Medium Access Layer Performance Issues in Wireless Sensor Networks

Similar documents
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

Halmstad University Post-Print

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

How To Make A Multi-User Communication Efficient

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks

CS263: Wireless Communications and Sensor Networks

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Internet of Things. Exam June 24

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Mac Protocols for Wireless Sensor Networks

Adaptive DCF of MAC for VoIP services using IEEE networks

Agriculture: Methods and Experiences

c 2012 by Kien Nguyen. All rights reserved.

Prediction of DDoS Attack Scheme

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

Introduction to Wireless Sensor Network Security

A Transport Protocol for Multimedia Wireless Sensor Networks

PERFORMANCE ANALYSIS OF THE IEEE BASED ECG MONITORING NETWORK

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE standard

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

A TCP-like Adaptive Contention Window Scheme for WLAN

MEDIUM ACCESS CONTROL LAYER PERFORMANCE ISSUES IN WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS

ENERGY MANAGEMENT IN WIRELESS SENSOR NETWORKS: A CROSSLAYER, CHANNEL ADAPTIVE APPROACH TOWARDS PERFORMANCE OPTIMIZATION

Figure 1. The Example of ZigBee AODV Algorithm

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

Metrics for Detection of DDoS Attacks

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

Protocol Design and Implementation for Wireless Sensor Networks

A Receiver Oriented MAC Protocol for Wireless Sensor Networks

Wireless Sensor Network MAC Protocol: SMAC & TMAC

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Lecture 17: Wireless Networking"

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Enhancement of VoIP over IEEE WLANs by Adapting Transmitting Interval

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card

Yalda Hakki Rosy Johal Renuka Rani

How To Improve Quality Of Service For A Smart Grid Distribution Monitoring System

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Medium Access Control Optimization For Structural Health Monitoring Using Wireless Sensor Network

Performance of Host Identity Protocol on Nokia Internet Tablet

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

On Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

MAC Protocols for Wireless Sensor Networks: A Survey

Duty-Cycle MAC Protocols and Networking Overhaul

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

How To Determine The Capacity Of An B Network

Voice Service Support over Cognitive Radio Networks

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

CSC 774 Advanced Network Security. Outline. Related Work

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Energy Consumption analysis under Random Mobility Model

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

FAMA/TDMA Hybrid MAC for Wireless Sensor Networks

A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks

ENERGINO: Hardware and Software Solution for Energy Consumption Monitoring

Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Drahtlose Kommunikation. Sensornetze

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading

THE development of media access control (MAC) protocols

ECE 333: Introduction to Communication Networks Fall 2002

RTT 60.5 msec receiver window size: 32 KB

Master s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Chapter 3 ATM and Multimedia Traffic

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks

6LoWPAN Technical Overview

Versatile Low Power Media Access for Wireless Sensor Networks

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Wireless Video Best Practices Guide

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

MAC Protocols for Wireless Sensor Networks: a Survey

Philippe Klein. avb-phkl qos-overview

Random Access Protocols

WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks

Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Transcription:

Medium Access Layer Performance Issues in Wireless Sensor Networks Ilker S. Demirkol ilker@boun.edu.tr 13-June-08 CMPE, Boğaziçi University

Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 2 / 66

Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 3 / 66

WSN: Network of sensor nodes 1. Sense the environment 2. Process the sensed data 3. Communicate the processed data towards sink G. Boone, Sensors Magazine, 2004: Internet To browse stored information WSN To browse the reality 4 / 66

WSN: Many Application Areas Environmental applications e.g., habitat monitoring Health applications e.g., telemonitoring of human physiological data Military applications e.g., battlefield surveillance Home applications e.g., home automation... 5 / 66

1986 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 WSN publications in SCI-E (per year) 1600 1400 1200 1000 800 600 400 200 0 6 / 66

WSN Research No standardization in communication protocols. A challenging subject, since the sensor nodes are limited in: computational capacity: 4 Mhz CPU memory: 60 KB RAM communication bit rate: 20-250 Kbps power: battery generally infeasible to replace Primary objective is to achieve highest energy efficiency at each operation. 7 / 66

Energy Consumption Components Three energy consuming operations: Communication Sensing Computation To conserve energy: Shutdown the sensor (sleep mode) Duty cycle: Sleep-listen schedules e.g., duty cycle of 5 %: Work 5 unit time and sleep 95 unit time. 40 30 20 10 0 Energy Consumption (mj) 0.024 mj 8 / 66

Two Important MAC Layer Energy Wastes Idle listening Collision C XB A A good MAC protocol should reduce both types of energy wastes. The energy consumed per bit/packet is a crucial performance criterion. 9 / 66

Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization 10 / 66

Surveillance Wireless Sensor Networks (SWSN) SAFE Sink node UNSAFE 11 / 66

Packet Traffic Models for WSN Poisson, Periodic,... SPTM (SWSN Packet Traffic Model) Intrusion-initiated Bursty traffic Depends on: Sensing interval Intrusion detection model Sensor1 Sensor2 MAC Sensor3 12 / 66

Detection Models Binary Detection Model Probability of detection: 1 Elfes Detection Model Probability of detection: 1 0 d c Certain detection range sensor-target distance 0 d c d u sensor-target distance Certain detection range Uncertain detection range/sensing range Probabilistic d c d u d c detection degree = # of detecting sensors = 5 # of detecting sensors = detection degree = 3 13 / 66 # of sensors w detection prob.= coverage degree = 5

Consecutive Coverage Degrees Consecutive coverage degrees are not independent, i.e., can be repsented by: Markov process of order n = 2d v t T u s target speed sampling interval 14 / 66

SPTM Framework 3 2 5 3 We provided complete analytical model for: generation of first coverage degree relations of consecutive coverage degrees detection degree for a given coverage degree 15 / 66

SPTM Framework 16 / 66

SPTM Framework 17 / 66

Validation of SPTM Simulation parameters: p 1 0 0 20 distance Validation of coverage degree dependency: 18 / 66

Validation of SPTM Coverage degree distribution for all points: Coverage degree dependency example: Subsequent detection points of coverage degree 2: Different distributions! Simulations validates the analysis presented 19 / 66

Validation of SPTM Detection degree PMF for a given coverage degree. Correct PMF can be derived with analysis. 20 / 66

SPTM An application specific packet traffic model is derived by first defining a framework. The components of the framework is formulated analytically which are verified by simulations. The proposed PTM is adaptive: The detection parameter settings can be set according to the sensor type deployed The specifications of the SWSN application implemented can be incorporated such as the target area and density. 21 / 66

Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 22 / 66

Packet Traffic Models for WSN Poisson, Periodic,... SPTM,... What is the importance of a realistic PTM? 23 / 66

Impact of Realistic PTM Performance of S-MAC is evaluated for three different PTMs: Periodic Binomial SPTM Simulation Parameters: 24 / 66

Load vs. Delay Similar average load results in very different average delays! 25 / 66

Effect of Scenario Parameters Investigated parameter: Target speed To use correct system parameters is also very crucial. 26 / 66

Limited Buffer Case Buffer size: 10 packets Packet drops start at lower loads with SPTM. 27 / 66

Impact of Using a Realistic Packet Traffic Model It is shown that, for surveillance applications, evaluating a MAC protocol with a packet traffic model other than SPTM may give misleading performance results. The results presented belong to performance evaluation for one-hop communication which will be accumulated in evaluations of the end-to-end performances. In fact, that will lead to higher divergence from the realistic results. 28 / 66

Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 29 / 66

Energy and Delay Optimized Contention for Wireless Sensor Networks Contention-based MAC protocols Majority of the WSN MAC protocols are contention-based Optimize the energy consumed the delay incurred by the contentions of the nodes 30 / 66

Contention-based MAC protocols Medium access with contention slots: IEEE 802.11, IEEE 802.15.4 S-MAC, B-MAC, SCP-MAC, Z-MAC Packet tx... 3 1 2 time Procedure: Randomly select a slot Carrier sense till the slot you select If no tx before your slot, start tx. Contention Window (CW) What to do, in case of collisions? 31 / 66

Collisions ****Collision*** 2 3 1 2 Succ. packet tx... 1 3 Backoff: collision timeout Binary Exponential Backoff (BEB) IEEE 802.11, IEEE 802.15.4 Uniform Backoff (UB) S-MAC, Z-MAC, Sift, SCP-MAC, B-MAC time 32 / 66

The Significance of the Contention Window Size S-MAC defines the following settings: 63 contention slots Slot time: 20 bit tx. If only one node is contending : Expected contention delay (carrier sense duration): 600 bits tx The packet to be sent is 400 bits (S-MAC default)! 33 / 66

Trade-off Lower CW size: Mean carrier sense duration Probability of collision Higher CW size: Mean carrier sense duration Probability of collision 34 / 66

Impact of CW size on WSN performance We formulate the two crucial WSN objectives analytically: Overall energy consumed for contentions Delay incurred by contentions Parameters of the derived analytical formulas: Contention window size Number of contending nodes Collision timeout duration, communication speed, energy consumption values 35 / 66

Analysis vs Simulation Simulation results are average of 1000 runs. Parameters: Bandwidth: 20 Kbps Slot time: 1 ms The collision timeout: 15.15 ms (RTS+CTS+SIFS) 36 / 66

Contention Delay # of contending nodes = 5 : collision duration : carrier sense duration : contention delay 37 / 66

Contention Delay for Different Number of Contending Nodes The optimum CW size changes with the number of contending nodes. 38 / 66

Performance Comparison for Contention Delay SSCW propose an approximation for optimum Setting CW CW size. size to W* t reveals lower delays compared to other alternatives. SMAC defines fixed 63 slots. W t *: Delay optimizing CW size SSCW: IEEE Tran. on Wireless Comm., Nov 06, by Tian et al. 39 / 66

Energy Consumption Results # of contending nodes = 5 40 / 66

Performance Comparison for Energy Consumed W E *: Energy optimizing CW size 41 / 66

Energy-Delay Trade-off W E * vs. W t * Minimization of one metric can increase the value of the other 7.5% higher delay 8% higher energy 42 / 66

Optimized CW Size Conclusions Contention delay Derived analytically Delay optimizing CW size (W t *) Energy consumed for contention resolution Derived analytically Energy optimizing CW size (W E *) First work to present the optimization of CW size in WSN. The analytical work presented can be applied to all networks that defines uniform backoff. 43 / 66

Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 44 / 66

ENCO: A Heuristic for CW Size Setting We need a method for incorporating CW size optimizations into a distributed implementation. Estimated Number of Contenders (ENCO) method for event-based applications average coverage degree ~ average of the number of contending nodes use optimized CW for average coverage degree throughout the network. 45 / 66

Estimated Number of Contenders (ENCO) Method Two types of event-driven applications: Random Event Locations (REL) application Correlated Event Locations (CEL) application SPTM is used for traffic generation of CEL application. 46 / 66

Simulation Parameters for Evaluation of the ENCO Method Parameter Value Range Number of nodes 20-200 Area 300 x 300 m 2 Sensing Range Target speed Sampling interval 50 m 10 m/s 1 second 1000 simulation runs with new deployments. At each run, 10 event points are logged. for CEL: 10 consecutive target detection points. 47 / 66

Simulation Results of the ENCO Method Sample REL Application: Sample CEL Application: W* ENCO W* E 48 / 66

ENCO A heuristic that utilize the contention optimization work is presented. It is defined for event-driven applications where the ENCO method is shown to successfully approximate the performance of the optimum contention window size. 49 / 66

Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 50 / 66

Effect of CW Optimization on Video Sensor Networks Sensor nodes are equipped with video cameras: Controllable video frame rate Limited buffers (Motes: 60 KB RAM) Limited communication rate Mica2: 20 Kbps, MicaZ: 250 Kbps Low computational capacity Limited encoding alternatives 51 / 66

Simulation Parameters for VSN Performance Evaluation Network stack: S-MAC + GPSR Comm. range: 80 m 52 / 66

Simulation Results for ENCO in VSN Throughput: Latency: Increases throughput for all DC values Decreases latency 53 / 66

VSN Performance Improvement with ENCO In this work, we investigated a promising and challenging type of WSN, namely VSN. We show that with current hardware capabilities of the sensor nodes, VSNs can easily saturate even for low video rates. However, the ENCO method is shown to improve the VSN performance for both throughput and latency values which are important criteria for time-critical VSN applications such as border surveillance. 54 / 66

Outline Background: WSN and its MAC Layer Properties Packet Traffic Modeling for Surveillance Wireless Sensor Networks Impact of a Realistic Packet Traffic Model on MAC Performance Contention Optimization for Contention-based MAC Protocols A Heuristic for Contention Optimization in WSN Video sensor networks and increasing their capabilities with contention optimization Improving Performance with a Better Slot Selection Method 55 / 66

A Better Slot Selection Method? Mostly used slot selection: uniformly random IEEE 802.11, S-MAC, Z-MAC,... p* slot selection method is proposed to minimize the collision probability: (IEEE JSAC, 04) 56 / 66

Is It Really Better? Collision Probabilities (N=5): Average Contention Delays (N=5): 57 / 66

Which CW Size to Compare? For W* t : For individual W* s: Uniformly random slot selection results in better performance with W* t! 58 / 66

Choice of Slot Selection Method We showed that although p* results in fewer collisions, its producing a better overall performance depends on the contention window size used. The uniformly random slot selection performance is shown to be better than the p* method if it is used with the CW size of W* t that is derived analytically in this thesis. 59 / 66

Conclusions (1) The performance studies of MAC protocols are generally performed with either periodic or Poisson data traffic. However, in reality, the data traffic generated in WSNs depends on the application. We developed an analytical packet traffic model for surveillance wireless sensor networks which utilize a parametric and probabilistic sensor detection model. This model can be used to generate the time-based packet traffic load generated by an intrusion to a target area. Moreover, the analytical model derived can be used for performance evaluations of MAC protocols for SWSNs. By doing detailed simulations, we showed that the performance results of a communication protocol depend on the packet traffic model employed. Using a different model than SPTM can overestimate the performance of a MAC protocol. 60 / 66

Conclusions (2) Another work presented in this thesis is the energy and delay optimization of contentions for contention-window based MAC protocols. The importance of the contention window size setting on the energy consumption and the delay incurred is depicted both analytically and by simulations. Separate optimum contention window size setting methods are presented for the energy consumption and the incurred contention delay. It is shown that the performance of contention-based MAC protocols can be significantly improved using the optimum contention window sizes. The presented analysis and optimizations are also applicable to other wireless networks that define a fixed contention window size and uniformly random contention. 61 / 66

Conclusions (3) For practical implementation of the CW size optimization in event-triggered WSN, a heuristic namely, the ENCO method, is proposed. The simulations on two different type of event-triggered WSN applications show that the ENCO method achieves close performance results to the optimum contention window size results. In the simulations of ENCO for correlated event location scenario, the information of the number of nodes detecting the events is generated with the proposed SWSN packet traffic model. As a future work, the performance of the ENCO method can be increased with spatio-temporal information such as the history of number of contending nodes. 62 / 66

Conclusions (4) We also investigated the improvements in the capabilities of VSNs by using the contention optimization methods and the ENCO heuristic proposed. It is shown that increasing the quality of video capture frame rates results in a drop in the video quality received at the sink even for low rates with currently available hardware and encoding technology. The network performance results of VSN with the ENCO method show that this method can extend the capabilities of VSN by both decreasing the end-to-end delay and increasing the average number of frames received at the sink, i.e., the system throughput at the same time. As a future work, the ENCO method can be improved for QoS-aware WSN where different priority classes can use different CW sizes. 63 / 66

Conclusions (5) The CW size studies presented in this thesis base on the uniformly random slot selection method which is the most widely used slot selection method. However, an alternative method was proposed which minimizes the collision probability. This method is compared to the uniformly random method for the contention delay metric. It is found that depending on the CW size used, the slot selection method that resuls in better performance values changes. However, it is shown that the uniformly random slot assignment performs better when used with the optimized CW size. We state that the best slot seletion method investigation should be done in cooperation with the optimum contention window size for the method. As a future work, this joint optimization problem can be investigated. 64 / 66

Publications Journal Papers: I. Demirkol, F. Alagöz, H. Deliç and C. Ersoy, Wireless sensor networks for intrusion detection: packet traffic modeling, IEEE Communications Letters, vol. 10, no.1, pp. 22-24, January 2006. I. Demirkol, C. Ersoy and F. Alagöz, MAC protocols for wireless sensor networks: a survey, IEEE Communications Magazine, vol. 44, no. 4, pp. 115-121, April 2006. I. Demirkol, F. Alagöz, H. Deliç and C. Ersoy, The impact of a realistic packet traffic model on the performance of surveillance wireless sensor networks, Accepted to Elsevier Computer Networks, 2008. I. Demirkol and C. Ersoy, Energy and delay optimized contention for wireless sensor networks, under revision, Elsevier Computer Networks, 2008. I. Demirkol, E. Onur and C. Ersoy, Wake-up receivers for wireless sensor networks: Benefits and Challenges, under revision, IEEE Wireless Communications, 2008. I. Demirkol and C. Ersoy, Does minimizing the collision probability reveal the best performance? In preparation, 2008. I. Demirkol, A. Ozgovde, and C. Ersoy, Improving latency and throughput by intelligent contention window size adjustment for video sensor networks, In preparation, 2008. International Conference Papers: A. Ozgovde, I. Demirkol and C. Ersoy, Effect of sleep schedule and frame rate on the capabilities of video sensor networks, International Symposium on Wireless Pervasive Computing - ISWPC 08, Greece, May 2008. Y. Durmus, A. Ozgovde, I. Demirkol and C. Ersoy, Exploring the effect of the network parameters of video sensor networks, Accepted to International Symposium on Computer Networks, 2008. I. Demirkol, Evaluation of cluster-based cross layer protocols for wireless sensor networks, Accepted to IEEE INFOCOM 2006 Student Workshop, 2006. I. Demirkol, Evaluation of cluster-based cross layer protocols for wireless sensor networks, Accepted to ICN 06. National Conference Papers: A. Ozgovde, I. Demirkol and C. Ersoy, Uyuma çizelgesi ve çerçeve hızının görüntülü algılayıcı ağların başarımına etkisi, Akademik Bilişim, Çanakkale, 2008. I. Demirkol, K. Basol, O. B. Orhan and S. Sevinc, Sorgu-tabanlı telsiz algılayıcı ağları sınama ortamı çalışmaları, 65 / 66 Proceedings of Bilgi Teknolojileri Kongresi, pp. 449-454, Denizli, Turkey, 9-11 February 2006.

Comments/Questions? 66 / 66