A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways
|
|
|
- Ethelbert Holland
- 9 years ago
- Views:
Transcription
1 ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho, youngko}@ajou.ac.kr bstract. We propose a novel algorithm for topology control, named ynamically onfigurable Topology ontrol (T), in hybrid ad hoc networking environments interconnected to the Internet. Unlike the existing topology control protocols for stand-alone ad hoc networks, the proposed T focuses on hybrid multi-hop wireless networking environments with the Internet gateways. That is, with our T scheme, the optimal network topology for mobile users having Internet traffic can be created and maintained. lso, T can control the network sparseness dynamically based on the principle of maintaining the optimal number of neighbors of each node. Finally, we study the performance of T via simulations, varying the network density and node dispersion patterns. Our simulation results show that T achieves the improvement of the network connectivity and capacity. 1 Introduction The efficiency of a communication network is dependent upon not only its control protocols, but also its topology. Therefore, one of the major research concerns in multi-hop wireless networks that received a lot of attention recently is the problem of topology control [1][2][3]. Since energy efficiency and network capacity are the two most critical issues in wireless ad hoc networks, most existing algorithms for topology control are based on the multiple objectives which are maintaining network connectivity and reducing energy consumption as well as improving network capacity. That is, the main feature of existing topology control protocols is to allow a node to control its transmission power so that nodes in wireless multi-hop networks can collaboratively form their optimal topology under certain factors such as energy, delay, traffic, and so on. Typical examples of hybrid ad hoc networks, like wireless mesh networks and wireless sensor networks, have a special type of nodes which has the gateway and the bridging functions (e.g., mesh routers in wireless mesh networks and sink nodes in This work was in part supported by the MI(Ministry of Information and ommunication), Korea, under the ITR(Information Technology Research enter) program supervised by the IIT(Institute of Information Technology dvancement) (IIT-2006-( )), and by the grant No. R from the asic Research Program of the Korea Science & Engineering Foundation.
2 wireless sensor networks). It is however worthwhile to note that many topology control protocols presented for these networks do not consider the existence of such a special node, even though the performance of these topology control protocols can heavily be dependent upon the traffic patterns. Note that most of the traffic in such hybrid ad hoc networks is forwarded to the Internet gateway node. Therefore, we believe that it would be beneficial to consider this unique characteristic of traffic flow when designing topology control protocols. In this paper, we tackle the topology control problem for hybrid multi-hop networking environments with the goal of generating a topology in which the path toward the Internet gateway node is optimized, resulting in the increase of network capacity. Of course, for the proposed topology control protocol, we consider not only the external traffic to the Internet gateway node but also the internal traffic among normal nodes. When considering the internal traffic, network sparseness would be one of the important factors. s stated earlier, most of the existing topology control protocols seem to require a proper adjustment of nodes transmission power to control network sparseness. This leads to the latency versus energy efficiency tradeoffs. Table 1 represents some favorable features with a low power transmission (i.e., when nodes transmit at the lowest possible power that guarantees connectivity), and a high power transmission (i.e., when nodes transmit at the highest possible power). s seen from the table, it is clear that a higher power transmission can reduce latency, at the penalty of increasing the possibility of interference with neighboring nodes. Therefore, we need to take an approach that can control transmission power dynamically corresponding to the requirements of network applications. Table 1. Favorable Factors of Low and High Transmission Power Favorable Factors Low Power Network lifetime Interference Throughput Packets loss rate High Power Network connectivity verage number of hops towards destination End-to-end latency In this paper, we propose a novel algorithm for topology control, named ynamically onfigurable Topology ontrol (T), for hybrid ad hoc networking environments interconnected to the Internet. Unlike the existing topology control protocols for stand-alone ad hoc networks, the proposed T focuses on hybrid multi-hop wireless networking environments with the Internet gateway nodes. That is, with our T scheme, the optimal network topology for mobile users having Internet traffic can be created and maintained. lso, T can also control the network sparseness dynamically based on the principle of maintaining the number of neighbors of every node. The rest of the paper is organized as follows. Section 2 presents related work regarding topology control in ad hoc networks. In Section 3 explains more details on the T scheme. Section 4 deals with the performance evaluation and finally in Section 5 we provide a conclusion.
3 2 Related Work s discussed in the previous section, satisfying connectivity constraints and energy efficiency are critical factors in topology control protocol. Most of the researchers regard the Minimum Spanning Tree (MST) as the best topology satisfying these two objectives. However, MST is impractical because it needs global information. The Localized MST (LMST) builds an approximation of the MST in a localized way [4]. It needs location information. The one ased Topology ontrol protocol (T) is introduced in [5]. The basic idea of the T is that a node u transmits with the minimum power P up, such that there is at least one neighbor in every cone of angle p centered at u. This protocol produces a connected communication graph if p <= 2π /3. However, the drawback of T is that it requires directional information which might not always be available. ontrary to the protocols described above, the proposed scheme in this paper does not need any additional information such as location information, directional information, and even global information. In addition, compared with the T, the proposed scheme generates optimal topology considering only the path to the Internet gateway node. T also considers directional traffic but it is for every path at each direction. ccording to the classification in [6], there is one class of topology control protocols based on the k-neighbors graph, i.e. the graph in which every node is connected to its k closest neighbors. n example of neighbor-based topology control protocol is the Local Information No Topology (LINT) protocol [1]. The basic idea of LINT is to try to keep the number of neighbors of every node within a low and high threshold centered around an optimal value. Its drawback is that the estimation of the number of neighbors might be inaccurate because silent neighbors are not detected. So the connectivity is not guaranteed. The most widely studied topology control in the literature is the K-Neigh protocol introduced in [7]. This protocol maintains the number of physical neighbors equal to (or slightly below) K. K is chosen in such a way that the graph generated is connected with high probability. This protocol produces symmetric topology and is more energy-efficient than T but it does not ensure the connectivity all the time due to probability-based algorithm. These two protocols are the closest to our work. Similarly to these protocols, the proposed scheme is neighbor-based protocol. It can control the network sparseness dynamically based on the principle of maintaining the number of neighbors of every node slightly equal to a specific value which depends on the network loads. However, contrary to these protocols, the proposed T scheme considers not only who my neighbors are but also where the Internet gateway node is. Fig. 1 presents two different topology snapshots derived from MST and K-Neigh protocol. In section 4, we will show the snapshots derived from the proposed scheme.
4 Fig. 1. Topologies derived from MST and the K-Neigh 3 ynamically onfigurable Topology ontrol (T) Scheme In this section, we describe our proposed topology control scheme. First, a gateway node periodically broadcasts a special type of control message, called an nnounce Message (). period of issuing this control message can be dynamically changed, based on the degree of network mobility. That is, would be issued more often when nodes mobility is relatively high, whereas it would be generated less frequently when nodes mobility is relatively low. This control message includes several parameters, such as gateway I, a sequence number, forwarding node I, and the maximum number of neighbors allowed for each node (denoted by K). The value of K represents the degree of density, meaning that the network becomes denser as K becomes larger. ny nodes receiving are required to forward the with a special flooding method, called a istance-based Flooding. This flooding method for client nodes is described below: istance-based Flooding: To forward the in order of shortest to longest distance from the Internet gateway node, a node uses holding time denoted by HT. The node sets its own HT whenever a node receives the from others. fter the HT, it sends its own. So every node sends its in ascending order of distance from the Internet gateway node. Every node estimates its HT using the following equation. (HT MX means the maximum time duration for which a node can hold a receiving without forwarding it to its neighbors. d uv means the estimated distance from receiver node u to sender node v derived from distance estimation techniques [8][9]. R MX means the maximum transmission range): d HT u = HTMX R uv MX (1)
5 y performing this flooding, every node collects these control messages from their one-hop neighbors. From these messages, any nodes receiving construct additional data structures such as Pre-gradient, Post-gradient and Topology ontrol Table. Topology ontrol Table consists of two fields: forwarding node I and the estimated distance of receiving. The number of records in this table is K. When each node receives the s from its one-hop neighbors, it saves the information of forwarding node I and the estimated distance into this table in ascending order according to the estimated distance. Pre-gradient is defined as the estimated distance from a node to the forwarding node of the that is received right before sending its own. Postgradient is the estimated distance to the forwarding node of that is received right after sending its own. These two variables support the optimal path to the Internet gateway node as well as the full network connectivity. Finally, each node selects an optimal transmission power for its transmission power to ensure the best path to the Internet gateway node, and that will generate the required network sparseness. The optimal transmission power is the maximum value among three values which are Pre-gradient, Post-gradient, and the maximum distance in Topology ontrol Table. Then, each node calculates the optimal transmission power based on the optimal transmission range denoted by d. Transmission power estimation is described below. Transmission Power Estimation. computation of transmission power based on the estimated distance is done by utilizing the two-ray ground reflection model [10] that is designed to predict the mean signal strength for an arbitrary transmitterreceiver separation distance. ssuming that there are two nodes u and v, node u estimates the received signal strength P r (d uv ) of the neighbor node v at distance d, using the following equation [11]: W 2 2 P r ( duv ) = 10 log( ) + 10 log( t r H t H r ) 40 log( d mw uv ) (2) In the above equation (2), t is a transmitter antenna gain, r is a receiver antenna gain, H t is the transmitter antenna height, H r is the receiver antenna height and finally d uv is the estimated distance. Now, using equation (3) below, node u can estimate the minimum power P min required to successfully communicate with its one-hop neighbor (node v). P ( d ) = P ( d ) + 20 log( d ) (3) min uv r uv uv
6 1 1 : nnounce Message HT =0.1 HT : Holding Time HT =0.2 (a) Initial Topology (b) at T 0 Pre : Pre radient Pre =1 HT =0.1 Post : Post radient Pre =1 Post =1 HT =0.3 Pre =1 HT =0.2 (c) at T 0 +HT (d) at T 0 +HT +HT Pre =1 Post =1 Pre =1 Post =2 Pre =2 HT =0.3 Pre =1 Post =1 Pre =3 Pre =1 Post =2 Pre =2 Post =3 (e) at T 0 +HT +HT +HT (f) at T 0 +HT +HT +HT +HT {:1} {:1} {:1} {:2} {:2} {forwarding node I: {:3} estimated distance} (g) Topology ontrol Table {:3} {:3} 1 d opt =1 1 d d opt =3 opt =2 2 3 d opt =3 (h) Final Topology Fig. 2. The Sample Flow of T with K = 2 Fig. 2 shows the sample flow of T. Fig. 2(a) presents the initial topology. There are five nodes: one gateway and four clients. Each node has its unique I such as,,, and. The number on the line specifies the estimated distance between two nodes. s shown in Fig. 2(b), at time T 0, the Internet gateway node sends the first with a full transmission power. Then, s one-hop neighbors, nodes and, may receive this and calculate their HT according to equation (1). Note that, for simplicity, R MX is assumed as 10 and the K is equal to 2. In the next step (Fig. 2(c)), at time T 0 +HT, node sets its Pre-gradient value to 1 and forwards the with full transmission power. Since the initial HT of node (i.e based on the received from the gateway) is high, it receives the from node before forwarding its own
7 packet. Therefore, node re-computes its HT according to the last packet as shown in Fig. 2(c). It then sets its Pre-gradient value to 1 and forwards the at time T 0 +HT +HT, which is received by nodes, and as shown in Fig. 2(d). Further, nodes and node compute their HT, where as node set its Post-gradient value, since it is the first received after sending its own. Similarly, in Fig. 2(e) and Fig. 2(f), we show that nodes and also set its Pre-gradient and Postgradient values based on the received packets. In Fig. 2(g), we show the topology control table of all nodes. Note that only two neighbors are selected according to the order of received packets. Each node sets its transmission range according to the maximum value among Pre-gradient, Postgradient and the maximum distance in the Topology ontrol Table. Thus, in our example Fig. 2(h), nodes,, and will set its optimal transmission range to 1, 2, 3 and 3 respectively. 4 Performance Evaluation Using the simulator ns-2, we has implemented three schemes: the proposed T scheme, K-Neigh protocol, and the pure flooding algorithm without transmission power control. The flooding algorithm runs on each node forwarding data to its onehop neighbors with a default transmission power level (e.g., 24.5dM in the current ns-2 codes). One node has been selected as the Internet gateway node and another one as a source. K-Neigh on the other hand employs a transmission power reduction and increase based on the number of neighbor nodes. From now on, we explain the simulation scenarios and present our preliminary results. Some information about the parameters is listed in Table. 2. Table 2. Parameters and their default values in ns-2 Parameters Meaning efault value t Transmitter antenna gain 1.0 r Receiver antenna gain 1.0 H t Transmitter antenna height 1.5m H r Receiver antenna height 1.5m 4.1 Simulation Environment In our simulation model, nodes are randomly placed in a network space of 1000x1000m 2. For increasing a node density in the network, we ran the simulations for 50, 75, 100, 125, 150, 175, 200, and 250 nodes. Following metrics have been used to evaluate our proposed scheme. Energy cost (For K-Neigh, Phase 1 is considered only.) verage path length of the topologies verage logical and physical degree of the topologies
8 T K-Neigh Pure Flooding Energy ost Number of Nodes Fig. 3. Energy cost of three topology control protocols (T, K-Neigh, and Pure Flooding) Number of verage Path Length T K-Neigh Pure Flooding Number of Nodes Fig. 4. verage path length generated by three topology control protocols 4.2 Simulation Results T can control the network sparseness according to the value of K from the Internet gateway node. Topology control protocols have to allow network administrator to control the network sparseness according to the network load due to the latency versus energy efficiency tradeoffs. In all simulation results, the value of K is 12 which is the closet value to the optimal value suggested by K-Neigh [7]. Fig. 3 shows the energy cost of different topology control protocols. gain note that, for K-Neigh algorithm, we have conducted Phase 1 only. The figure presents the fact that T may consume more transmission energy compared to K-Neigh because T considers an optimal path to the Internet gateway node. T, however, can send some traffic to the Internet gateway node with lower hop count as shown in Fig. 4. That is, Fig. 4 shows the number of hops from the source to the Internet gateway node. The number of hops means a potential network delay so that T is more favorable than K-Neigh in the view of delay aspect. Moreover, although the number of hops of K-Neigh increases as the number of nodes increase, the number of hops of T is almost fixed and similar to the pure flooding with full transmission power.
9 Number of verage Symetric Links T K-Neigh Pure Flooding Number of Nodes Number of verage symetric Links T K-Neigh Pure Flooding Number of Nodes Fig. 5. verage logical and physical degree of the topologies generated by the T, K-Neigh, and pure flooding protocols. ctually, in wireless networks, asymmetric links are very important factors to consider since it may cause potential interference and affect the network capacity. We have measured the average number of symmetric and asymmetric links of the topologies generated by the T, K-Neigh, and the pure flooding protocols, respectively. Fig. 5 represents the results of this measurement. Here, as the number of nodes increase, the number of symmetric links and asymmetric links increase as well. However, in case that the number of nodes is more than 200 nodes, the values are almost constant. 5 onclusion We have studied the effect of directional traffic to the Internet gateway node and a relationship between latency and energy efficiency tradeoffs in hybrid ad-hoc networking environments. We proposed a novel scheme, named ynamically onfigurable Topology ontrol (T) that constructs and maintains a topology considering such directional traffic toward the Internet gateway. The proposed T can control the network sparseness dynamically based on the principle of maintaining the
10 number of neighbors of every node slightly equal to a specific value which depends on the network loads. Moreover, T can make the optimal topology by considering directional traffic to the Internet gateway with heavy loads. Simulation results show that T ensures network connectivity in most of the cases and better performance than other protocols especially when considering the traffic toward the Internet gateway. possible direction for future work is to adapt T to deal with various dynamic environments. In a dynamic environment with frequently changed mobility, the topology would be continuously changing so s need to be generated dynamically. References 1. R. Ramanathan and R. Hain, Topology control of multihop wireless networks using transmit power adjustment, in IEEE INFOOM, N. Li, J.. Hou, and L. Sha, Topology control in heterogeneous wireless networks: Problems and solutions, in IEEE INFOOM, W.-Z. Song, Y. Wang, X.-Y. Li, and O. Frieder, Localized algorithms for energy efficient topology in wireless ad hoc networks, in M MobiHoc, N. Li, J.. Hou, and L. Sha, esign and analysis of an MST-based topology control algorithm, in Proc. IEEE INFOOM, San Francisco,, pr. 2003, pp L. Li, J. Y. Halpern, P. ahl, Y.-M. Wang, and R. Wattenhofer, nalysis of a cone-based distributed topology control algorithm for wireless multi-hop networks, in Proc. M Symposium on Principles of istributed omputing, Newport, Rhode Island, United States, ug. 2001, pp Paolo Santi, Topology ontrol in Wireless d Hoc and Sensor Networks, International onference on Mobile omputing and Networking, pp , lough, M. Leonicini,. Resta, P. Santi, The k-neigh Protocol for Symmetric Topology ontrol in d Hoc Networks, Proc. of 4th International Symposium on Mobile d hoc Networking and omputing (MobiHoc), June Savvides,. Han, M. Srivastava, ynamic Fine-rained Localization in d Hoc Networks of Sensors, Proc. M Mobicom 01, pp , L. irod,. Estrin, Robust Range Estimation Using coustic and Multimodal Sensing, IEEE/RSJ International onference on Intelligent Robots and Systems, Y-. Ko, S-J Lee, J- Lee, d hoc Routing with Early Unidirectionality etection and voidance, in Proc of PW, September, Kaveg Pahlavan, Prashant Krishnamurthy, Principles of Wireless Networks, Prentice Hall ommunications, 2002.
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity
Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing
Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Recent advances in microelectromechanical
COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
How To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : [email protected],
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.295 MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Mohamed Mostafa
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
Energy Efficiency of Load Balancing in MANET Routing Protocols
Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network
International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Wireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs
Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Iyad A. Kanj Ljubomir Perković Ge Xia Abstract We describe a new distributed and strictly-localized approach for constructing
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu
A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
Hosts Address Auto Configuration for Mobile Ad Hoc Networks
Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University [email protected],
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
Isolines: Energy-efficient Mapping in Sensor Networks
Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Multipath Routing with Load Balancing and QoS in Ad hoc Network
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, ugust 2010 1 Multipath Routing with Load Balancing and QoS in d hoc Network Mohamed Tekaya, Nabil Tabbane, Sami Tabbane
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
WIRELESS communication channels have the characteristic
512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
