activated ubiquitous environment. WBSN is a network environment in which various types of bio-signals created directly or indirectly in and out of the body are measured and processed for transmission to monitor by mobile tools nearby. The MAC protocol proposed in this paper is in form of TDMA based technique in CSMA/CA environment. The proposed scheme applies the maximum delay restriction to each type of data packets in order to deal with the delayed packets time very effectively. Simulation results show that the proposed scheme attains the smaller packet delay for the audio transmission which has most delay sensitive characteristic and also reduce the packet loss for the audio and video packet transmission compared with the random allocation for delayed packets. Keywords: WBAN, WBSN, Time-Slot, CSMA/CA, TDMA, Buffer, Packet 1 Introduction Figure 1. WBSN Environment Figure 1 shows the concept of WBSN environment. WBSN environment is an applied network that was advanced from WBAN environment [1], that allows communication within body based on WSN (Wireless Sensor Network) [2]. It is an environment where the condition of patient is monitored in real-time by collecting bio-signal data from the tools or node transplanted inside the body or 1 : Corresponding Author 97
2 outside of the body. In the near future, WBSN is expected to replace the existing wired environments of medical surveillance or monitoring [3]. CSMA/CA (Carrier Sensed Multiple Access/Collision Avoidance) [4], a widely known MAC protocol which is used when a number of node are transmitted at the same time, triggers extremely high consumption of energy through high frequency of idle listening and packet collision. Therefore, many researches announced the advantages of TDMA (Time Division Multiple Access) method to support low electricity consumption and the reduction in packet delay for data transmission [5] [6]. If the packets of nodes failed to be scheduled in his time slots, they move to the buffer memory to get a next available time slot for packet transmission, however, if they finally fail to transmit the data within his delay requirement, they are treated as the packet loss or failure since it is not effective as an available data packets, we compared the random scheme and the proposed MAC protocol in the initial data transmission and buffer data processing together with same delay restriction. The structure of this paper is as the following. In section 2, the system model will be explained. In section 3, proposed MAC protocol will be discussed in detail. In section 4, the performance of MAC protocols will be examined, and its features will be analyzed. Finally, in section 5, the conclusion and future research topics will be presented. 2 System Model Table 1. WBAN requirement The delay requirements proposed in this paper comply with the functional requirements of IEEE WBAN standard recommendation as shown in above Table 1 with highlighted box shape. 3 Buffer Control with Delay Restriction In this paper, the occurrence rate of each node data is assumed as different rate by considering general WBSN environment based on WBAN requirements. The delay requirements from WBAN standard are applied in the initial data transfer environment and buffer packet transfer environment, the total transmission delay consider the delay of the packet that has been transmitted in the buffer. Also, the packets that failed to send within the delay requirement of WBAN are treated as the packet loss. The proposed MAC protocol is referred to as the DPL (Decreasing of the Packet-Loss) - MAC protocol. Figure 2 shows the packet transmission processing of the buffer and also shows the principle of calculating the sum of the total delay of packet. 98
3 The proposed scheme calculates the actual packet delay of the system by referencing whether the packet transmission is successful in the buffer packet processing environment. In the initial data transmission, the proposed scheme determines that whether the data that each sink node is successfully transmitted to the coordinator. In addition, if it occurs the empty period which all the nodes do not transmit data for channel allocation, the data packets in buffer memory are transmitted by predetermined transfer principle. Processing in the red square of Fig. 2 describes the summing process of packet delay including the packet processing in the buffer. For example, when the delay of the buffer data of EMG packet reaches 250 ms, which is the maximum allowable transmission delay of the EMG packets, we can change the priority temporarily and the corresponding node is guaranteed to transmit with first priority at that time. In other words, if one packet has the last opportunity to satisfy his maximum delay requirement, it can be transmitted with the first priority than other packets are not close to the maximum delay requirement. The delay in the buffer is summed to the total data transmission delay for the finally successfully transmitted data packets. After this processing, coordinator determines whether the packet-loss of the remaining node occurs or not. If the there is no packet-loss of the remaining nodes at this time, the buffer delay of the remaining nodes is increased by onetime slot. Finally, by returning to the initial data transmission environment, it repeats the process above mentioned. If the packet-loss of the in the buffer does occur, coordinator increases the number of packet loss, and the buffer delay for this loosed packet is subtracted from the sum of total delay of packet transmission. Figure 2. Initial data transmission & Buffer data processing on the Proposed Scheme 4 Simulation Results In this paper, the WBSN network environment was configured in a Star-Topology and the length of 1 Time-Slot was defined as 10 ms. Each cycle was composed of 100 Time-Slots, and the average collected from 100 cycles was calculated. In this paper, we assumed the same full amount of data in the same period. Also, the simulation environment is composed of both medical data and non- 99
4 medical data. We only considered data transmission delay of the WBAN requirement except for the priority of each node. The occurrence rate of each data was defined as same rate (Audio 33%, Video 33%, EMG 33%). The functional assessment was executed under assumption that the total data will occupy 100% of the whole Time-Slot randomly. Table 2 describes the average packet delay performance for two schemes when the offered sum traffic is 100 % compared with available time slots as expected, the proposed scheme attains the smaller packet delay for the audio transmission which has smallest delay requirements in WBAN for real time transmission while EMG and video packets achieves the larger packet delay compared with random scheme even if they still also satisfy the WBAN delay requirements. Figure 4 describes the rate of packet-loss performance for two schemes when the offered sum traffic is 100 % compared with available time-slots, respectively. It is observed that the proposed scheme performs the reduction of the packet loss for the audio and video packet transmission compared with the random allocation for delayed packets while the packet loss rate is slightly increases for the EMG packets. Two figures explain that the proposed scheme can be effective for supporting the real time service as audio packet transmission and maintain the packet loss rate in a reasonable level of operation for mixed packet transmission with different characteristics in WBAN based healthcare monitoring network environment. Figure 3. Average Packet Delay for Random Scheme and the Proposed Scheme Figure 4. Packet-Loss Rate for Random Scheme and the Proposed Scheme 5 Conclusions In this paper, we examined the performances of MAC protocol in WBAN based sensor networks. We proposed the buffer control with delay restriction in order to minimize the packet delay and packet loss rate for supporting the QoS and real time service transmission. We considered the actual delay of the buffer packet, hence, the proposed scheme calculated the actual packet delay of the system by referencing whether the packet in the buffer is successfully transmitted or not. Performance comparison was made to packet delay and packet loss rate for random scheme and the proposed scheme with delay reduced buffer control. From simulation results, the proposed scheme improved the QoS of the overall system by minimizing the packet delay for audio packet transmission and also significantly reducing the the packet loss rate for EMG and video packet transmission in WBAN based healthcare monitoring network environment. 100
5 References 1. J.S. Choi, J.G. Kim: An Improved MAC Protocol for WBAN through proposed frame structure, International Journal of Smart Home(IJSH), Vol.8 No.2 (2014) 2. J.S. Kim, J.H. Lee and K.W. Rim: Energy Efficient Key Management Protocol in Wireless Sensor Networks, IJSIA Vol.4, No.2, Page No. 1-12, April (2010) 3. Morchon, O.G, Baldus H, Sanchez, D.S, 3-5: Resource Efficient Security for Medical Body Sensor Networks, Wearable and Implantable Body Sensor Networks, BSN International Workshop, 4pp, April (2006) 4. LAN-MAN Standards Committee of the IEEE Computer Society: Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specification, IEEE, New York, NY (1997) 5. Gopalan, SA Park J: Energy Efficient MAC Protocols for Wireless Body Area Network: Survey, International Congress on Ultra-Modern-Telecommunications and Control Systems and Workshops, pp , Oct (2010) 6. Kwon H and Lee S: Energy-efficient multi-hop transmission in Body Area Networks, IEEE PIMRC, Tokyo, pp (2009) 7. Cavallarari R, Flavia Martelli, Ramona Rosini, Chiara Buratti, Roberto Verdone: A Survey on Wireless Body Area Networks: Technologies and Design Challenges, IEEE Communications Surveys & Tutorials, Vol. 16, No3, Third Quarter (2014) 101
Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks
, pp. 205-216 http://dx.doi.org/10.14257/ijseia.2015.9.9.18 Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks Rae Hyun Kim and Jeong Gon Kim 1 Department of Electronic
More informationWBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
More informationMedium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
More informationEnhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationBodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks
BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:
More informationHalmstad University Post-Print
Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite
More informationOn the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications
On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications Falko Dressler and Noorsalwati Nordin Dept. of Computer Science, University of Paderborn, Germany Institute of Computer
More informationA Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
More informationExpress Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
More informationPerformance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
More informationPerformance Monitoring and Control in Contention- Based Wireless Sensor Networks
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,
More informationA Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073
, pp. 113-118 http://dx.doi.org/10.14257/ijsh.2015.9.6.13 A Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073 Am-Suk Oh Dept. of Media Engineering, Tongmyong University, Busan,
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
More informationWearable Computer Network Design using Dual-Role WUSB Clustering
, pp.127-134 http://dx.doi.org/10.14257/ijca.2015.8.3.15 Wearable Computer Network Design using Dual-Role WUSB Clustering Kyeong Hur and Won-Sung Sohn* Dept. of Computer Education, Gyeongin National University
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationPEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More informationWhat s so smart about Smart-hopping?
What s so smart about Smart-hopping? A closer look at some of the key technology decisions behind the IntelliVue Smart-hopping WMTS band Introduction The IntelliVue Smart-hopping WMTS band opens up a world
More informationDesign of hybrid wireless sensor network to monitor bioelectric signals focused on the study of epilepsy
Design of hybrid wireless sensor network to monitor bioelectric signals focused on the study of epilepsy Sergio Martínez 1, Mario Rivero 2, and Laura Garay 3 1 SEPI-ESCOM IPN, Av. Juan de Dios Bátiz Col.
More informationVoice Transmission over Wireless Sensor Networks
Voice Transmission over Wireless Sensor Networks Lin-Huang Chang, Chao-Chieh Chen, Tsung-Han Lee Department of Computer and Information Science, National Taichung University, Taichung, Taiwan lchang@mail.ntcu.edu.tw
More informationPerformance Evaluation of the IEEE 802.11p WAVE Communication Standard
Performance Evaluation of the IEEE 8.p WAVE Communication Standard Stephan Eichler (s.eichler@tum.de), Institute of Communication Networks, Technische Universität München Abstract In order to provide Dedicated
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationSystem Development Process based on Embedded Linux and Sensor Node
System Development Process based on Embedded Linux and Sensor Node Shin-Hyeong Choi 1* and Hyoung-Keun Park 2 1* Dept. of Control & Instrumentation Engineering, Kangwon National University, 1 Joongang-ro
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationPerformance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationAn experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationHow To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationAdaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
More informationFOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology
FOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology SHINOHARA Masahito, ITOH Masashi, IWATA Shinichiro, NISHIMURA Yasunori, ZAITSU Makoto Abstract FOMA (R) /wireless LAN dual terminals are dual-phone
More informationPerformance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationImplementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationCURRENT wireless personal communication systems are
Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network David E Vannucci & Peter J Chitamu Centre for Telecommunications Access and Services School of Electrical and Information Engineering
More informationII. IEEE802.11e EDCA OVERVIEW
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,
More informationA research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
More informationA Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationWireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
More informationA Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
More informationSeamless Handover of Streamed Video over UDP between Wireless LANs
Seamless Handover of Streamed Video over UDP between Wireless LANs Ger Cunningham, Seán Murphy, Liam Murphy Department of Computer Science University College Dublin Dublin, Ireland {ger.munningham,liam.murphy@ucd.ie,
More informationInternet of Things. Exam June 24
Internet of Things Exam June 24 Exercise 1 A personal area network (PAN) is composed of 100 motes and a PAN Coordinator. The PAN works in beacon- enabled mode. 50 motes of Type 1 are equipped with light
More informationAn Architecture for Home-Oriented IPTV Service Platform on Residential Gateway
J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.425 An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway
More informationECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
More informationPerformance analysis and simulation in wireless mesh networks
Performance analysis and simulation in wireless mesh networks Roberto Cusani, Tiziano Inzerilli, Giacomo Di Stasio University of Rome Sapienza INFOCOM Dept. Via Eudossiana 8, 84 Rome, Italy Abstract Wireless
More informationCHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
More informationEnergy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationAlgorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
More informationPERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
More informationDepiction of Body Area Network in Cloud Environment
I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5
More informationa. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
More informationHow To Solve A Network Problem In An Ipa 2.2.1 (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem
Lund University ETSN01 Advanced Telecommunication Tutorial 7 : Link layer part I Author: Antonio Franco Course Teacher: Emma Fitzgerald February 12, 2015 Contents I Before you start 3 II Exercises 3 1
More informationA Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks
A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks Min-Kim, Jong-min Kim, Hwa-sung Kim Dept. of Electronics and Communications Engineering Kwangwoon University
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationPERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: xuedonl@ifi.uio.no Ilangko Balasingham 2 2 The
More informationA Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: choiys@mobile.snu.ac.kr Illsoo Sohn Email: sohnis@mobile.snu.ac.kr Kwang Bok Lee Email: klee@snu.ac.kr Abstract
More informationAn efficient bandwidth management scheme for a hard real-time fuzzy control system based on the wireless LAN
An efficient bandwidth management scheme for a hard real-time fuzzy control system based on the wireless LAN Junghoon Lee 1, Mikyung Kang 1, Yongmoon Jin 1, Hanil Kim 2, Jinhwan Kim 3 Dept. of Computer
More informationAn Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationHow To Improve Quality Of Service For A Smart Grid Distribution Monitoring System
Quality of Service Networking for Smart Grid Distribution Monitoring Wei Sun, Xiaojing Yuan, Jianping Wang, Dong Han and Chongwei Zhang School of Electrical Engineering and Automation, Hefei University
More informationFRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS
FRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS 1 Ramya S, Research scholar, M.Tech CNE (PT), NIE, Mysore 2 Dr. Phaneendra H D, Professor, Dept. of ISE, NIE, Mysore ABSTRACT-
More informationWiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
More informationTHE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
More informationMac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents
More informationA Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
More informationPerformance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions
Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,
More informationEnhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e
Enhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e Jakub Majkowski, Ferran Casadevall Palacio Dept. of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC) C/ Jordi
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationVoice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
More informationFast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs
Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong
More informationRESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationModeling the impact of node speed on the ranging estimation with UWB body area networks
Modeling the impact of node speed on the ranging estimation with UWB body area networks Arturo Guizar, Claire Goursaud, Jean-Marie Gorce To cite this version: Arturo Guizar, Claire Goursaud, Jean-Marie
More informationSpectrum handoff reduction for cognitive radio ad hoc networks
Published Research in Conference: International Symposium on Wireless Communication Systems - ISWCS, pp. 1036-1040, 2010 Spectrum handoff reduction for cognitive radio ad hoc networks Mohamed A. Kalil,
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationPresentation and analysis of a new technology for low-power wireless sensor network
Presentation and analysis of a new technology for low-power wireless sensor network Sabri Khssibi*, Hanen Idoudi**, Adrien Van Den Bossche*, Thierry Val* and Leila Azzouz Saidane** *University of Toulouse,
More informationOPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
More informationLoad-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks
Load-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks Fatma Othman, Nizar Bouabdallah and Raouf Boutaba z INRIA, Campus universitaire de Beaulieu ; 3504 Rennes Cedex, France ( z )School
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More informationRandom Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationProfessor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto.
Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Final project proposal Guidelines have been posted
More informationProtocol Design for Neighbor Discovery in AD-HOC Network
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationSecurity and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
More informationDesigning and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
More information