Analytical Approach for Performance of Wireless Sensor Networks
|
|
- Brian Sullivan
- 7 years ago
- Views:
Transcription
1 International Journal of Electronics and Computer Science Engineering 1877 Available Online at ISSN Analytical Approach for Performance of Wireless Sensor Networks Prof. Satish K Shah 1, Ms Sonal J. Rane 2, Ms Dharmishtha D. Vishwakarma 3 1,2,3 Department of Electrical Engineering Faculty of Tech. & Engg., M.S.Univeristy of Baroda, Vadodara, Gujarat, India Satishkshah_2005@yahoo.com 1,sonu4sona@yahoo.com 2,a1dharmu@yahoo.co.in 3 Abstract- Wireless Sensor Networks (WSN) have been noticed and researched in recent years. WSNs have inherent and unique characteristics compared with traditional networks. It consists of light-weight, low power and small size sensor nodes (SNs). They have ability to monitor, calculate and communicate wirelessly. Sensor nodes should send their collected data to a determined node called Sink. The sink processes data and performs appropriate actions. Nodes using routing protocol determine a path for sending data to sink. Sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks have to ensure reliable multi-hop communication under these conditions. In this paper, we provide an accurate simulation model with respect to the specifications of IEEE standard. We simulated and analyzed two different scenarios, where we examined the topological features and performance of the IEEE standard using OPNET simulator. We compared the two possible topologies (Mesh and Tree) to each other. The comparative results have been reported for the performance metrics like: Number of hopes, End to End Delay and Load of network. Keywords Wireless Sensor Network, OPNET, Number of hopes, Load, Routing Protocols I. INTRODUCTION Wireless Sensor Networks (WSNs)[1,2] are expected to be the nerve system of our future network world, sensing, processing and transmitting useful and timely information to be used in some monitoring and actuating capabilities. In all these activities, communication plays a central role. Recently IEEE approved [3] standard defining the Medium Access Control sub layer (MAC) and the physical layer (PHY) for low-rate, Wireless Personal Area Networks (LR-WPAN). IEEE devices typically operate in limited personal operating space. The objective of this paper is to analyze the performance of various network topologies of IEEE WPAN. The novelty of the work resides in the evaluation of key performance parameters that can be influenced by the topology. The performance has been analyzed through extensive simulations to capture the behavior of some key performance parameters. These investigations are usable to configure IEEE WPAN [4] to select a suitable topology. The organization of the paper is as follows: Section 1 gives brief introduction of WSN and objectives of this paper. Section 2 and 3 constitute the description of Routing Protocols, IEEE Protocol Standard. Section 4 constitutes system description. Section 5 shows the results and discussions derived from the simulation carried out on different topological scenarios of WSN using OPNET. Finally Section 6 concludes the paper.
2 1878 II. ROUTING PROTOCOLS Routing protocols [5] in WSNs vary depending on the application and network architecture. Used sensors are small, inexpensive, intelligent, and disposable, they can be deployed in large numbers in areas where there is no human access, disaster areas, battlefields etc. Sensor networks have high requirements on the routing protocol due to the high node density and the limited hardware resources. Scalability represents an important issue in WSNs since the nodes have to solve the problem of routing table explosion [6]. Beside the problem of scalability, routing protocols have to deal with a large number of other challenges which arise from the characteristics of WSNs. The topology of the network changes frequently which represents a challenging problem for the routing protocol design since the sensor nodes are also very limited in their computational power and memory. Moreover, the available bandwidth of the low-power transceivers and the high node density of WSNs have to be taken into account when designing a routing protocol. Wireless sensor networks are formed by small devices communicating over wireless links without using a fixed networked infrastructure. Because of limited transmission range, communication between any two devices requires collaborating intermediate forwarding network nodes, i.e. devices act as routers and end systems at the same time. Communication between any two nodes may be trivially based on simply flooding the entire network. However, more elaborate routing algorithms are essential for the applicability of such wireless networks, since energy has to be conserved in low powered devices and wireless communication always leads to increased energy consumption. Even through, there are many routing protocols for WSN, there is still a great need for new protocols that can prolong the lifetime of the network and can be easily implemented in the nodes using the currently technology, and also can be used for networks with different size. WSN routing protocols based on a network structure can be classified as flat and hierarchical protocols. Flat routing protocols distribute information as needed to any router that can be reached or receive information. No effort is made to organize the network or its traffic, only to discover the best route hop by hop to a destination by any path. Hierarchical routing protocols often group together by function into a hierarchy. A hierarchical protocol allows an administrator to make best use of his fast powerful routers as backbone routers, and the slower, lower powered routers may be used for access purposes. Flat protocols are more effective for using than hierarchical WSN protocols, due to the fact that they are scalable and simple Scalability of flat protocols is because each node participates equally in routing tasks, and that the node requires only information about its neighbors. The simplicity is because flat routing networks provide simple routing, without much overhead, and no need for complex algorithms. The primary goal of routing protocols which are designed for WSNs is to maintain energy efficient and reliable paths between different nodes in the network without generating a lot of overhead. Note that sustaining a route from a source to a destination may consume more bandwidth than is required to support the data traffic flow. In order to optimize the communication, it is important to know the characteristics of the traffic in advance. III. IEEE STANDARD The IEEE [7] Full Function Devices (FFD) has three different operation modes: The Personal Area Network (PAN) Coordinator: the principal controller of the PAN. This device identifies its own network as well as its configurations, to which other devices may be associated. This device is referred to as the Coordinator (C). The Coordinator: provides synchronization services through the transmission of beacons. This device should be associated to a PAN Coordinator and does not create its own network. This device is referred to as the Router (R). The End Device: a device which does not implement the previous functionalities and should associate with a C or R before interacting with the network. This device is referred to as the End Device (ED).
3 IV. SYSTEM DESCRIPTION IEEE [8] supports three types of topologies: Star, Mesh and Tree that can be considered as a special case of Mesh topology. A. Creating a Tree Topology To create a tree topology in a single personal area network (PAN), place one coordinator node and the desired number of router and end devices in the workspace. With the default attribute settings, each router can accommodate about two end devices. On each device, set the Network Parameters attribute to Default Tree Network. If you want greater control over the characteristics of the tree topology (such as the number of children, routers, or depth) expand the Network Parameters to specify these parameters. B. Creating a Mesh T opology To create a mesh topology in a single PAN, place one coordinator node and the desired number of end devices in the workspace. On each device, confirm that the Network Parameters attribute is set to Default Mesh Network. In this section, the WSN networks performances are evaluated and analyzed using OPNET simulation. The OPNET is used for developing its sophisticated graphical user interface. This version of simulation model supports point to point, star, ring, mesh and cluster topologies where communication is established between devices, called inside the model end devices and a single central controller called PAN coordinator. Each device operating in the network has a unique IP address. V. SIMULATIONSETUP AND RESULTS Many Performance metrics can be considered for the performance evaluation for the routing protocol of the wireless sensor network some of the performance metrics that considered in this paper are as follows. Number of hopes: The number of hops is the number of times a packet travels from the source through the intermediate nodes to reach the destination. End to End Delay (ETE): This statistics represents the total delay occurs for the transmitted packet from source to the destination. Throughput: Throughput is the average number of bits or packets successfully received or transmitted by the receiver or transmitter channel per second. Load per PAN: This statistics represents the total load (in bits/sec) for a particular PAN submitted to MAC by all higher layers in all WPAN nodes of the network. PAN Affiliation for Coordinator: This represents time that the node joins a network. C. SCENARIO 1 Tree Routing and Mesh Routing networks are designed and both are identical networks only difference is to configure PAN of Tree Routing with Default tree Network and PAN in Mesh Routing with Default Mesh Network. The same network tree structure forms in each case. The majority of the nodes have been configured with Random traffic; however Router 1 has been explicitly configured to send traffic to Router 3. The PAN in the Tree Routing scenario has been configured as a Default Tree Network. Application traffic will be routed to the destination along the parent-child links of the network tree. The PAN in the Mesh Routing scenario has been configured as a Default Mesh Network. After mesh routes have been established (a few seconds after network formation), application traffic will be routed through the shortest possible route using any of the router or coordinator presents in the network. End devices do not participate in mesh routing, therefore they must still route traffic through their parent node.
4 1880 Figure 1 shows that the number of hops taken by Router 1to reaches its destination. This statistic for Tree Routing is of red line and for Mesh Routing is of blue line. Note that both lines begin at two hops, but the Mesh Routing line quickly changes to one hop for the remainder of the simulation. In Figure 2, the red line indicates ETE Delay for the Tree Routing scenario while the blue line indicates ETE Delay for Mesh Routing. The ETE Delay for Mesh Routing is lower due to the mesh routing process finding more efficient routes than tree based routing for some of the traffic. For some nodes, the tree based route will be the most efficient route, resulting in only a minor overall improvement in ETE Delay. Figure 1. Figure 1 Number of Hopes (Tree, Mesh) Figure 2. Figure 2 End to end delay In Figure 3 the red line indicates ETE Delay for Router 1 in the Tree Routing scenario while the blue line indicates ETE Delay for Router 1 in Mesh Routing. The ETE Delay in Mesh Routing is lower due to the mesh routing process finding more efficient route than tree based routing (1 hop vs. 2 hops). The red line in Figure 4 is the total load for the Tree Routing scenario while the blue line is total load for Mesh Routing. The load for Mesh Routing is lower due to fewer hops for application traffic resulting in less overall traffic seen at the MAC layer. Also note that is a very small spike in load for Mesh Routing near the beginning of the simulation that is not seen for Tree Routing. This is due to the routing messages being broadcast at that time. Figure 3. End to end delay for Router 1 Figure 4. Load per PAN
5 Figure 5 shows the throughput for the tree and mesh topologies respectively. It shows that the maximum throughput is achieved in Tree topology and Mesh topology has the low throughput. The reason for this is because Tree topology is communicating on the basis of the PAN coordinators and R which are more efficient as compared to the end devices. Also in Tree topology total load of the network is divided among the local PAN and Rs as a result of which lesser collisions and lesser packet drops takes place as a result of which the throughput is maximum in case of Tree topology. Figure 5. Throughput Figure 6(a) and 6(b) shows the tree structure and mesh route from Router 1. The tree structure in this scenario is identical to the previous one. Also note that the tree path from Router 1 to Router 3 passes through the Coordinator. In Mesh Network, the mesh route goes directly to Router 3. Figure 6. Tree structure Figure 7. Mesh Route
6 1882 D. SCENARIO I1 This Figure 7 scenario studies the behavior of a network when the coordinator fails. The network contains two coordinators and 24 routers and end devices. Each router and end device in the scenario has its PAN ID set to Auto- Assigned. The coordinators have their PAN ID's set to 1 and 2 respectively. A portion of the remaining nodes should join each of the two coordinators (any given node may join either coordinator). Figure 8. Snapshot of the Network when Coordinator Fails Two minutes into the simulation, the first coordinator fails. It will remain failed until four minutes, when it will recover and re-establish a network. At eight minutes, the second coordinator will fail. It will remain failed until ten minutes. The expected behavior is approximately half the nodes to join each of the two coordinators at initialization. When the first coordinator fails, the nodes joined to that PAN should leave and join the second coordinator. When the second coordinator fails, all the nodes should join the first coordinator. Figure 8 shows Global MAC load for PAN. The blue line in figure 7 is the first coordinator (PAN 1) while the red is the second coordinator (PAN 2). Initially, both PANs have more or less equivalent loads (PAN 1's is greater due to a few more nodes joining that network). After 2 minutes, PAN 1's load drops to zero while PAN 2's load increases. Note that these numbers remain constant even after the first coordinator recovers at 4 minutes. When the second coordinator fails after eight minutes, PAN1's load increases and PAN 2's falls to zero at that time. Figure 9 shows the PAN affiliation for coordinator and coordinator_0 in the network. From these two graphs you can see that during the their failed periods the coordinators have a PAN ID of -1, which is the code indicating they are not currently joined to the network.
7 Figure 9. Load per PAN Figure 10. PAN Affiliation Figure 10 shows the global Output report derived from the simulation. From the Number of Nodes column in the three tables presented here, we can see that initially 15 nodes are joined to PAN 1 while 11 are joined to PAN 2 (roughly half each, with an acceptable variation due to randomness). After the first failure, 25 nodes are joined to PAN 2 while only one (the coordinator itself) is joined to PAN 1. After the second failure, the reverse is true. Figure 11. Global Output Report at simulation time 360, 60,720 VI.CONCLUSION This project focuses set of simulation experiments performed in OPNET simulator. To examine topological features of WSNs, simulation and investigation of two scenarios is taken. In first scenario, comparison of the two possible topologies (Mesh and Tree) to each other and the statistics for end-to-end delay, number of hops and global throughput, load is considered. In the second scenario, the Tree topology with two coordinators is carried out and observed situation when one coordinator fails for some time period where considered statistics are load, pan affiliation and output report. The fifteen nodes (one C, six Rs and eight EDs) in each topology were identical. From the simulation results we can conclude that the end-to-end delay and load of the Tree topology is higher compared to mesh topology. The throughput is high in the Tree topology, and low in a Mesh topology. In the second part of the simulation study, the Tree topology with two coordinator scenario is examined and observed the situation when one coordinator fails for
8 1884 some time period. The expected behavior is approximately half the nodes to join each of the two coordinators at initialization. When the first coordinator fails, the nodes joined to that PAN should leave and join the second coordinator. When the second coordinator fails, all the nodes should join the first coordinator. Our future work will be associated with the study of energy efficiency and reliability of all these topologies separately, i.e. emphasis will be placed on developing protocols that would continue the battery life, as well as access to the source code of the network and the application layers. VII. REFERENCE [1] Akyildiz, I. F., Su, Sankarasubramaniam, W. Y. and Cayirci, E. Wireless sensor networks: A survey, Computer Networks (Elsevier), vol. 38, pp ,2002. [2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, vol. 40, pp , August [3] Jurcik, P.; Koubaa, A.; Alves, M.; Tovar, E.; Hanzalek, Z.; A Simulation Model for the IEEE protocol: Delay/Throughput Evaluation of GTS Mechanism, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS '07. 15th International Symposium, Oct [4] IEEE OPNET Simulation Model, [5] Kemal Akkaya and Mohamed Younis. A survey on routing protocols for wireless sensor networks. Ad hoc [6] Networks, 3(3): , May [7] Al-Karaki, J. N. and Kamal, A. E. Routing techniques in Wireless Sensor Networks: A survey, Department of Electrical and Computer Engineering Iowa State University, Ames, Iowa [8] Francesca Cuomo; Emanuele Cipollone; Anna Abbagnale; Performance analysis of IEEE wireless sensor networks: An insight into the topology formation process, Comput. Netw. (2009). Doi: /j.commet [9] Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE SA Standards Board Std , 2006.
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationImprovisation of The Quality Of Service In ZigBee Cluster Tree Network
Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Trupti Satavse, Vijyalaxmi Kadrolli Information Technology Terna College of Engineering Nerul, Navi-Mumbai, India Trupti1814@gmail.com
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationDesign and Performance Analysis of Building Monitoring System with Wireless Sensor Networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University
More informationSPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
More informationAn Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationComparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationDynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network
Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and
More informationEnergy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
More informationA Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV
More informationAnalysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationLoad Balanced Data Transmission within the Probabilistic Wireless Sensor Network
Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Jyoti P.Desai 1, Prof Abhijit Patil 2 1 Student, ME Computer Engineering, Yadavrao Tasgaonkar college of Engineering and
More informationMac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents
More information1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
More informationSimulation Based Analysis of VOIP over MANET
Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationSpring 2014. Final Project Report
ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan tlan@sfu.ca
More informationControl overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering
More informationSecurity Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr
More informationPerformance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationInternational Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationAchieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationWBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
More informationA Novel Technique for Clock Synchronization to Increase Network Lifetime in WSN
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique for Clock Synchronization to Increase Network Lifetime in WSN
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationCongestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
More informationISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationAn Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationA Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
More informationOSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).
OSPF Version 2 (RFC 2328) Interior gateway protocol (IGP). Routers maintain link-state database. Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs). Router
More informationMAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
More informationProtocol Design for Neighbor Discovery in AD-HOC Network
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationKeywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationPerformance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications
Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationModeling of Corporate Network Performance and Smoothing Spline Interpolation
American Journal of Signal Processing 2014, 4(2): 60-64 DOI: 10.5923/j.ajsp.20140402.03 Modeling of Corporate Network Performance and Smoothing Spline Interpolation Ali Danladi 1,*, Silas N. Edwin 2 1
More informationA REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA ssharma5@ncsu.edu Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationLink-State Routing Protocols
Link-State Routing Protocols Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Link-state routing protocol Single-area OSPF concepts Single-area OSPF
More informationHybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
More informationConsecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationBandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
More informationA Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
More informationA Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy
More informationImplementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
More informationDisjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationComparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL
R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE
More informationISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationThe necessity of multicast for IPTV streaming
The necessity of multicast for IPTV streaming ARIANIT MARAJ, ADRIAN SHEHU Telecommunication Department Faculty of Information Technology, Polytechnic University of Tirana Tirana, Republic of Albania arianit.maraj@ptkonline.com,
More informationStep by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
More informationLBN: Load-balancing Network for Data Gathering Wireless Sensor Networks
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China
More informationUNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationA Non-beaconing ZigBee Network Implementation and Performance Study
A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: magnus.armholt@tut.fi Sakari Junnila Email: sakari.junnila@tut.fi Irek Defee Email: irek.defee@tut.fi Abstract
More informationSimulation of Heuristic Usage for Load Balancing In Routing Efficiency
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor normusliza@kuis.edu.my Abstract.
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationOpnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationCollege 5, Routing, Internet. Host A. Host B. The Network Layer: functions
CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More informationA Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationSELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
More informationRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks Chaitanya Mankar 1, Vidhya Dhamdhere 2 1 MECN, G. H. Raisoni College of Engineering and Management (GHRCEM), India 2 Faculty, Computer Department, G.H.Raisoni
More informationSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks Anass RGHIOUI Laboratory of Informatics, Systems and Telecommunications Faculty of Science and Technology of Tangier Abdelmalek
More information