Performance of ZigBee PRO Mesh Networks with Moving Nodes
|
|
|
- Junior Charles
- 10 years ago
- Views:
Transcription
1 Performance of ZigBee PRO Mesh Networks with Moving Nodes Chester Hamilton Texas A&M University Varun Sampath University of Pennsylvania July 6, 2010 Abstract Radio modules based off of the ZigBee PRO specification provide cheap and low power wireless communication, via usage of the IEEE PHY and MAC layers and a network layer mesh routing protocol. In this paper, we describe various implementation aspects of ZigBee PRO and present performance data on a ZigBee PRO mesh network for point-to-point and multi-hop transmission using XBee- PRO ZB modules. In particular, we present findings on network performance when a node is constantly moving and changing routes. We found that in the worst case where packets are transmitted immediately after the old route is no longer physically possible, extreme packet loss occurs as the network cannot perform route maintenance operations in time. With more gradual movement, however, the network operates without packet loss. 1 Introduction The ZigBee Specification provides support for developing applications and services for low power nodes in a variety of network topologies, such as mesh 1
2 or star networks. The specification adopts a layered approach similar to the Open Systems Interconnection (OSI) model. It specifies an application layer to provide services with, and a network layer for routing services amongst nodes. It also mandates that ZigBee nodes comply with the IEEE Low-Rate Wireless Personal Area Network (LR-WPAN) standard [1]. IEEE is a specification for the physical (PHY) and medium access control (MAC) layers for use in low power and low cost wireless modules. The PHY layer specifies several bands and their associated data rates for use. The modules that we shall use operate at 2.4GHz with a maximum throughput of 250kbps. The MAC layer specification discusses network association and dissociation techniques along with one-hop communication in star or pointto-point topologies. The ZigBee network layer specifies the protocol for joining and leaving networks as well as various routing techniques. In the latest standard, a new specification called ZigBee PRO was created that changed network layer operation. ZigBee PRO removed the use of cluster-tree routing and introduces source, or many-to-one, routing. Addresses are also assigned randomly instead of being based off of tree topology [4]. As the ZigBee modules we will use for testing, XBee-PRO modules, implement the PRO specification, we will focus on their specific network layer, and in particular the mesh routing implementation. The mesh routing algorithm is based off of the Ad-hoc On- Demand Distance Vector Routing Algorithm [9]. In the remainder of this introduction, we shall discuss portions of the ZigBee stack that are relevant to our problem analysis. 1.1 A Discussion of the Ad-hoc On-Demand Distance Vector Algorithm This section describes the operation of the Ad-hoc On-Demand Distance Vector algorithm (AODV) in order to facilitate the description of the ZigBee network layer (which is based on AODV). AODV employs reactive discovery mechanisms to route data through a mesh network. AODV is designed to accommodate a network consisting of all routing-capable nodes, and promises significant bandwidth and node memory savings over earlier distance vector algorithms. These claims are derived from the on-demand nature of the algorithm. This implies that each node may not necessarily know routes to all other 2
3 nodes, nor will it always participate in the discovery or failure of all routes. The only routes that are refreshed periodically are those between a node and all of its neighbors, i.e. routes one hop away. These routes are maintained via one hop broadcast messages called hello messages. The failure to receive acknowledgements from a certain number of hello messages constitutes a link failure, which will be discussed later in this section. Each node in a mesh network employing AODV contains a routing table, with entries corresponding to the different destination nodes it knows how to reach. A routing table entry is indexed by the destination address, and includes the address of the next hop in the path, the hop count to travel, a destination sequence number, a route neighbor list, and an expiration time. Should a node try to transmit data to another node that is not in its routing table, the node will attempt path discovery. Path discovery is performed by broadcasting a route request (RREQ) packet. The RREQ packet contains several fields, namely source and destination addresses, source and destination sequence numbers, a broadcast ID, and a hop count. The source address and broadcast ID together uniquely identify a RREQ packet (each node has its own broadcast ID that it increments every time it issues a RREQ packet). Once the RREQ packet arrives at a node, the node first verifies that it has not received this particular RREQ packet; if it has, it drops the packet. It then checks its own routing table to see if it knows of a valid route to the destination. A route is valid if the routing table entry s destination sequence number is larger than the one present in the RREQ packet. If the routing table does not contain such a route, the node increments the hop count field in the RREQ packet and rebroadcasts it. If a node does contain a valid route to the destination in its routing table, it unicasts a route reply (RREP) packet to the source node. Every node receiving the RREQ packet so far has kept in memory the address of the node that directly sent it the RREQ packet. This information is used to construct a reverse route back to the source for the RREP packet to follow. The RREP packet contains fields for source and destination addresses, destination sequence number, hop count, and lifetime. The source and destination fields correspond to the same source and destination fields of the RREQ packet. Each node that receives the RREP packet updates its routing table and retransmits the packet towards the source. If there is more than one node with a valid route, though, multiple RREP packets will be sent to nodes on the reverse path. To reduce bandwidth use without sacrificing quality results, a node will only retransmit a RREP packet if the destination sequence 3
4 number is greater than the one stored in its routing table (if they are equal, it will retransmit if the hop count value in the packet is lower). The source can act once it receives an RREP packet; if another comes it can update its routing table for another transmission, and the nodes along the path can always use the most updated path in their routing tables (since routing tables only store next hops, not the entire path). Meanwhile, nodes that received the RREQ packet but not the RREP packet (not part of the valid route) will timeout, erasing their reverse path memory. AODV still works in the presence of link failure. Link failure is detected locally when a node does not receive hello messages from its neighbor. If a node detects link failure, it transmits upstream a special RREP packet to all nodes part of the route neighbor list in the routing table entry (a list of all neighboring nodes that participated in this route). Nodes that wish to transmit to the node with a failed link will have to perform path discovery. AODV shows its advantages in providing functionally correct mesh networking without high control overhead. Due to the heavy use of destination sequence numbers, routes are always loop-free (a looped RREQ packet would drop because of a lower number) and use the latest available path information. AODV works without periodic control message flooding or data packets with large control overhead (i.e. storing whole paths in data packets) [7]. 1.2 Overview of Mesh Routing in the ZigBee Network Layer The ZigBee mesh routing algorithm is based off of the premises of AODV. We shall now proceed to discuss the implementation of this algorithm in the ZigBee PRO specification, which introduces a focus on symmetric links and eliminates the tree routing mechanism. We assume a network of only a coordinator and routers. If end devices were present, their parents would handle all routing work, as they do not have that capability. One particular change from AODV is the substitution of sequence numbers and hop count for route status and path cost, respectively. Route status is an indication of the usability of the route, with values such as ACTIVE, DISCOVERY UNDERWAY, and INACTIVE (other values are omitted for simplicity). Path cost is the sum of the cost of each one hop link in a route. Link cost is a measure ranging from 0 to 7 calculated by the following func- 4
5 tion: ( ( )) 1 C{l} = min 7, round p 4 l Where p l represents the probability of packet reception on the link l. Path cost is the measurement used at each node during path discovery to compare options. Each of the ZigBee routers and the coordinator node contains a neighbor table, a routing table, and a route discovery table. The neighbor table contains entries for all nodes within one hop. Each entry also contains a value for outgoing link cost, which is measured by the neighbor. The routing table performs the same functionality as in AODV, except with the use of route status. The route discovery table is a temporary space, as entries only exist for the duration of a route discovery. A route discovery table entry contains data obtained from the route request frame (the RREQ equivalent), such as route request ID (the broadcast ID equivalent), address of the route request initiator, sender address (address of the previous hop), forward cost, residual cost, and an expiration time. The forward cost is the sum of link costs from the source to the current node, and the residual cost is the sum of link costs from the destination to the current node. The routing process begins similarly to that of AODV. The source node first checks the neighbor table for a destination match and then the routing table for a valid route to the destination (i.e. one with a status of ACTIVE). If there is no route in the table and a discovery for this route is not already underway, a path discovery process is initiated. The path discovery process begins similarly to AODV s, with the broadcast of a route request with an incremented route request ID. The route request contains similar fields to the RREQ, with the substitution of path cost for hop count. The node that receives the route request computes a new path cost by adding the maximum of the incoming and outgoing link costs for itself to the path cost value in the route request. It then compares this value with the forward cost value present in the appropriate route discovery table entry (or creates a new entry if one does not exist). If the new calculated path cost is greater than the forward cost, the route request is terminated. New routing table entries are created for both the forward and reverse routes. The entry for the forward route is initiated with a status of DISCOVERY UNDERWAY, while the other entry is set to ACTIVE. The route request is then rebroadcasted if the node is not the destination. 5
6 If the node receiving the route request is the destination, then a route reply is created. The route reply contains source, destination, and path cost fields like the route request. The destination s link cost replaces the path cost field of the route reply. The route reply is then unicasted to the source via the sender addresses present in the route discovery table entries. The node that receives the route reply compares the residual cost field in the appropriate entry of the route discovery table with the path cost field of the route reply. If the value in the route reply is smaller, then the routing table forward entry is updated with the correct next hop address. If the node is not the source, then the path cost is then updated in the route reply frame and the route reply frame continues to move upstream. If it is the source, then the route reply terminates and the route status changes to ACTIVE. Route maintenance procedures in ZigBee mesh routing also match closely those of AODV. A failure counter is kept for outgoing links to neighbors, and link status messages are periodically sent to neighbors. If the failure counter indicates a link failure, and the forwarding of a packet fails, a network status command frame is sent back to the source node of the packet. The source node then removes the routing table entry for that node [1]. The differences between ZigBee mesh routing and AODV have their benefits and costs. The use of path cost allows the network to be more aware of physical conditions, instead of treating all links equally. Additionally, the inclusion of the reverse path in the routing table removes some control overhead. However, the removal of sequence numbers requires that the route request must travel all the way to the destination, which is not required in AODV. 2 Problem Description Our goal is to evaluate the performance of a mesh network consisting of XBee-PRO modules, particularly with moving nodes. Our initial hypothesis was that the constant moving of nodes should affect ZigBee mesh routing operation. We believed that movement at high enough speeds could cause frequent link failures, which would negate the benefits of routing tables as new paths would be needed. In the worst case, links would have to be repaired via path discovery upon every transmit, which could significantly increase latency. We conducted experiments measuring performance data for point-to- 6
7 point and multi-hop networks, as well as two tests with a moving node to test our hypothesis. 3 Related Work Previous works [6, 8] have done simulation and experimental performance analysis of the IEEE PHY and MAC layers. Additionally, work has been done in analyzing ZigBee network performance in star and pointto-point configurations [2]. We could not find research on analyzing ZigBee multi-hop performance or performance with moving nodes. Since we are also interested in the performance of ZigBee networks for use in UAVs, we felt it necessary to mention SensorFlock. A team at University of Colorado, Boulder developed SensorFlock, an airborne wireless sensor network of micro-air vehicles, to study toxic plume dispersion [5]. SensorFlock entails a set of five micro-air vehicles, each weighing less than 500 grams. Each plane contains an autopilot board with a XBee-PRO module. Instead of using the ZigBee network layer, the team implemented their own routing algorithm that appears to based off of AODV. They performed measurements of received signal strength indication (RSSI), for air-to-air, air-to-ground, and ground-to-ground communication, and found air-to-air communication to have the highest RSSI as distance between nodes was varied. Packet loss was also found to increase with distance more rapidly with ground-to-ground communication over air-to-ground communication. They did not measure multi-hop performance, however, as all vehicles were within distance of the ground control station. 4 Experimental Setup To conduct our experiments, we used XBee-PRO ZB modules from Digi International (model XBP24-ZB). Each module had an RPSMA connector with a 2.2dBi duck antenna attached. We had one coordinator node and several router nodes. The coordinator was running Digi s latest API firmware (version 2170). The router nodes were either running the latest API firmware (version 2370) or the latest AT firmware (version 2270). We shall address the differences between API and AT firmware in our analysis of the experimental results. All nodes were set to use the same PAN ID and to have a baud rate 7
8 of All measurements were conducted after our control network was fully formed (confirmed via the XBee module s Join Verification setting). We used FTDI USB to Serial integrated circuits to interface the modules with x86 PCs. Data packets were always sent by the coordinator module to a single router module. To send packets and perform measurements, we wrote Java programs that used Andrew Rapp s open source XBee API [10] to interface with the module. Our benchmarking code is also open source and is available at src/com/gcs/xbee_test/. Our benchmark logs are also available at the root folder of this github repository. When conducting experiments, we used packets with the maximum data payload size. For a ZigBee PRO network using the mesh routing protocol, this is 84 bytes. The packets with control overhead, though, have a size of 128 bytes. The data payload consisted of a sequence number and a repeated constant value. We describe the total transmission time as the elapsed time starting immediately before sending a packet and ending when an acknowledgement frame (ACK) has been received. Throughput is calculated as the total packet size (128 bytes) divided by the total transmission time. We declared an error when we failed to receive an ACK frame for a transmission or when the received packet had an inaccurate sequence number. 4.1 Point-to-Point Experiments We first conducted experiments on one-hop packet transmission from a coordinator module to a router module approximately 1.5 meters apart. Since we have only one-hop transmission, we specified the NH parameter in the firmwares of the XBee modules to be 1 to minimize unicast timeout. We used synchronous and asynchronous transmission methods in different experiments. In synchronous transmission, the program would not request another packet transmission unless an ACK frame had been received for the previous transmission. In asynchronous transmission, the program did not wait for ACK frames and requested another transmission after a specified delay. The receiving router module was connected to a PC that verified the data payload of each packet. In each iteration of an experiment, we sent byte packets. We conducted 3 iterations of each experiment and averaged the results (for 27ms- and 28ms-delayed asynchronous tests, we performed 4 iterations to catch transmission errors). 8
9 4.1.1 Synchronous Transmission with API Router In this experiment, we collected transmission latency, error count, RSSI, and throughput measurements when transmitting 1000 packets from an API coordinator module to an API router module. The transmissions were synchronous, so transmission would only continue if an ACK frame was received for the previous transmission. This experiment was conducted to have a performance baseline for a ZigBee network Synchronous Transmission with AT Router This experiment was conducted in the same manner as the previous, except using AT firmware instead of API firmware for the router. As the XBee API only works with XBee modules having API firmware, we could not verify the received packet s data payload contents using a Java program. This experiment only served to compare the performance of the different firmware versions Synchronous Transmission with API Router and no APS ACK In order to see the impact of ACK packets on network performance, we disabled application support sub-layer (APS) ACK packet transmission. This is a unicast ACK packet that travels from the destination node to the source node, and is requested by the ZigBee APS layer and delivered by the ZigBee network layer. Due to API firmware, the source node still receives an ACK frame after the unicast timeout Asynchronous Transmission with API Router We used asynchronous transmission with varying delay times to measure the impact of transmission delay on error rate. We delayed the transmission thread by 1ms intervals from 31ms to 20ms. The delay does not include the time to send the transmit request frame through the serial link to the source node. When collecting asynchronous data, the latency was redefined as the time elapsed in just sending the packet itself. 9
10 4.2 Multi-Hop Experiments We measured multi-hop performance to compare results with both pointto-point measurements and measurements with moving nodes. To ensure multi-hop transmission, the destination router module had its antenna removed and was moved away from the source coordinator until no signal could be established. A middle router node (with AT firmware) was then placed at this point, which reestablished the signal. The NH parameter was also tuned to allow a greater unicast timeout. We measured the performance of synchronous packet transmission to the end router module two hops away. We conducted three experiments, each with three iterations of 1000 synchronous packet transmissions Multi-Hop Synchronous Packet Transmission This experiment provided results for baseline multi-hop performance, with 1000 packets being synchronously transmitted two hops away Multi-Hop without APS ACK This experiment was conducted with no APS ACK packets as comparison to baseline multi-hop network performance Multi-Hop without 16-bit Addresses In this experiment, we sent all packets without explicitly specifying the 16-bit network address of the recipient in the ZigBee Transmit Request frame. Such a practice could either force address discovery or an address table lookup. We conducted this experiment to look at those effects. 4.3 Moving Node Experiments We finally conducted two moving node experiments to witness the performance loss with a multi-hop network. Our test network consisted of a coordinator module, two stationary router modules, and a moving router module. All modules had antennas except for the moving router. The two stationary routers were placed in perpendicular hallways. This placement was made such that when the moving router was next to one of the stationary routers, 10
11 it could not establish a link with the other router. The moving router could also not establish a one hop link to the coordinator module Explicit Packets In the first moving node experiment, we moved the end router node between the two stationary routers every two synchronous packet transmissions. Each packet transmission was initiated manually at the coordinator module. This experiment illustrated the worst case scenario where a node instantaneously moved to a different part of the network in between transmissions Walking Test In our other moving node experiment, we walked the moving node through a path while synchronous packet transmission was constantly occurring. The path was always out of range of the coordinator, and started with being in range of only one router. The middle of the path was in range of both routers, and the end of the path was in range of only the other router. This test was meant to emulate a more real world scenario of a moving node. 5 Results and Discussion In this section, we present our experimental data in tabular and graphical forms, along with our interpretation of the data. 5.1 Synchronous Point-to-Point and Multi-Hop Transmission Table 1 shows our collected data for synchronous transmissions in both pointto-point and multi-hop configurations Point-to-Point Performance Analysis The data for the point-to-point transmission is a baseline standard for our mesh network s performance. As the transmissions are synchronous and the coordinator receives acknowledgements, there is no queuing delay and no potential for packet loss. The total transmission time is made up of several other components, however. The most dominant components of the total 11
12 Setup Avg. Transmission Time (ms) packets) (kbps) Error (# of Throughput RSSI (dbm) Figure 1: Data from Point-to-Point and Multi-Hop Synchronous Packet Transmission Experiments transmission time are the transmission time of the ZigBee Transmit Request frame to the source module via the UART and the transmission time of the ZigBee Receive Packet frame to the PC from the receiving module via the UART. The serial connection has a bandwidth of 115,200bps, so it is the bottleneck in data transfer (as the physical layer has a bandwidth of 250kbps). As our ZigBee transmit frames are 102 bytes in size, and the ZigBee receive frames are 100 bytes in size [3], UART transmission for each ideally takes 7.1ms and 6.94ms, respectively. Additionally, reception of the ZigBee Transmit Status frame (i.e. the ACK frame) via the UART ideally takes 0.76ms. Transmission time of the packet, assuming an ideal 250kbps physical layer, is 4.1ms. Transmission time of the ACK packet could be as low as 0.32ms. Our expected total transmission time is then 19.22ms, leaving us an error of 20.43ms. We can attribute this time difference to error (such as bandwidth being lower than specified), and the node processing time that we currently cannot quantify. The measurements using an AT router somewhat validate our notion that UART delay is the dominant transmission time factor. There is a latency difference of 7.79ms with the previous measurement. In an XBee module with an AT APS layer, the XBee module is programmed with AT commands and appears as a simple serial communication link to a connected device (e.g. PC, microcontroller). On the other hand, XBee modules with API firmware communicate with frames, encapsulating all data for more advanced features and simpler programmability [3]. Since the AT router does not encapsulate the received packet in a frame, the UART receive overhead drops from 6.94ms 12
13 to 5.93ms (the time to just transmit the 84 byte packet payload). However, this only explains 1.11ms of the difference. The rest of the discrepancy could lie in decreased processing time for AT routers over API (which has frame checksumming and encapsulation [3]). Our results in point-to-point packet transmission without APS ACK packets provides more insight into the timing of the system. Ideally with such a setup, the ZigBee Transmit Status frame should be received immediately after the packet has been transmitted via the radio. This then implies a total transmission time of 12ms, which is a discrepancy of 10ms from the experimental data. However, since we do not involve the receiving node in calculations when no APS ACK packets are present, we can isolate that transmission time period by comparison with our previous measurements. Doing this shows that 17.6ms is needed in processing and receiving the ZigBee Receive Packet frame and transmitting an APS ACK packet. An additional interesting result is that our results reported no transmission errors. We can explain this by the lack of queueing time. Since we only transmit after receiving a Transmit Status frame, the transmission queue will always be empty and thus not drop packets Multi-Hop Performance Analysis Our multi-hop experiments provide baseline measurements for comparison with the results of the moving node tests. Synchronous transmission over two-hops results in a 32% throughput performance decrease over the analogous one-hop transmission. It is not a full 50% decrease as the middle router module does not output anything on the serial link. The additional latency comes from the transmission and processing time of the data packet and of the ACK packet by the middle router. Additionally, performance loss is expected as the RSSI of the last hop is significantly worse in the multi-hop experiment than in the one-hop experiment. Multi-hop results without APS ACK packets show our first sign of packet loss with synchronous transmission. Our total transmission time is also unreasonably higher than the point-to-point data with no APS ACK, which should not be the case as the coordinator node is still doing the same job. However, a closer look at our log data revealed the discrepancy. The packet loss was due to 5 second transmission timeouts, because of link failure with the middle router module. These 5 second timeouts significantly increased the average total transmission time. However, the median of total transmis- 13
14 sion time over 3000 packets is 25ms, which is a much more reasonable value. Even this 3ms difference between the point-to-point data can be explained by the low RSSI, which could result in lower physical layer throughput. The removal of the 16-bit address in the ZigBee Transmit Request frame was meant as a measure to force the coordinator to perform address or route discovery operations. Address discovery is necessary because all ZigBee routing is done using 16-bit network addresses instead of each node s unique 64-bit IEEE address. Address discovery involves a broadcast transmission of the 64- bit address until the transmission reaches the correct node, so theoretically it is a slow operation. However, each XBee coordinator and module possesses an address table that it uses in the APS layer to lookup 16-bit addresses from 64-bit addresses. The 4ms increase in total transmission time could then be explained by these lookups instead of constant address discovery. Our log files show that no address discovery was performed, which may confirm this. Since the table is in the APS layer, the network layer can operate with a 16-bit address and avoid route discovery. 5.2 Asynchronous Point-to-Point Transmission This section provides data and analysis for the experiment detailed in Section As can be seen from Figure 2 as the delay time between sequential transmissions decreases, the throughput of the network increases linearly. This makes sense because as the delay time decreases, more data is sent over the network in any arbitrary block of time. However, as Figure 3 shows, there are almost no errors in data transmissions up until the total transmission time is 27 ms. After that point, the network suffers significant packet loss since the receiving node cannot keep up with the amount of data being sent. Since the delay is initiated after the data is sent across the UART to the transmitting XBee, the delay represents the amount of time it takes for the data to arrive and be processed by the receiving XBee. The data packet was 128 bytes in size, ideally making the amount of time it took to traverse the link 4.1ms. This leaves 20.9ms of unaccounted delay. To determine if there was a queuing delay the equation for traffic intensity applies: La/R, where L is the number of bits in a packet, a is the number of packets/s, and R is the transmission rate in bits per second. Thus, with a total transmission time of 27ms (i.e. 37 packets/s), a packet size of 128 bytes, and a transmission rate of 250kbps the traffic intensity is , which is much less than 1. Thus, we expect no queuing delay and no dropped packets. However, in practicality we 14
15 Figure 2: Throughput vs. Total Transmission Time in Asynchronous Pointto-Point Transmission observed that there must be queuing delay since packets are being dropped at the receiving node. This can once again be attributed to the fact that the network does not come close to reaching reliable 250kbps transmission rates, thus making the traffic intensity peak with less data traversing the network. 5.3 Moving Node Performance Discussion We do not show numerical data in this section, but all of our logs are online as previously mentioned. The results for the experiment mentioned in Section indicate that data transmission is guaranteed successful only when the mobile node first associates with the network. After the initial association, when the node is moved, the route from the coordinator to it is no longer valid, and the middle router must respond with a network status command frame indicating a broken link. If the next attempted transmission occurs before all of the routers broadcast their link status messages, the broken link is only discovered after a transmission is attempted and then fails after a timeout. A route discovery is then initiated. However, the packet is never received at the receiving node and the data is ultimately lost. If the 15
16 Figure 3: Packet Error vs. Total Transmission Time in Asynchronous Pointto-Point Transmission destination node continuously hops between routers after each transmission attempt, it could have 100% packet loss. However, if the transition were gradual as the experiment mentioned in Section 4.3.2, the node would smartly associate with the closest router and facilitate reliable communication; this is because the neighbor table ages, deleting old entries periodically. It is only when the transition is sufficiently fast that the neighbor table is not refreshed and the network status command frame (indicating a broken link) is not sent that there is significant packet loss. According to the XBee-PRO manual, link status messages are sent 3-4 times a minute [3]. We verified that no packet loss would occur if the broken link was reported in time by waiting 15 seconds after moving the node before sending another packet. When doing this, we received all packets. Even given this, the maximum throughput of a moving node is slightly less than that of a static multi-hop network due to the high latencies at the fringes of the router range before the mobile node reassociates with the stronger link. 16
17 6 Conclusion The goal of this paper was to evaluate the performance of moving nodes in a ZigBee PRO mesh network using XBee-PRO modules as the nodes and measuring the maximum throughput and latency of the network. The results indicate that the mesh network does not respond favorably to nodes that are moved from one router to another before the routers send their network status command frames to indicate a broken link. We observed the possibility for 100% packet loss should the movement occur in between neighbor table refreshes. We would also like to note that the performance of our multi-hop network could have possibly been attributed to the low RSSI of the link between the source and middle modules. We can attribute this low RSSI to our indoor setting, as there was a door between the source and middle modules, and the modules themselves were approximately 20 meters apart. However, since ZigBee modules are often used for home automation purposes [1], we find our results relatively disconcerting. In relation to our work with UAV mesh networking, we find through our results that ZigBee mesh routing with the necessity of multiple hops will result in undesirable performance. Alternatives such as many-to-one routing may provide better performance, and may be a subject of future research. Acknowledgment The authors thank Drs. Saad Biaz and Richard Chapman of Auburn University for their guidance and help in securing materials for research. This work was funded by NSF Award # References [1] ZigBee Alliance. Zigbee specification. Technical report, ZigBee Alliance, January [2] M. Armholt, S. Junnila, and I. Defee. A non-beaconing ZigBee network implementation and performance study. In Communications, ICC 07. IEEE International Conference on, pages ,
18 [3] Digi International. XBee/XBee-PRO ZB RF Modules, April [4] Bob Gohn. The ZigBee PRO feature set: More of a good thing. http: // December [5] Ahmad Bilal Hasan, Bill Pisano, Saroch Panichsakul, Pete Gray, Jyh Huang, Richard Han, Dale Lawrence, Kamran Mohseni, Ahmad Bilal Hasan, Bill Pisano, Saroch Panichsakul, Pete Gray, Jyh Huang, Richard Han, Dale Lawrence, and Kamran Mohseni. SensorFlock: A mobile system of networked micro-air vehicles., tr-cu-cs , u. of colorado at boulder, [6] Mikko Kohvakka, Mauri Kuorilehto, Marko Hännikäinen, and Timo D. Hämäläinen. Performance analysis of IEEE and ZigBee for large-scale wireless sensor network applications. In PE-WASUN 06: Proceedings of the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks, pages 48 57, New York, NY, USA, ACM. [7] Charles E. Perkins and Elizabeth M. Royer. Ad-hoc on-demand distance vector routing. In IEEE Workshop on Mobile Computing Systems and Applications, pages , [8] M. Petrova, J. Riihijarvi, P. Mahonen, and S. Labella. Performance study of IEEE using measurements and simulations. In Wireless Communications and Networking Conference, WCNC IEEE, volume 1, pages , [9] Peng Ran, Mao heng Sun, and You min Zou. ZigBee routing selection strategy based on data services and energy-balanced ZigBee routing. Asia-Pacific Conference on Services Computing IEEE, 0: , [10] Andrew Rapp. xbee-api. May
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
A Non-beaconing ZigBee Network Implementation and Performance Study
A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: [email protected] Sakari Junnila Email: [email protected] Irek Defee Email: [email protected] Abstract
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Ad hoc On Demand Distance Vector (AODV) Routing Protocol
Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description
APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Supporting ZDOs with the XBee API
Supporting ZDOs with the XBee API The ZigBee Device Profile is a management and discovery service layer supported on all ZigBee devices. Like all other profiles, the ZigBee Device Profile defines a set
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: [email protected] Ilangko Balasingham 2 2 The
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES
MiWi Wireless Networking Protocol Stack Author: INTRODUCTION Implementing applications with wireless networking is becoming commonplace. From consumer devices to industrial applications, there is a growing
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Internet Connectivity for Ad hoc Mobile Networks
Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Waspmote Digimesh. Networking Guide
Waspmote Digimesh Networking Guide Index Document version: v1.0-11/2012 Libelium Comunicaciones Distribuidas S.L. INDEX 1. Hardware... 5 2. General Considerations... 7 2.1. Waspmote Libraries...7 2.1.1.
An Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
PERA: Ad-Hoc Routing Protocol for Mobile Robots
PERA: Ad-Hoc Routing Protocol for Mobile Robots Carlos Agüero Vicente Matellán Pedro de-las-heras-quirós José M. Cañas DIET (Departamento de Informática, Estadística y Telemática) Universidad Rey Juan
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
Zigbee Network Performance
Wireless Control That Simply Works Zigbee Network Performance Typical Results and Implications for Application Design Skip Ashton, Ember Corporation Copyright 2004 ZigBee TM Alliance. All Rights Reserved.
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
MeshBee Open Source ZigBee RF Module CookBook
MeshBee Open Source ZigBee RF Module CookBook 2014 Seeed Technology Inc. www.seeedstudio.com 1 Doc Version Date Author Remark v0.1 2014/05/07 Created 2 Table of contents Table of contents Chapter 1: Getting
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks B. MALARKODI, B. VENKATARAMANI AND X.T. PRADEEP Department of Electronics and Communication Engineering National
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Routing in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Introduction to Zibgbee Technology
Introduction to Zibgbee Technology Ankur Tomar Global Technology Centre Volume 1, July 2011 1. Introduction ZigBee is the most popular industry wireless mesh networking standard for connecting sensors,
Propsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
Bidirectional wireless communication using EmbedRF
Bidirectional wireless communication using EmbedRF 1. Tools you will need for this application note... 2 2. Introduction... 3 3. Connect EmbedRF Board to USB Interface Board... 3 4. Install and Run EmbedRF
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected]
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected] 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Location-Aided Routing (LAR) in mobile ad hoc networks
Wireless Networks 6 (2000) 307 321 307 Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home
Building a Basic Communication Network using XBee DigiMesh Jennifer Byford April 5, 2013 Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Abstract: Using Digi International s in-house
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
Communication Protocol
Analysis of the NXT Bluetooth Communication Protocol By Sivan Toledo September 2006 The NXT supports Bluetooth communication between a program running on the NXT and a program running on some other Bluetooth
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Graph Theory Algorithms for Mobile Ad Hoc Networks
Informatica 36 (2012) 185-200 185 Graph Theory Algorithms for Mobile Ad Hoc Networks Natarajan Meghanathan Department of Computer Science, Jackson State University Jackson, MS 39217, USA E-mail: [email protected]
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
A Wireless Sensor Network for Weather and Disaster Alarm Systems
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore A Wireless Sensor Network for Weather and Disaster Alarm Systems Cholatip Yawut
