Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Size: px
Start display at page:

Download "Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks"

Transcription

1 Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Dhaka, Bangladesh Abstract We consider ad-hoc wireless networks and the topology control problem defined as minimizing the amount of power needed to maintain connectivity. The issue boils down to selecting the optimum transmission power level at each based on the position information of reachable s. Local decisions regarding the transmission power level induce a subgraph of the maximum powered graph G max in which edges represent direct reachability at maximum power. We propose an analysis for constructing minimum-energy path-preserving subgraphs of G max, i.e., ones minimizing the energy consumption between pairs. We also propose an algorithm for constructing subgraph of G max based on 1-hop neighbor information. By presenting experimental results we show the effectiveness of our proposed algorithm. keywords: Ad-hoc Network. I. INTRODUCTION Minimizing energy consumption is a major design goal in ad-hoc wireless network. If networks are designed preserving minimum energy paths then significant reduction in energy consumption can be achieved. We have to choose the minimum power level for each to minimize the energy consumption for the whole network. We use the same model as [1] which considers, an n-, multi-hop, ad-hoc, wireless network deployed on a two-dimensional plane. Suppose that each is capable of adjusting its transmission power up to a maximum denoted by P max. Such a network can be modeled as a graph G=(V,E), with the vertex set V representing the s, and the edge set defined as follows: E = { x, y x, y V V d(x, y) R max } (1) where d(x,y) is the distance between s x and y and R max is the maximum distance reachable by a transmission at the maximum power P max. The graph G defined this way is called the maximum powered network. By setting a reduced power level for each, messages can be transmitted with a minimum energy among all the paths in the network. This will lessen average degree and produce a subgraph of G, while maintaining global connectivity. We say that a graph G G is a minimum-energy pathpreserving graph or, alternatively, that it has the minimum energy property, if for any pair of s (u,v) that are connected in G, at least one of the (possibly multiple) minimum energy paths between u and v in G also belongs to G. Minimum-energy path-preserving graphs were first defined in [2]. Typically, many minimum-energy path-preserving graphs can be formed from the original graph G. It has been shown that the smallest of such subgraphs of G is the graph G min = (V,E min ),where(u, v) E min iff there is no path of length greater than 1 from u to v that costs less energy than the energy required for a direct transmission between u and v. Let G i = (V,E i ) be a subgraph of G = (V,E) such that (u, v) E i iff (u, v) E and there is no path of length i that requires less energy than the direct one-hop transmission between u and v. Then G min can be formally defined as follows: G min = G 2 G4... Gn 1 (2) It is easy to see that any subgraph G of G has the minimumenergy property iff G G min. Thereby, each of G i G min, for any i = 2, 3,..., n-1 is a minimum-energy path-preserving graph. G 2 is the first of the series G i, it is the most practically useful derivative of the maximum powered graph G. An algorithm for constructing one such graph, G 2, was presented in [2]. It works reasonably well in dense networks but its performance degrades considerably when the network density drops to medium or low. Construction of G 2 efficiently in sparse and moderately dense networks with some assistance of the Medium Access Control (MAC) layer was presented in [1]. To construct G 3 we need 2-hop information that means information from the immediate neighbors and the neighbors of those immediate neighbors. Number of links in G 2 and G 3 is considerably less compared to the number of links within the maximum powered network. Interestingly, number of links in G 3 does not reduce significantly compared to G 2 but G 3 requires 1 hop more information than G 2. On the other hand, if we can construct G 3 and G 2 in a distributed way, we can also construct G 2 G 3. G 2 G 3 is definitely more close to G min than G 2 and it has a great amount of savings in comparison to G 2. Construction of G 3 involves exchanging many messages, and thus causes obvious energy overheads. We have tried not to increase the overhead but improve the performance of G 2. Then we construct G 3 with the information collected from only the neighbors found within the region having radius R max. The resulting graph is Local Minimum Energy Communication Network () is nothing but G 2 with limited information. We present here a distributed algorithm to locally construct G 2. This approach requires no further SPECTS ISBN: Authorized licensed use limited to: Bangladesh Univ of Engineering and Tech. Downloaded on August 28, 29 at 3:48 from IEEE Xplore. Restrictions apply.

2 information than G 2 but produces a reasonable amount of savings. II. RELATED WORKS Recent research has lead to exposure of mainly three dimensions directed at power control algorithms for wireless mobile networks. The first class of solutions looks at the issue from the perspective of MAC layer. Monks et al. [3] propose a modification to the IEEE RTS-CTS handshake whereby a overhearing a CTS packet uses the received power to estimate its distance to the sender. Also, Sing et al. [4] propose techniques for powering-off the transceivers when they are not active. The significance of the second approach lies in its dealing with network layer. Most of the schemes in this class use distributed variants of the Bellman-Ford algorithm with various flavors of cost metrics derived from the notion of power. Metrics taken as standard are as follows: energy consumed per packet, time to network partition, variance in power levels, and(power) cost per packet. The findings in the second approach can play a leading role in the third approach that separates routing from topology control. Ramanathan [5] describe two centralized heuristic algorithms to minimize the maximum transmission power while trying to maintain connectivity or bi-connectivity, called Local Information No Topology (LINT) and Local Information Link-State Topology (LILT). COMPOW proposed by Narayanaswamy [6], chooses the smallest common power level for each emphasizing mainly on 1) connectivity, 2)traffic carrying capacity maximization, 3)contention reduction in MAC layer, and 4) low power requirement. It is pre-assumed that distribution of s are homogeneous, which in the long run may appear as a serious flaw. CLUSTERPOW was designed to overcome the shortcomings of COMPOW by introducing clusters. However, it still suffers from a significant message overhead. Cone-Based Topology Control (CBTC), generates a graph structure similar to the one proposed by Yao [7]. Suitable initial power level and the increment of power level at each step are the driving force of CBTC, and plays a pioneer role in determining the number of overhead messages. Rodoplu [8] introduce the notion of relay region based on a specific power model. Their algorithm was later modified by Li [2] to trim some unnecessary edges. Our work closely relates to these two studies. N. Li [9] propose a distributed topology control algorithm (called LMST) based on constructing minimum spanning trees. Their algorithm achieves three goals: 1) connectivity, 2) bounded degree ( 6) and 3) bi-directional links. In LMST, each u collects the position information of all neighbors reachable at the maximum power. Based on this information, u creates its own local minimum spanning tree among the set of neighbors, where the weight of an edge is the necessary transmission power between its two ends. Once the tree has been constructed, u contributes to the final topology those s that are its neighbors in the spanning tree. One problem with LMST is that the resulting graph does not preserve the minimum-energy paths. A. Power Model III. ALGORITHM We are using the same power model as [1]. Here we assume the well known, generic, two-way, channel path loss model, where the minimum transmission power is a function of distance [1]. To send a packet from x to y, separated by distance d(x,y), the minimum necessary transmission power is approximated by P trans (x, y) =t d α (x, y), (3) where α 2 isthepath loss factor and t is a constant. Signal reception is assumed to cost a fixed amount of power denoted by r. Thus, the total power required for one-hop transmission between x and y becomes P total (x, y) =t d α (x, y)+r, (4) The model assumes that each is aware of its own position with a reasonable accuracy, e.g., via a GPS device. B. Previous approach to constructing G 2 An algorithm was presented in [8] based on relay region. Theconceptislikethis: Given a u and another v within u s communication range (at P max ), the relay region of v as perceived by u (with respect to u), R u v, is the collection of points such that relaying through v to any point in R u v takes less energy than a direct transmission to that point (see 1)). Given Fig. 1. u (a) The relay region of v with respect to u (b) The enclosure of the definition of relay region, the algorithm for constructing G 2 becomes straightforward. Construction of G 2 efficiently in sparse and moderately dense networks with some assistance of the Medium Access Control (MAC) layer was presented in [1]. SPECTS ISBN: Authorized licensed use limited to: Bangladesh Univ of Engineering and Tech. Downloaded on August 28, 29 at 3:48 from IEEE Xplore. Restrictions apply.

3 Algorithm: 1. /* s main */ 2. /* ℵ is the set of discovered so far */ 3. /* ℵ s Neighbor set of s*/ 4. /* Suppose, s got a reply from r*/ 5. begin 6. ℵ s = ℵ s r 7. for each n in ℵ{ 8. /*get list of common neighbors 9. between n and r*/ 1. D=getCommonNeighbor(n,r,ℵ) 11. /*get list of common neighbors 12. between s and r*/ 13. G=getCommonNeighbor(s,r,ℵ) 14. Segment 1: 15. if r is in ℵ s { 16. /* case 1(a): */ 17. /* check for two length path 18. between s and r relaying through n*/ 19. if (cost(s, r) cost(s, n)+cost(n, r)){ 2. ℵ s = ℵ s {r} 21. goto Segment } 23. /* case 1(b): */ 24. /* check for three length path between s 25. and r relaying n and d*/ 26. for each d in D{ 27. if (cost(s, r) cost(s, n) 28. +cost(n, d)+cost(d, r)){ 29. ℵ s = ℵ s {r} 3. goto Segment } 32. } 33. } C. Algorithm We propose an algorithm for constructing close approximation of G 2 G 3 with much less overhead which works in a distributed way. We shall refer to our algorithm as the Local Minimum Energy Communication Network algorithm or algorithm in short through this paper. In algorithm, function cost(x, y) takes two s x and y as parameters and calculates the cost of direct transmission between them according to the equation 4 assuming t, the predetection threshold equal to 1 7 mw, additional receive power, r = 2mW and path loss factor, α = 4. Function getcommonneighbor(x,y,ℵ) determines the common neighbor set of x and y having information of set of s ℵ. The operation of the above algorithm is described from the viewpoint of one s. Heres broadcasts a single neighbor discovery message (NDM) at the maximum power P max. While s collects the replies of its neighbors, it learns their identities and locations. It constructs set ℵ and ℵ s. Initially, all those sets are empty (s doesn t even know what neighbors there are). Here N is defined as the set of all s that s has 34. Segment 2: 35. if n is in ℵ s { 36. /* case 2(a): */ 37. /* check for two length path 38. between s and n relaying through r*/ 39. if (cost(s, n) cost(s, r)+cost(r, n)){ 4. ℵ s = ℵ s {n} 41. goto Segment } 43. /* case 2(b): */ 44. /* check for three length path between 45. s and n relaying r and d*/ 46. for each d in D{ 47. if (cost(s, n) 48. cost(s, r)+cost(r, d)+cost(d, n)){ 49. ℵ s = ℵ s {n} 5. goto Segment } 52. } 53. /* case 2(c): */ 54. /* check for three length path between s 55. and n relaying through g and r*/ 56. for each g in G{ 57. if (cost(s, n) cost(s, g) 58. +cost(g, r)+cost(r, n)){ 59. ℵ s = ℵ s {n} 6. goto Segment } 62. } 63. } 64. Segment 3: 65. continue 66. } 67. ℵ = ℵ r 68. End discovered so far and ℵ s is the set of its neighbors. Node s has to maintain direct link or direct communication with each in ℵ s, ℵ s ℵ. When s gets a reply from r it is added in the neighbor set ℵ s, then it considers 2 cases for each in ℵ. First it tries to find out a n in ℵ such that cost(s, r) >= cost(s, n)+cost(n, r), thenr is discarded from ℵ s because n can be used as a relay to transmit to r (see figure 2 case 1(a)). If cost(s, r) <cost(s, n)+cost(n, r) then there is no path of length two that can be used to transmit r with less energy than direct transmission between s and r. So,r will not be discarded from neighbor set ℵ s. Thus G 2 is forming here. Now a three length path that costs less energy than a direct transmission between s and r is searched on. If d is a common neighbor between n and r then cost(s, r) >= cost(s, n) + cost(n, d) + cost(d, r) condition is checked. If there is a that fulfils the above condition then r is discarded from ℵ s because there is path of length three which costs less than direct transmission (see Figure 3 SPECTS ISBN: Authorized licensed use limited to: Bangladesh Univ of Engineering and Tech. Downloaded on August 28, 29 at 3:48 from IEEE Xplore. Restrictions apply.

4 Fig. 2. Case 1(a) Fig. 5. Case 2(b) Fig. 3. Case 1(b) case 1(b)). Now our algorithm search for the s that should be removed from neighbor set ℵ s after including r. First it discards all the s for which r can be used as relay in case of two length path (see figure 4). Thus G 2 is formed here. Then search for a d in common neighbor set of n and r and for a g in common neighbor set of s and r is done to find out a three length path that is less costly than direct transmission between s and n (see figure 5 and figure 6). This algorithm constructs G 2 in a proper way and then tries to construct G 3 from available (partial) information. As we know that construction of G 3 requires 2 hop information from neighbors which causes more messages to be exchanged and increases energy overheads. So we tried to improve performance of G 2 here. We constructed G 3 using Fig. 4. Case 2(a) Fig. 6. Case 2(c) the local information found by exchanging 1 hop information like G 2. We refer to the graph found by as G throughout this paper. D. Why G close to G 2 In this section we present scenario where local information from immediate neighbors are not enough to construct G 3. In Figure 7 the circle represents R max neighborhood of a. b and c is inside its neighbor region but d is outside of its sensing range. Suppose d is situated very close to R max i.e., near the boundary of a. As a has only local information in, it will see that there is no two or three length path that costs less than direct communication between a and b, therefore it maintains link ab. But in actual case it might happen that relaying through c and d may cost less than direct communication between a and b. So,acdb is the three length path that is considered in G 3 but not in. This is a case where produces more link than G 2. Lemma 1: G G 2. Proof: A link between two s u, v V is deleted in only when there is another minimum energy path of two or three length between the s, i.e. applies G 2 and locally G 3, thus, it does not destroy any minimum energy path having length two or three. Besides, produces some extra links as described in previous subsection. So the resultant graph G is definitely a superset of G 2. SPECTS ISBN: Authorized licensed use limited to: Bangladesh Univ of Engineering and Tech. Downloaded on August 28, 29 at 3:48 from IEEE Xplore. Restrictions apply.

5 7 6 original Fig. 7. An Extraneous Edge Lemma 2: preserves connectivity. Proof: We presented G min as, G min = G 2 G4... Gn 1 According to [2] G min is the smallest subgraph with the minimum energy property. G min has no redundant edges and also preserves connectivity. Thereby, each of G i G min,for any i = 2, 3,..., n-1 is a minimum-energy path preserving graph and also preserves connectivity. G 2 G 3 is a superset of G min according to Lemma 2 G G 2 G 3 and thus, preserves connectivity. A. Topological Analysis IV. EXPERIMENTAL RESULTS By simulation we evaluate the performance of our algorithm. Initially we deployed 25-3 s over a flat square area of 67m 67m according to uniform distribution. Figure 8 shows a typical deployment of 75 s, each having a maximum communication range of 25m. This is the starting graph G for our algorithm. The graph found by G 2 is figure 9 which shows a great amount of savings than original graph G. The next graph at figure 1 is found by G 3,thisalsohas a large amount of savings with respect to original graph G at figure 8. So, both G 2 and G 3 shows good results. Now the graph that is closer to G min than G 2 and also G 3 is G 2 G 3 is shown in figure 11. This graph has the least number of links among the graphs mentioned above. Figure 12 shows the graph we found by. Here the graph has just one more linkthanthatofg 2 G 3. This implies that the performance of is much closer to G 2 G 3 but incurs much less overhead than constructing G 3 (2 hop information) to calculate G 2 G 3. We perform more simulation on our algorithm deploying 25-1 s according to zipf distribution, figure 13 shows the starting graph G of our algorithm. It is a typical deployment of 75 s, each having a maximum communication range of 25m. The next two fig shows the graph found by G 2 (figure 14) and G 3 (figure 15) where both shows good savings. In uniform distribution G 2 G 3 (figure 16) and G (figure 17) both shows same no of links. We have got the same result here without increasing the overhead, it is definitely a good achievement. Fig. 8. Original Graph (uniform distribution) no. of s G Fig. 9. G 2 (uniform distribution) no. of s Fig. 1. G 3 (uniform distribution) no. of s 75 SPECTS ISBN: Authorized licensed use limited to: Bangladesh Univ of Engineering and Tech. Downloaded on August 28, 29 at 3:48 from IEEE Xplore. Restrictions apply.

6 7 6 G2Int 7 6 G Fig. 11. G 2 G 3 (uniform distribution) no. of s Fig. 14. G 2 (Zipf distribution) no. of s Fig. 12. G (uniform distribution) no. of s 75 Fig. 15. G 3 (Zipf distribution) no. of s original 7 6 G2Int Fig. 13. Original Graph (Zipf distribution) no. of s 75 Fig. 16. G 2 G 3 (Zipf distribution) no. of s 75 SPECTS ISBN: Authorized licensed use limited to: Bangladesh Univ of Engineering and Tech. Downloaded on August 28, 29 at 3:48 from IEEE Xplore. Restrictions apply.

7 no. of links G Fig. 17. G (Zipf distribution) no. of s 75 Fig no. of s comparison between G 2 and G in Zipf distribution no. of links G no. of s TABLE I COMPARISON BETWEEN G 2 AND G IN UNIFORM DISTRIBUTION No of Edges Edges Nodes in G 2 in G Fig. 18. Comparison Between G 2 and G in Uniform distribution B. Comparison between G 2 and G Here we deployed 25-3 s over a flat square area of 67m 67m according to uniform distribution and simulate the network both for G 2 and. For illustration, Table I shows a comparison between the number of edges in G 2 and in. For a specific number of s there are five different scenarios. We have taken average number of edges or links for each set. We found here a saving of 4.85% without increasing overhead( see figure 18). Again, we simulate on a network of 25-1 s deployed over a flat square area of 67m 67m according to Zipf distribution. Table II shows a comparison between the number of edges in G 2 and in. Up to 6.18% of links is saved here (see figure 19). In both distribution the savings is quite satisfactory and considerably higher for denser networks. C. Overhead Analysis A s broadcasts NDM at first to know about its neighbors. In case of constructing G 2, the number of reply messages for any s is equal to NodeDegree(s). Nodedegree is defined as the number of neighbors it has within the region having radius R max. For constructing G 2 G 3, the number of reply messages is equal to, NodeDegree(s)+ n neighbor(s) NodeDegree(n). Now, we took the number of reply messages as overhead. To analysis on overhead cost by G 3 and G (or G 2 ) we simulate on networks of 25-3 s deployed over a flat square area of 67m 67m spread under uniform distribution ( 2) and 25-1 s deployed over a flat square area of 67m 67m according to Zipf distribution ( 21). For a specific number of s there are five different scenarios. We have taken average number of overhead messages for each set. We found that construction of G 3 causes huge amount of overhead with respect to G in both the cases. TABLE II COMPARISON BETWEEN G 2 AND G IN ZIPF DISTRIBUTION No of Edges Edges Nodes in G 2 in G SPECTS ISBN: Authorized licensed use limited to: Bangladesh Univ of Engineering and Tech. Downloaded on August 28, 29 at 3:48 from IEEE Xplore. Restrictions apply.

8 No. of overhead messages 3e+6 2.5e+6 2e+6 1.5e+6 1e+6 5 V. CONCLUSION The algorithm we have presented is a distributed algorithm that ensures minimum energy path preserving graphs in adhoc wireless networks. Our construction of is assisted by the rudimentary protocol of constructing G 2. Its need of information for an additional hop is served with no additional overhead and only through the previous information gained through G 2. Our studies assisted by some simulation results, have demonstrated the superiority and robustness of the new algorithm over the previous solutions for networks with moderate and low density of s No. of s Fig. 2. Overhead comparison between G 3 and G in Uniform distribution No. of overhead messages No. of s Fig. 21. Overhead comparison between G 3 and G in Zipf distribution TABLE III OVERHEAD COMPARISON BETWEEN G 3 AND G IN UNIFORM DISTRIBUTION No of Overhead msg. Overhead msg. Nodes in G in G REFERENCES [1] A. Rahman and P. Gburzynski, Mac-assisted topology control for ad-hoc wireless networks. International Journal of Communication Systems, vol. 19, no. 9, pp , 26. [2] L. Li and J. Halpern, Minimum energy mobile wireless networks revisited, Proc. IEEE International Conference on Communications (ICC), june, 21. [3] J. P. Monks, V. Bhargavan, and W. M. Hwu, A power controlled MAC protocol for wireless packet networks, in Proceedings of INFOCOM, 21, pp [4] S. Singh and C. Raghavendra, Power efficient MAC protocol for multihop radio networks, in Proceedings of PIMRC, 1998, pp [5] R. Ramanathan and R. Rosales-Hain, Topology control of multihop wireless networks using transmit power adjustment, in In Proc. of IEEE INFOCOM 2, Tel Aviv, Israel, March 2, pp [6] S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and P. R. Kumar, Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol, in Proceedings of the European Wireless Conference - Next Generation Wireless Networks: Technologies, Protocols, Services and Applications, Florence, Italy, February 22, pp [7] Y.-S. C. h. Sze-Yao Ni, Yu-Chee Tseng and J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, in Mobicom, [8] V. Rodoplu and T. Meng, Minimum energy mobile wireless networks, IEEE Journal of Selected Areas in Communications, vol. 17, pp , [9] N. Li, J. C. Hou, and L. Sha, Design and analysis of an MST-based topology control algorithm, in Proceedings of INFOCOM, 23. [1] T. Rappaport, Wireless communications: principles and practice, pp , TABLE IV OVERHEAD COMPARISON BETWEEN G 3 AND G IN ZIPF DISTRIBUTION No of Overhead msg. Overhead msg. Nodes in G in G SPECTS ISBN: Authorized licensed use limited to: Bangladesh Univ of Engineering and Tech. Downloaded on August 28, 29 at 3:48 from IEEE Xplore. Restrictions apply.

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University

More information

WIRELESS ad-hoc networks are emerging day by day

WIRELESS ad-hoc networks are emerging day by day Load and Energy Aware Topology Control in Wireless Ad-hoc Networks Tandra Chakraborty, Fazlay Rabbi, Aungon Nag Radon, Student Member, IEEE and Ashikur Rahman Department of Computer Science, University

More information

MAC-assisted topology control for ad hoc wireless networks

MAC-assisted topology control for ad hoc wireless networks INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2006; 19:955 976 Published online 13 January 2006 in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/dac.776 MAC-assisted

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

On the Expected Size of Minimum-Energy Path-preserving Topologies for Wireless Multi-hop Networks

On the Expected Size of Minimum-Energy Path-preserving Topologies for Wireless Multi-hop Networks On the Expected Size of Minimum-Energy Path-preserving Topologies for Wireless Multi-hop Networks Ashikur Rahman and Nael Abu-Ghazaleh Department of Computer Science, Thomas J. Watson School of Engineering

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Dual Power Management for Network Connectivity in Wireless Sensor Networks Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Power Aware Routing using Power Control in Ad Hoc Networks

Power Aware Routing using Power Control in Ad Hoc Networks Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Chapter 5 To T pology C o C ntrol

Chapter 5 To T pology C o C ntrol Chapter 5 Topology Control Outline 5.1. Motivations and Goals 5.2. Power Control and Energy Conservation 5.3. Tree Topology 5.4. k-hop Connected Dominating Set 5.5. Adaptive node activity 5.6. Conclusions

More information

Journal of Wireless Sensor Networks. Topology control in Heterogeneous Wireless Sensor Network

Journal of Wireless Sensor Networks. Topology control in Heterogeneous Wireless Sensor Network JWSN 216, 3, 1-18 Journal of Wireless Sensor Networks ISSN: 21-6417 www.wsn-journal.com Article Topology control in Heterogeneous Wireless Sensor Network Deepak Dandekar 1, *, Prashant Deshmukh 2 1 Electronics

More information

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

More information

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs R. Madhanmohan Assistant Professor, Department of Computer Science and Engineering, Annamalai University, Annamalai nagar, Tamilnadu, India ABSTRACT A MANET

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger

Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Overview What is Topology Control? Context related work Explicit interference model Interference

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

Glasgow eprints Service

Glasgow eprints Service Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,

More information

A Novel Power Optimized Routing Model for Mobile Ad Hoc Networks

A Novel Power Optimized Routing Model for Mobile Ad Hoc Networks A Novel Power Optimized Routing Model for Mobile Ad Hoc Networks Ashay Indrabhan Rokade Mtech, VVIT College Hyderabad, India rokadeashay@gmail.com Abstract: In today s world, Energy preservation is significant

More information

Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks

Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks Wireless Sensor Network, 2017, 9, 73-86 http://www.scirp.org/journal/wsn ISSN Online: 1945-3086 ISSN Print: 1945-3078 Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks Raqeebir Rab 1,

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Optimal Placement of Base Stations in a Two Tiered Wireless Sensor Network

Optimal Placement of Base Stations in a Two Tiered Wireless Sensor Network Optimal Placement of Base Stations in a Two Tiered Wireless Sensor Network B.PAUL 1, M. A. MATIN 2, M. J. SHOWKAT 3, Z. RAHMAN 4, Department of Electrical Engineering and Computer Science North South University,

More information

A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks

A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks Yuan Xue Department of Computer Science University of Illinois at Urbana-Champaign Baochun Li Department of Electrical and Computer

More information

The COMPOW Protocol for Power Control in Ad Hoc Networks

The COMPOW Protocol for Power Control in Ad Hoc Networks The COMPOW Protocol for Power Control in Ad Hoc Networks Swetha Narayanaswamy, Vikas Kawadia, R.S Sreenivas and P.R. Kumar Coordinated Science Laboratory University of Illinois, Urbana-Champaign The Power

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Mobility-Aware Distributed Topology Control for Mobile Multi-hop Wireless Networks

Mobility-Aware Distributed Topology Control for Mobile Multi-hop Wireless Networks Mobility-Aware Distributed Topology Control for Mobile Multi-hop Wireless Networks Zeeshan Hameed Mir, Deepesh Man Shrestha, Geun-Hee Cho, and Young-Bae Ko Graduate School of Information and Communication,

More information

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Ms. Nutan Julka 1, Prof. Dr. J.W Bakal 2 1 Dept. of Computer Science, Pillais Institute of Information Technology,

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Energy Saving and Connectivity Tradeoff by Adaptative Transmission Range in g MANETs

Energy Saving and Connectivity Tradeoff by Adaptative Transmission Range in g MANETs Energy Saving and Connectivity Tradeoff by Adaptative Transmission Range in 80.11g MANETs Fatiha Djemili Tolba University of Haute Alsace, 68008 Colmar, France fatiha.tolba@uha.fr Damien Magoni ULP LSIIT

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks

Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks 1 Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks Mihaela Cardei, Mohammad O. Pervaiz, and Ionut Cardei Department of Computer Science and Engineering Florida Atlantic University

More information

Chapter 8: Energy Conservation. MANETs. Prof. Yuh-Shyan Chen Department t of Computer Science and Information Engineering

Chapter 8: Energy Conservation. MANETs. Prof. Yuh-Shyan Chen Department t of Computer Science and Information Engineering Chapter 8: Energy Conservation for Broadcast Routing in MANETs Prof. Yuh-Shyan Chen Department t of Computer Science and Information Engineering National Taipei University 1 Outline Introduction Energy-Efficient

More information

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic

More information

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee

More information

Distributed Topology Control in Ad-Hoc Networks: A Game Theoretic Perspective

Distributed Topology Control in Ad-Hoc Networks: A Game Theoretic Perspective This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2006 proceedings. Distributed Topology Control in Ad-Hoc Networks:

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

LOCALIZED MOVEMENT CONTROL FOR FAULT TOLERANCE OF MOBILE ROBOT NETWORKS

LOCALIZED MOVEMENT CONTROL FOR FAULT TOLERANCE OF MOBILE ROBOT NETWORKS LOCALIZED MOVEMENT CONTROL FOR FAULT TOLERANCE OF MOBILE ROBOT NETWORKS Shantanu Das 1, Hai Liu 1, Ajith Kamath 1, Amiya Nayak 1, and Ivan Stojmenovic 1 ' 2 1 School of Information Technology and Engineering,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 147 A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop Networks Li (Erran) Li, Member, IEEE, Joseph Y. Halpern,

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

Proposal of interference reduction routing for ad-hoc networks

Proposal of interference reduction routing for ad-hoc networks Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,

More information

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2 , Vol 9(8), DOI: 10.17485/ijst/2016/v9i8/87948, February 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2 R.

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Packet Routing using Optimal Flooding Protocol in Cluster based MANET IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

A3: A Topology Construction Algorithm for Wireless Sensor Networks

A3: A Topology Construction Algorithm for Wireless Sensor Networks A3: A Topology Construction Algorithm for Wireless Sensor Networks Pedro M. Wightman 1 and Miguel A. Labrador Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu

More information

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks

Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks Jie Wu and Fei Dai Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Department of Electrical

More information

A New Approach for Interference Aware Cost Effective Routing Algorithm in Wireless Sensor Network

A New Approach for Interference Aware Cost Effective Routing Algorithm in Wireless Sensor Network 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore A New Approach for Interference Aware Cost Effective Routing Algorithm

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Roger Wattenhofer Li Li Paramvir Bahl Yi-Min Wang Microsoft Research CS Dept. Cornell University Microsoft

More information

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm Journal of Computer Science 7 (1): 46-51, 2011 ISSN 1549-3636 2011 Science Publications Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Mihaela Cardei, Jie Wu, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 {mihaela,jie}@cse.fau.edu,

More information

A Power Control MAC Protocol for Ad Hoc Networks

A Power Control MAC Protocol for Ad Hoc Networks A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A&M University, College Station esjung@cs.tamu.edu Nitin H. Vaidya Dept. of Electrical and Computer Engineering,

More information

Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks

Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks Enhanced Partial Dominant Pruning (E) Based Broadcasting in Ad hoc Wireless Networks Ashikur Rahman, Md. Endadul Hoque, Farzana Rahman, Sabuj Kumar Kundu Department of Computer Science Engineering (CSE)

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Hop Count Aware Broadcast Algorithm with Random Assessment Delay Extension for Wireless Sensor Networks

Hop Count Aware Broadcast Algorithm with Random Assessment Delay Extension for Wireless Sensor Networks Hop Count Aware Broadcast Algorithm with Random Assessment Delay Extension for Wireless Sensor Networks Shintaro Izumi, Takashi Matsuda, Hiroshi Kawaguchi, Chikara Ohta, and Masahiko Yoshimoto Graduate

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi IRTF ANS WG Meeting, November 12, 2003 Notes on Scalability of Wireless Ad hoc Networks Onur Arpacioglu, Tara Small and Zygmunt J. Haas , which extends

More information

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information