An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks

Size: px
Start display at page:

Download "An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks"

Transcription

1 An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons have rapdly ncreased. However, energy consupton stll reans the an ltaton of ths technology. As councaton typcally accounts for the aor power consupton, transcever actvty should be nzed, n order to prolong the network lfete. To ths end, we have developed an Adaptve Staggered sleep Protocol (ASLEEP) for effcent power anageent n wreless sensor networks targeted to perodc data acquston. The proposed protocol dynacally adusts nodes sleep schedules to atch the network deands, even n te-varyng operatng condtons. In addton, t does not requre any a-pror knowledge of the network topology or traffc pattern. ASLEEP has been extensvely studed wth sulaton and easureents n a real testbed. In both cases, the results obtaned show that, under statonary condtons, the algorth effectvely reduces the energy consupton of sensor nodes, by dynacally adustng ther duty-cycle to the current traffc needs, thus ncreasng sgnfcantly the network lfete. Wth respect to slar nonadaptve solutons, t also reduces the average essage latency and ncreases the delvery rato. Under te-varyng condtons the algorth s able to react quckly and adapt the duty-cycle of sngle nodes to the new operatng condtons whle keepng a consstent sleep schedule aong sensor nodes. I. INTRODUCTION A wreless sensor network (WSN) conssts n a large nuber of tny sensor nodes deployed over a geographcal area. Each node s a low-power devce that ntegrates coputng, wreless councaton, and sensng capabltes. Sensor nodes are thus able to sense physcal envronental nforaton (e.g., teperature, hudty, vbratons, acceleratons) and process the acqured data locally, or send the to one or ore collecton ponts, usually referred to as snks or base statons. Hence, WSNs can be vewed as an ntellgent dstrbuted nstruentaton, whch can be effectvely used n any dfferent contexts []. The set of potental WSN applcatons s extreely large. However, ontorng applcatons can partcularly beneft fro sensor networks as they allow a long-ter data collecton at scales and resolutons that are dffcult, f not possble, to acheve wth tradtonal technques [29]. Typcally, data loggers are used to collect data. These devces are large and expensve, and requre a recordng and analyss equpent n place. Ths not only lt the accuracy of the recorded data, but can also dsturb the natural behavor of the observed phenoena. In addton, these devces consue a lot of energy and requre frequent huan nterventons. Instead, sensor nodes are very sall and cheap devces so that they can be eployed for fne-graned data collecton. They can self organze nto sensor networks and cooperate to perfor an assgned task wthout huan nterventon. Ths akes WSNs partcularly sutable for scenaros where the huan presence s dangerous or possble (.e. a checally contanated feld). In addton, the ease of deployent and the ablty of unattended operatons ake WSNs capable to replace ordnary nstruentaton also n ndustral, edcal and agrcultural scenaros. In recent years the nuber of sensor network deployents for real-lfe applcatons has rapdly grown up and, based on recent studes [33] [34], ths trend s expected to ncrease draatcally n the next years, anly n the felds of logstcs, autoaton and control. However, energy consupton stll reans the an obstacle to the dffuson of ths technology, especally n applcaton scenaros where a long network lfete s requred. The key ssue s that sensor nodes are generally powered by batteres whch have lted capacty and, often, cannot be replaced nor recharged, due to envronental or cost constrants. Therefore, effcent energy conservaton strateges ust be devsed at sensor nodes n order to prolong the network lfete. If we break down the energy expendture of a sensor node we can see that the rado subsyste typcally consues uch ore than the sensng and processng coponents. In addton, whle beng dle, the rado transcever consues approxately the sae power as n the transt or receve odes [38]. On the other hand, t consues sgnfcantly less power when t s put n sleep (low power) ode. Thus, the ost effectve approach to energy conservaton s dutycyclng, whch conssts n puttng the rado n sleep ode durng dle perods. Sensor nodes alternate between sleep and wakeup perods, and they have to coordnate each other by agreeng on an approprate sleep schedule n order to ake councaton feasble and effcent []. Unfortunately, desgnng effcent duty-cyclng schees s not straghtforward. Frst, duty-cyclng ntroduces addtonal Ths work s funded partally by the European County n the fraework of the Meory proect, and partally by the Italan Mnstry for Educaton and Scentfc Research (MIUR) n the fraework of the FIRB ArtDeco proect. Guseppe Anastas s wth Dept. of Inforaton Engneerng, Unv. of Psa, Italy, (e-al: g.anastas@et.unp.t) Marco Cont s wth IIT-CNR, Psa, Italy (e-al: arco.cont@t.cnr.t) Maro D Francesco s wth Dept. of Inforaton Engneerng, Unv. of Psa, Italy, (e-al: aro.dfrancesco@et.unp.t)

2 delays n the essage delvery process, as essages cannot be transtted untl the next hop wakes up. Moreover, latency requreents are hghly dependent on the applcaton. For exaple, obect trackng or event detecton requre quck response to the observed phenoena, so hgh latences ay not be tolerated. Desgnng energy effcent solutons whch at the sae te provde low latency n essage delvery s thus a challengng task. Second, ost duty-cyclng schees use fxed paraeters..e., the wakeup and sleep perods are defned before the deployent and cannot be changed durng the operatonal phase. Fxed duty-cyclng schees requre rather sple coordnaton echanss but, typcally, have non-optal perforance. Adaptve schees are thus requred to adust the sleep/wakeup perods, dependng on the observed operatng condtons. In ths paper we present an Adaptve Staggered sleep Protocol (ASLEEP) whch autoatcally adusts the actvty of sensor nodes, achevng both low power consupton and low essage latency. Ths protocol s targeted to data collecton applcatons (e.g. envronental ontorng [29], [45]), n whch sensor nodes have to perodcally report to a snk node. Wth respect to other slar approaches, our schee provdes two an advantages. Frst, t s not ted to any partcular MAC (Medu Access Control) protocol, so that t can be used wth any sensor platfor. Second, t s able to quckly adapt sleep/wakeup perods of each sngle node to the actual operatng condtons (e.g., traffc deand, network congeston, lnk qualty, node densty etc.), resultng n a better utlzaton of the energy resources, hence n a longer network lfete as well. A prelnary sulaton analyss, carred out n a few representatve scenaros, has shown that the perforance of ASLEEP s very prosng [4]. In ths paper we extend the analyss to ore general scenaros where sensor nodes are randoly deployed. In addton, we present a detaled analyss of the perforance durng steady state operatons. Our fndngs are also supported by soe experental results obtaned fro easureents carred out n a real testbed [3]. Both sulaton and experental results show that, thanks to ts flexblty, ASLEEP largely outperfors coonly used fxed duty-cyclng schees n ters of energy effcency, essage latency, and delvery rato as well. Hence, ASLEEP turns out to be a sgnfcant proveent n the context of ontorng, akng thus possble a long-ter deployent of WSNs. The reander of ths paper s organzed as follows. Secton II surveys the related work. Secton III ntroduces the reference syste odel and outlnes the an desgn prncples. Secton IV descrbes the ASLEEP protocol. Secton V presents the sulaton setup and the results. Secton VI descrbes a prototype pleentaton of ASLEEP n a real testbed and copares experental and sulaton results. Fnally, Secton VII concludes the paper. II. RELATED WORK A very large nuber of energy conservaton schees for WSNs have been proposed n the last years. The reader can refer to [5] for a detaled survey on the ost relevant proposals. In the followng we wll focus on duty-cyclng,.e., technques aed at nzng the energy consupton of a sensor node by adaptvely swtchng off the rado subsyste durng dle tes. Accordng to [], duty-cyclng can be acheved through two dfferent (and copleentary) approaches: topology control and power anageent. Topology control protocols [8], [9] explot nodes redundancy and adaptvely actvate the nu subset of nodes whch allow network connectvty. Nodes whch are not currently needed for connectvty can swtch off ther rado and save energy. Ths ncreases the network lfete by a factor (typcally n the order of 2-3) that depends on the degree of redundancy. The reader can refer to [2] and [4] for detaled surveys on topology control protocols. However, even nodes selected by the topology control protocol do not need to rean actve all the te. Instead, they can swtch off ther rado when there s no network actvty, thus alternatng between sleep and wakeup perods. Power anageent protocols are aed at coordnatng the sleep perods of neghborng nodes approprately, so as to allow councaton even n presence of a very low duty-cycle. As sensor nodes actvty s typcally very lted, power anageent protocols can reduce the energy consued by a node to soe percent (wth respect to the case wthout power anageent), thus ncreasng sgnfcantly the network lfete. In the followng we wll focus on power anageent protocols. Power anageent can be pleented ether at the MAC layer by ntegratng a duty-cyclng schee wthn the MAC protocol or as an ndependent sleep/wakeup protocol on top of the MAC layer (e.g., at the network or applcaton layer). The frst knd of approach allows to optze edu access functons based on the specfc sleep/wakeup pattern used for power anageent. On the other hand, general sleep/wakeup protocols pert a greater flexblty as they can be talored to the applcaton needs, and, n prncple, can be used wth any MAC protocol. The soluton proposed n ths paper belongs to the class of ndependent sleep/wakeup protocols. We detal the two classes of power anageent technques below. II.A MAC protocols wth a low duty-cycle Several coon MAC protocols for wreless sensor networks nclude a duty-cyclng schee for energy savng. For exaple, B-MAC (Berkeley MAC) [37] defnes a dutycycle through a channel saplng technque called Low Power Lstenng (LPL) and based on essages wth long preables. Nodes wake up perodcally (.e., every check nterval) to check the channel for actvty, and rean awake as long as the channel s beng used. The preable duraton of each B-MAC frae s at least equal to the duraton of the check nterval, so that each node can always detect an ongong transsson when t wakes up. The S-MAC (Sensor- MAC) protocol [49], nstead, defnes a dstrbuted schedule dssenaton schee n order to for vrtual clusters,.e. set of nodes whch agree on the sae sleep schedule. The channel access te s splt n a lsten perod (nodes exchange sync packets to coordnate ther sleep/wakeup perods and 2

3 specal control packets for collson avodance) and a data transfer perod. Nodes not concerned wth the councaton process can sleep untl the next lsten perod. The IEEE MAC protocol [7] supports a beaconenabled ode based on a superfrae structure. Each superfrae conssts of an actve perod and an nactve perod. In the actve perod sensor nodes councate wth the coordnator node they assocated wth. Durng the nactve perod nodes enter a low power ode to save energy. All the above energy conservaton schees are statc. An proveent over the aforeentoned solutons s represented by MAC protocols wth an adaptve duty-cycle schee. T-MAC (Teout MAC) [], provdes a teoutbased echans to talor the actvty perod of nodes to ther actual needs. Also a refneent of S-MAC proposed n [5] ncludes an adaptve lstenng echans whch can adapt the actvty of nodes to sudden changes n the network traffc. Although they present a basc for of adaptaton, these protocols suffer fro an addtonal latency n essage forwardng. Ths sleep latency s ntroduced because a forwardng node has to wat untl the next hop wakes up before transttng a essage, and t ncreases wth the nuber of hops. Ths s a proble coon to all protocols operatng at the MAC layer. The ost effectve way to overcoe ths ssue conssts n explotng upper layer nforaton as n DMAC [25], whch s an adaptve dutycycle MAC protocol optzed for sensor-network routng trees. DMAC explots the knowledge of the topology n order to stagger nodes schedules accordng to ther poston n the routng tree. However, to the best of our knowledge, t has not been pleented on real sensor platfors. Another approach for pleentng duty-cyclng at the MAC layer conssts n usng a TDMA (Te Dvson Multple Access) approach for channel access [4], [2], [3], [22], [39]. In such schees te s dvded n slots that are assgned to nodes accordng to a certan algorth. Slotted schees are nherently energy effcent as nodes rean actve only durng slots assgned to the. On the other hand, they have a nuber of drawbacks that lt ther usage n real WSNs [4]: () they lack flexblty n adaptng to topology changes caused by te-varyng channel condtons, physcal envronental changes, nodes that run out of energy, and so on; () they have lted scalablty, () they requre tght synchronzaton aong network nodes, whch ntroduces a overhead n ters of control-essage exchange and, thus, addtonal energy consupton, (v) fndng an nterferencefree schedule s a very hard task snce nterference ranges are typcally larger than transsson ranges,.e., any network nodes ay nterfere even f they are not n the transsson range of each other [2]. In concluson, duty-cycled MAC protocols allow the desgner to optze the channel access fro an energy conservaton perspectve. However, they lack flexblty as a specfc MAC protocol could not be always used n an actual sensor platfor. In addton, t ght be unable to explot nforaton ade avalable by the applcaton. On the other sde, general sleep/wakeup protocols are ore flexble as they can be used on top of dfferent MAC protocols. In addton, they can better explot applcaton-specfc nforaton. II.B General sleep/wakeup schees We can broadly classfy general sleep/wakeup schees nto three an categores: on deand, asynchronous and scheduled rendezvous schees. On-deand schees assue that destnaton nodes can be awakened soehow ust before recevng data. To ths end, two dfferent rado transcevers are typcally used [42], [48]. The frst rado (data rado) s used durng the regular packet exchange, whle the second one (wakeup rado) s a very low-power rado whch s used to awake a target node when needed. These schees can acheve a very hgh energy effcency and a very low latency. However, they cannot be always used n practce because coonly avalable sensor platfors only have one rado. In addton, the wakeup rado has typcally a transsson range sgnfcantly shorter than the data rado. A dfferent opton s usng an asynchronous schee [9], [35], [48], [5]. In ths case a node can ust wakeup whenever t wants and stll be able to councate wth ts neghbors. Although beng robust and easy to pleent, asynchronous schees generally present hgh latency n essage forwardng and have probles wth broadcast traffc. The last class of general sleep/wakeup protocols s represented by scheduled rendezvous schees, whch requre that nodes are synchronzed and all neghborng nodes wake up at the sae te. Our ASLEEP protocol belongs to the last category. By focusng on scheduled rendezvous schees, a possble approach conssts n establshng a coarse-graned TDMA schedule defned at the applcaton layer, and explotng an underlyng MAC protocol for actual data transfer. Ths approach s used by Flexble Power Schedulng (FPS) [5], [6], whch ncludes an on-deand reservaton echans capable to dynacally adapt to traffc deands. Snce slots are relatvely large a strct synchronzaton aong nodes s not requred. However, FPS borrows soe drawbacks [4] fro TDMA schees,.e. t has lted scalablty and flexblty n adaptng to traffc and topology changes. Most solutons followng a scheduled rendez-vous approach use plan duty-cycle based schees. For nstance, the wellknown TnyDB query processng syste [46] nclude a sleep/wakeup schee based on a fxed duty-cycle. All sensor nodes n the network wake up at the sae nstant and rean actve for a fxed te nterval. An proveent over ths sple approach s the staggered schee ncluded n TAG (Tny AGgregaton) [27], whch reles on a routng tree rooted at the snk node. In ths schee the actve tes of sensor nodes are staggered accordng to ther poston n the routng tree. Nodes located at dfferent levels of the routng tree wake up at dfferent, progressve tes, lke n a ppelne. Due to ts nce propertes ths schee has been consdered and/or analyzed n any subsequent papers ([7], [24], [25], [26], [3] aong others). In partcular, the authors of [2] analyze the perforance of the TAG staggered approach as well as several ts varants. Although provdng a basc for of adaptaton (wakeup tes are staggered to the network topology), ths schee s not 3

4 able to react to varyng operatng condtons as actve tes are fxed and equal for all nodes n the networks. Ths constrant splfes the coordnaton aong nodes, but results n low energy effcency and hgh essage latency. Lke TAG, our proposal leverage a staggered approach. However, n our proposal nodes actve perods are dynacally adapted to the observed network condtons and can be talored to the actual needs. By nzng the actve perod of each sngle node, our adaptve protocol (sgnfcantly) ncreases network lfete and reduces essage latency. III. NETWORK MODEL AND DESIGN PRINCIPLES In the followng we wll refer to a data collecton scenaro where data typcally flow fro source nodes to the snk, whle data fro the snk to the sources are uch less frequent. We wll assue that nodes are organzed to for a logcal routng tree (or data gatherng tree) rooted at the snk and used for data forwardng. Ths s very coon n practce as any popular routng protocols rely on a routng tree [8], [25], [27], [3], [43], [46]. The routng tree ay change over te due to lnk falures, node falures, or nodes runnng out of energy. Also, t ay be re-coputed perodcally to better share energy consupton aong nodes. However, as nodes are assued to be statc, we wll assue that the routng tree once establshed reans stable for a reasonable aount of te. Note that ASLEEP do not requre a specfc algorth to buld the routng tree. In the above network odel, nodes can acheve both low energy consupton and low latency n transferrng data to the snk f ther actve perods are staggered accordng to the poston along the routng tree. Nodes at dfferent tree levels wake up at progressve tes startng fro leaf nodes and proceedng upward to the root (.e., snk). Ths optzes the latency experenced by essages flowng fro source nodes to the snk [2]. In [2] t s shown that essages delvered to the snk experence a axu latency gven by the su of actve perods of all traversed nodes, whle essages flowng n the opposte drecton can traverse only one level per data reportng perod. However, to nze the energy consupton and essage latency n the above staggered schee, the followng desgn prncples should also be taken nto account. A sensor node should rean actve for the nu te requred for recevng data fro all ts chldren and forwardng the to ts parent. Accordng to [2], ths nzes both energy consupton and essage latency. Snce the optal actve perod depends on the network operatng condtons, t should be adusted dynacally. The optal actve perod should be chosen on an ndvdual bass. As sensor nodes located at dfferent locatons typcally handle dfferent aounts of traffc and experence dfferent network condtons, the optal actve perod should be talored to each ndvdual sensor node. The algorth for decdng the node s actve perod should be local and sple. Ths further reduces energy consupton at sensor nodes, because a global algorth would requre the exchange of nforaton aong nodes. In addton, a coplex algorth ght not be sutable for sensor nodes wth lted coputatonal capacty. Protocol operatons should ensure a consstent networkwde schedule when local condtons change. A varaton n the actve perod of a sngle sensor node should not coprose the correctness and energy effcency of the global schedule. As a consequence, a robust cooperaton echans s requred for nodes to anage the networkwde sleep schedule. Our adaptve sleep protocol descrbed below addresses all the above desgn prncples. In fact, t s based on a staggered schee, and allows each sngle sensor node to adust dynacally ts own actve perod based on local easureents of the current network actvty. Fnally, t ncludes a sleep coordnaton algorth to re-organze the global sleep schedule when a varaton n the talk nterval of a node occurs. IV. PROTOCOL DESCRIPTION In ths secton we present the ASLEEP protocol. After a general overvew, we wll descrbe the core coponents of the protocol,.e., the sleep predcton algorth each node uses for dynacally estatng ts expected actve perod, and the sleep coordnaton algorth used to propagate the new sleep schedule throughout the network. Fnally, we wll descrbe soe optzatons to prove the robustness and the effcency of the protocol. k IV.A TI Node status TI Awake Sleep CP Fgure. Sleep schedulng protocol paraeters. Protocol Overvew As entoned n Secton III, sensor nodes are assued to for a logcal routng tree (rooted at the snk) for data forwardng, whch s recoputed perodcally. Nodes clocks are assued to be synchronzed by soe te synchronzaton protocol (e.g. [36]). The councaton between a parent and ts chldren occurs n councaton perods (CPs) that repeat perodcally. Each councaton perod ncludes an actve nterval (AI) durng whch nodes councate by usng the underlyng MAC protocol, and a slence nterval (SI) durng whch nodes turn ther rado off to save energy. As shown n Fgure, actve ntervals are staggered so that nodes at lower levels n the routng tree wake up earler than ther ancestors. Each (nteredate) sensor node spans ts actvty over two adacent talk ntervals (TI), the frst one wth ts chldren and the other one wth ts 4

5 parent. Throughout, we wll refer to the talk nterval shared by a generc node and all ts chldren, durng the -th councaton perod CP, as TI. The duraton of the talk nterval to be shared wth chldren n the next councaton perod s dynacally estated by each parent node, accordng to the algorth descrbed n Secton IV.B. Although parent nodes can ndependently set ther talk nterval, a collectve effort s needed for the schedule of the whole network to rean consstent and energy effcent. Hence, as a result of a change n the talk nterval of a sngle parent node, the network-wde schedule needs to be rearranged. Ths s accoplshed by approprately shftng actve ntervals of a nuber of nodes, so as to ensure that () the actve ntervals of all nodes are properly staggered, and () the two talk ntervals of each node are contguous (see Secton IV.C). Two specal essages, drect beacons and reverse beacons, are used for propagatng schedule paraeters to downstrea and upstrea nodes, respectvely. Drect beacons are broadcast by every parent node to all ts chldren durng each councaton perod. Instead, reverse beacons are sent n the opposte drecton.e., fro a chld to ts parent at any te durng the talk nterval. As drect beacon essages are crtcal for correctness, ASLEEP also ncludes echanss to () ncrease the probablty of successful recepton durng drect beacon transssons, and () enforce a correct (even f non-optal) behavor of nodes n case they ss a drect beacon. These echanss wll be dscussed n Secton IV.D. We antcpate here that, to ncrease the probablty of successful recepton, drect beacons are transtted n a specfc te nterval reserved only for drect beacon transsson (Beacon Perod). IV.B Talk Interval Predcton In the ASLEEP protocol a sleep schedule s bascally defned by the councaton perod and the talk nterval of each ndvdual node. The length of the councaton perod s closely related to the specfc applcaton and thus, t s a global paraeter specfed by the snk when dstrbutng the query. For exaple, the user can query the axu value of teperature, to be collected every two nutes. In ths case the councaton perod s set to two nutes by each sensor node. A varaton n the councaton perod corresponds to a odfcaton of the query,.e. the new nterval for the perodc data acquston. Choosng an approprate talk nterval s soewhat ore nvolved. Ideally, each parent node should set the talk nterval wth ts chldren to the nu te needed to successfully receve all essages fro all chldren. However, ths te depends on a nuber of factors such as nuber of essages to be receved, underlyng MAC protocol, channel condtons, degree of contenton, and so on. Furtherore, the nuber of essages to be receved depends on the nuber of chldren, the essage generaton rate at source nodes, and the network topology. Obvously, the snk has only the talk nterval wth ts chldren, whle leaf nodes have only the talk nterval wth ther parent. 5 Fro the above dscusson t clearly eerges that coputng the deal talk nterval would requre the global knowledge of the network. Moreover, ths value should be contnuously updated as the network topology and operatng condtons change over te. Snce such an approach s not practcal, we propose here an adaptve technque that approxates ths deal schee. Our approach lets every parent node choose ts own talk nterval wth ts chldren. The decson nvolves only local nforaton and, thus, t does not requre to know the network topology. In prncple, any algorth can be used to estate the expected talk nterval n the next councaton perod. We used the sple algorth dscussed below. Each parent node easures and stores the followng quanttes. Message nter-recepton te ( ). Ths s the dfference between the te nstants at whch two consecutve essages are correctly receved. Nuber of receved essages ( n pkt ). The total nuber of essages correctly receved n a sngle councaton perod. The te expected to get all essages sent by chldren n the ax next councaton perod s then estated as, ax where and n are the average nter-recepton te and pkt the axu nuber of receved essages over the last L councaton perods (observaton wndow), respectvely. Usng n s a conservatve choce to nze the essage ax pkt loss probablty. The above te nterval should be ncreased approprately to allow the parent node to send a drect beacon at the end of talk nterval. Fnally, to reduce the nuber of possble values, the expected talk nterval s dscretzed nto a nuber of te slots, whose duraton s denoted by q. Hence, the expected talk nterval for the ()-th councaton perod can be expressed as TI ax = cel( n + BP) / q) q, where BP est denotes the Beacon Perod,.e., a te nterval reserved for beacon transsson only (see Secton IV.D.), and q denotes the te slot. The q value should be chosen as a trade-off between effcency and stablty. Fro one hand, a low q value allows a fne granularty n settng the talk nterval duraton, but ay ntroduce frequent changes n the sleep schedule. On the other hand, a large q value akes the schedule ore stable, but ay lead to talk ntervals larger than necessary, thus wastng energy. It ay be worthwhle notng that the expected talk nterval cannot be lower than one slot. Ths guarantees that any chld has always a chance to send essages to ts even after a phases durng whch t had no traffc to send. + Advertsng TI est to chldren as the next talk nterval ght lead to soe flappng of the protocol paraeters. To sooth the varaton of estates, the talk nterval for the next councaton perod, g s deterned as follows. If TI + TI g then TI s edately set to the est + estated value (.e., + TI = TI est ). If the predcted talk nterval s below the current value and the dfference s greater than, or equal to a guard threshold g down 2q (.e., pkt n pkt

6 TI TI est + g ) then the talk nterval s decreased by down ust one te slot ( TI + = TI q ). Fnally, f < TI TI est < g down, the talk nterval s not edately decreased. When the sae condton perssts for a nuber L down of councaton perods, then the talk nterval s reduced anyway. Accordng to the above rules, an ncrease n the talk nterval s anaged less conservatvely than a decrease. Ths s because an aggressve ncrease tends to nze the probablty that a node can ss essages fro ts chldren. IV.C Sleep Coordnaton As antcpated n Secton IV.A, the sleep coordnaton algorth s based on two specal essages (drect and reverse beacons), and the sleep schedule re-arrangeent after a talk nterval varaton s accoplshed by approprately shftng node s talk ntervals so as to ensure that the network-wde schedule reans consstent. Drect beacons are broadcast at each councaton perod by every parent node durng the Beacon Perod,.e. at the end of the talk nterval wth ts chldren. They nclude the schedule paraeters for the next councaton perod. Specfcally, the drect beacon sent by a node n the -th councaton perod contans: the length of the next councaton perod CP ; ts next wakeup te t ; the length of the next talk nterval to be shared wth ts chldren ( TI ). Conversely, reverse beacons are sent by chld nodes. They ay be sent at any te durng the talk nterval, and only nclude the aount of te the talk nterval of the parent node has to be shfted. As schedules are local, nodes only have to coordnate wth ther.e. they have to know the wakeup te of ther and use t as a bass for establshng schedules wth ther chldren. Let s dscuss now the operatons perfored by ASLEEP when the operatng condtons change. The nterested reader can refer to the Appendx A for a n-depth descrpton of the algorth and ts pseudo-code. In the followng, we wll descrbe the an operatons perfored durng talk nterval changes. There are two optons: a talk nterval ncrease or a talk nterval reducton. In both cases, ASLEEP enters a transent phase whch s requred to propagate the new schedulng paraeters and ensure that the new network-wde schedule s consstent and energy-effcent. Recall that a generc node has frst the talk nterval wth ts chldren, and then the talk nterval wth ts parent. As a consequence, a node advertses schedule paraeters to ts chldren before recevng the updated nforaton cong fro the parent. Hence, there ght be the case n whch the two talk ntervals (the one wth the chldren and the other wth the parent) are not adacent. In such a stuaton, the node nserts a pause perod, n whch t cannot councate wth any other node. Ths ensure that the new (transent) schedules are consstently 6 handled durng transent schedule propagaton. Note that nodes can go to sleep durng the pause perod (f t s long enough to ake t convenent to swtch off and on agan). In addton, pause perods are only used durng the transent phase, so that they are not present n steady state condtons. Further detals are gven n the followng dscusson. l l n+3 n+3 k n+2 k k n+ (level) n+2 n+ (level) n n Key Actve perod Sleep perod Pause perod Beacons CP CP (a) Talk nterval reducton CP CP CP 2 (b) Talk nterval ncrease Fgure 2. Talk nterval adaptaton exaples 2 3 CP 2 When a node shortens the talk nterval wth ts chldren, t also defers ts actvaton by a perod correspondng to the dfference between the prevous talk nterval and the new one. To better understand, let s consder the case llustrated n Fgure 2a. Let s suppose that durng the -th councaton perod a node at the (n+)-th level has decded to reduce ts forthcong talk ntervals wth ts chldren,.e., nodes at the (n+2)-th level (ncludng k). In the -th councaton perod node announces the next talknterval duraton to ts chldren by eans of the drect beacon (). The chldren receve the drect beacon and wat for the next councaton perod CP to nfor ther chldren.e., nodes at the (n+3)-th level of the new schedulng paraeters (2). Because of ths, nodes at the (n+2)-th level ntroduce a pause perod between ther talk nterval wth ther parent and the other wth ther chldren. Ths behavor ensures that nodes at the (n+3)-th level (e.g., node l) do not lose coordnaton wth ther because they have already sent the nforaton about ther wakeup tes. The above actons are repeated by nodes at the (n+3)-th level and ther descendants (f any) n the next councaton perods (3). Therefore, the pause perod shfts to lower levels one councaton perod at a te. Hence, a new steady state schedule s reached after a nuber of councaton perods equal to the depth of the subtree rooted at the node orgnatng the new paraeters. Note that only the descendants of the node whch reduces the talk nterval are affected by the transent phase through the pause perod. The other nodes ust operate wth ther own paraeters as usual. A slar approach s eployed also when a node ncreases the talk nterval wth ts chldren. In ths case, the node has to force ts ancestors to defer ther talk ntervals, n order to accoodate the addtonal te requred for councaton. To ths end, the node akes use of reverse beacons, whch are sent to ts parent and forwarded up to the tree untl the snk node s reached. Note that ths step s

7 requred to ensure the correctness of the protocol,.e. that the talk ntervals of nteredate nodes do not overlap. As above, the exaple depcted n Fgure 2b wll help us understandng. Let s suppose that node k at the (n+2)-th level of the tree decdes to ncrease the talk nterval wth ts chldren,.e., nodes at the (n+3)-th level (ncludng node l). Frst, node k advertses the new talk nterval to ts chldren through the drect beacon (). Second, n the sae councaton perod, the node sends the reverse beacon (2) to ts parent at the (n+)-th level, to force a talk nterval shft ahead n te. Node receves the reverse beacon, adusts the paraeters for the next councaton perod and advertses the, va the drect beacon (3), to ts chldren. Because all ancestors have to shft ther talk nterval, node also propagates the reverse beacon (4) up to ts parent at the n-th level. Note that n ths case the schedule propagaton pacts all nodes n the network. In fact, asde fro the ancestors of the node whch ncreases ts talk nterval, also other nodes can be nvolved n a transent phase whch ay requre the ntroducton of a pause perod. For nstance, consder a node at the (n+)-th level of the tree (llustrated n the second row of the schee n the fgure) whch s not a drect ancestor of the node orgnatng the new schedule. Its parent (.e. node ) wll shft ahead and advertse the new talk nterval nforaton durng the -th councaton perod. For reasons slar to the talk nterval reducton, a pause perod s ntroduced n the subtree rooted at nodes,.e. the nodes below the n-th level of the tree whch are not drect ancestors of node k (whch orgnated the new schedule). Assung that () nodes clocks are properly synchronzed, and () drect and reverse beacons never get lost, the followng propertes hold (the correspondng proofs are gven n Appendx B): Property (Schedule agreeent). Chld nodes wake up at the nstant, and for the duraton, enforced by ther even when talk ntervals change. Property 2 (Non overlappng schedules). For any couple of nodes and such that s a chld of, the talk ntervals TI and TI are not overlapped. Property 3 (Adacent schedules). In steady state condtons, the talk ntervals shared by any node wth ts chldren and ts respectvely, are contguous. The above propertes guarantee that, after a change has occurred n one or ore talk ntervals, the global sensor network s able to reach a new coordnated and energyeffcent schedule. In partcular, Property guarantees that actvty tes of a parent and ts chldren are coordnated even after a schedule varaton. Property 2 ensures that talk ntervals of dfferent parent nodes rean properly staggered. Fnally, Property 3 guarantees that, n steady state condtons, each sensor node wakes up and goes to sleep ust once per councaton perod. The above propertes hold under assuptons () and (). Clock synchronzaton s beyond the scope of ths paper and can be acheved though any avalable clock synchronzaton protocol, e.g. the protocol descrbed n [36]. Note that, ASLEEP operates on top of the MAC layer and use coarsegraned te paraeters, so that a tght synchronzaton aong nodes s not requred. Assupton () above s rather strong and unlkely to hold n practce snce beacons can get lost due to transsson errors and/or collsons. To overcoe ths proble we devsed a Beacon Protecton echans to ncrease the probablty of successful beacon transsson, and a Beacon Loss Copensaton echans to offset the negatve effects of beacon losses. We show below that, thanks to the latter echans, ASLEEP s able to antan a correct schedule, even n the presence of beacon losses, at the cost of a decreased perforance n ters of energy effcency and delvery rato. IV.D Schedule robustness The ths secton we descrbe the addtonal echanss devsed for provng the protocol robustness. ) Beacon Protecton Beacon essages are crtcal for the protocol correctness. When a node sses a drect beacon contanng the new paraeters, t cannot schedule ts actvty for the next councaton perod. In addton, untl re-acqurng the correct schedule nforaton, the node cannot send drect beacons to ts chldren. As a consequence, the loss of coordnaton propagates along the routng tree to the descendants of the node whch s out of coordnaton. Drect beacons ay get lost, for exaple, due to collsons wth other beacons or regular essages transtted by nterferng nodes. In addton, as drect beacons are broadcast essages, echanss typcally used for enhancng the councaton relablty (.e. retransssons) cannot be used. Reverse beacons ay be lost as well. However, as they are uncast essages, they are retranstted by the MAC protocol. To add robustness to the drect beacon transsson and prevent collsons, the last part of the talk nterval referred to as Beacon Perod s reserved for the drect beacon transsson only. Chld nodes ust refran fro ntatng regular essage transssons durng the Beacon Perod. In addton, the transsson of the drect beacon s ntated wth a rando backoff delay. Fnally, two copes of the drect beacon are transtted back to back. 2) Beacon Loss Copensaton The Beacon Protecton echanss ncreases the probablty that a drect beacon s successfully receved by ts chldren, but does not elnate the proble of beacon losses. Therefore, we have also devsed the followng copensaton echans to overcoe the negatve effects of a drect beacon loss. Snce talk ntervals typcally rean constant for a nuber of councaton perods, nodes use the current schedule paraeters also for the next councaton perod when they ss a drect beacon. The predcted value s used only for a sngle councaton perod, n whch nodes expect to correctly receve a fresh beacon fro ther parent. If 7

8 ths s not the case, the node reans awake untl t reacqures a fresh beacon. Obvously, ths heurstc produces a correct schedule f the parent node has not vared the talk nterval n the eante, whch s true n alost all cases. Otherwse, t produces a non-optal behavor of the node (and ts descendants as well) for a lted nuber of councaton perods. The actual effect of a wrong predcton s dfferent, dependng whether the talk nterval has been ncreased or decreased. If a parent has reduced ts talk nterval, the chld node ust wakes up earler than the correct nstant, thus wastng soe energy and ncreasng the essage loss probablty. However, t reans awake untl the end of the councaton perod and, very lkely, receves a fresh drect beacon. On the other hand, f the talk nterval has been ncreased, accordng to old schedule paraeters, the chld node wakes up at the rght te but would go to sleep earler than the correct nstant. However, snce t ssed the drect beacon n the prevous councaton perod, t doesn t go to sleep untl t receves a fresh drect beacon. Thus, t s very lkely that t receves the new drect beacon alost edately. If ths s not the case, t wll rean actve untl a new drect beacon s receved. Despte ts splcty, ths copensaton echans s able to ensure a correct schedule even n the presence of drect beacon losses at the cost of an ncreased energy consupton and essage loss. There s also the possblty of ncorrect schedules due to the loss of a reverse beacon. In ths case the chld node ay wake up after the talk nterval wth the parent has elapsed. Hence, t s forced to rean awake untl a new drect beacon s receved. Fortunately, such extree stuatons occur rarely (as reverse beacons are uncast essages, they are typcally retranstted by the underlyng MAC protocol up to a axu nuber of tes). Nevertheless, ASLEEP s able to recover fro ths stuaton as well, at the cost of hgher energy expendture and ncreased essage lost. V. SIMULATION ANALYSIS To evaluate the perforance of the ASLEEP protocol, we pleented t n the ns2 sulaton tool [32]. We splt the analyss n two dstnct parts. In the frst part we nvestgated how the protocol reacts to changes n the operatng condtons. To ths a, we vared dynacally the network topology/traffc pattern and analyzed the response of the protocol. In the second part we analyzed the perforance of ASLEEP n steady state condtons. Sulaton setup In both parts of our analyss we referred to a network scenaro consstng of 3-5 nodes randoly deployed over a 5x5 2 area, wth the snk placed at the center of the sensng area. Each node generates a fxed nuber of essages per councaton perod, ndependent of ts poston on the routng tree. Ths scenaro corresponds to a rando deployent of sensor nodes over a gven area for perodc reportng of sensed data, whch s a typcal case n envronental ontorng applcatons. 8 As the ASLEEP protocol reles on a routng tree, we pleented the followng sple routng tree foraton algorth n our sulator. The snk starts the tree-buldng phase settng tself as the root and broadcastng an HELLO essage to neghborng nodes. Upon recevng an HELLO essage, a node sets the source node as ts wats for a rando backoff te, and forwards the HELLO essage wth an updated hop count. Nodes recevng HELLO essages fro several nodes, choose the one wth the nu hop count as ther parent. TABLE. OPERATIONAL PARAMETERS Paraeter Value Councaton Perod (CP) 3s Message rate sg/cp Message sze 2 bytes Observaton wndow (L) CPs TI te slot (q) s Beacon Perod 6 s TI decrease te threshold (L down) 5 CPs TI ncrease threshold (g down) 2q (2 s) In all our experents we used the IEEE /Zgbee MAC protocol n non-beacon enabled ode. We used the 2.4 GHz physcal layer and enabled MAC layer acknowledgeents. We set both the axu nuber of backoffs and retransssons to 8, n order to ncrease the probablty of successful essage transsson. The rado propagaton odel was two-way ground; the transsson range was set to 5 (accordng to the settngs n [52]), whle the carrer sense range was set to 3 (accordng to the odel presented n [2]). We carred out a prelnary sulaton analyss to tune paraeters such as the length of the teslot (q), the observaton wndow sze ( L ), and the adaptaton thresholds (L down and g 2 ). Unless stated otherwse, we used the sulaton paraeters shown n Table, and dd not consder any for of data aggregaton at nteredate nodes (.e., nteredate nodes forward all essages cong fro descendants to ther parent). For each scenaro, we generated dfferent rando topologes and, for each topology, perfored a sulaton run consstng of councaton perods. The results shown below are averaged over the dfferent topologes. We also show the related standard devatons. V.A Analyss n dynac condtons To nvestgate the ASLEEP behavor n dynac condtons we consdered the followng two knds of varatons n the operatng condtons. Traffc pattern varaton. In ths set of experents sensor nodes start generatng one essage per councaton perod. Then, after soe te, they ncrease the essage rate to 3 essages per councaton perod, and fnally they swtch back to the orgnal value. Ths scenaro ay occur when sensors are requested to report an event wth better fdelty (.e., ncludng addtonal physcal quanttes or usng a larger nuber of bts per saple) for a lted te. Topology varaton. These experents start wth an ntal confguraton where only one half of the nodes deployed

9 Talk nterval of the snk node Adaptaton for traffc varaton Councaton perod # Talk nterval of the snk node Councaton perod # Talk nterval of the snk node (s) Adaptaton for topology varaton Councaton perod # Talk nterval of the snk node (s) Councaton perod # TABLE 2. TRANSIENT TIME FOR TRAFFIC VARIATION (MEAN AND STD DEV) Metrc Transent (CPs) Up transent (CPs) 4. (3.) Down transent (CPs) 5.8 (2.2) TABLE 3. TRANSIENT TIME FOR TOPOLOGY VARIATION (MEAN AND STD DEV) Metrc Transent (CPs) Up transent (CPs).3 (.5) Fgure 3. Talk nterval adaptaton for traffc varatons n the sensng area report data. After soe te, also the reanng nodes start reportng data. Ths scenaro ay occur when addtonal nodes are requred to report data so as to observe the sensed phenoenon wth ncreased spatal resoluton. We consdered the followng perforance etrcs: Talk nterval. Plottng the talk nterval duraton over te provdes a graphcal representaton of the protocol s ablty to adapt to changng operatng condtons. Transent te duraton, defned as the nuber of councaton perods fro when the varaton occurs to when the new talk nterval stablzes. We consdered a talk nterval as stable when t reans constant for ore than L councaton perods. Ths etrc gves a easure of how quckly the protocol adapts to the new operatng condtons. ) Results In the frst set of experents we vared the traffc pattern. All nodes started generatng essage per councaton perod. After the 3 th councaton perod, the rate ncreased to 3 essages and, fnally, after the 4 th councaton perod, t reverted back to the ntal value. Fgure 3 shows the talk nterval shared by the snk and ts chldren as a functon of te, referred to a specfc topology (the trend s slar for the other topologes as well). Although the snk node ay be always on (typcally t s not energy constraned), ts talk nterval contrbutes to defne the actvty te of ts chldren whch are the ost loaded nodes n the networks (the overall actvty te of an nteredate node conssts of the talk ntervals wth ts chldren and parent). The trend of the talk nterval shown n Fgure 3 deserves a detaled dscusson. Intally, there s a sharp decrease n the talk nterval. Ths s because the talk-nterval predcton algorth takes an observaton wndow L before provdng the frst estate. Durng ths prelnary phase, a duy talk nterval s used so that nodes can refran fro beng Fgure 4. Talk nterval adaptaton for the topology varaton 9 always-on. In our experents we used an ntal talk nterval value of 2 seconds. Once the frst predcton s avalable ( L = n our experents), the estated value s set and, as shown n Fgure 3, reans constant untl the essage generaton ncreases to 3 essages per councaton perod. Then, the talk nterval quckly adapts to new traffc condtons,.e. t ust takes two councaton perods to reach the stablty. The newly selected talk nterval reans stable agan for about one hundred councaton perods. Then, t drops to a value whch s one slot greater than that before the varaton n essage generaton rate. Fnally, after an addtonal nuber L down of councaton perods, t reverts back to the orgnal value. Ths addtonal te s due to the heurstc used for estatng the talk nterval, whch s affected by the adaptaton thresholds. Recall that, due to the heurstc we use (cfr. Table ), the talk nterval s decreased by one slot when the estated talk nterval s two slots lower than the prevous value. Table 2 shows the duraton of the up and down transent te orgnated by the traffc varaton, averaged over the dfferent topologes. We can see that the up transent spans over about 4 councaton perods. Ths s strctly related to data propagaton process n a staggered schee. To reach the snk, the new schedule paraeters have to clb up the tree one level at councaton perod (recall that drect beacons advertse the paraeters for the next councaton perod). Apart fro the te requred to trgger adaptaton at the dfferent levels, the results show that the protocol reacts quckly to ncreases n the essage rate. Obvously, the actual values strongly depend on the gven topology whch, n our experents, changes at every run because nodes are randoly re-deployed at the begnnng of a new run. For exaple, t s clear that the transent te s condtoned by the nuber of levels n the tree, whch n our sulaton runs vares between 3 and 4. Ths also explans the relatvely hgh devaton n the obtaned results. On the other hand, we can see that the down transent te s longer,.e. about 6 councaton perods. Ths s the ont effect of two factors. Frst, the syste needs L councaton perods to copletely forget the prevous

10 traffc condtons (recall that the talk nterval s estated based on statstcs accuulated over the last L councaton perods, and L = n our case). Second, the adaptaton heurstc we have adopted s qute conservatve n reducng talk ntervals, snce t also ncludes the addtonal L down threshold (L down=5 n our experents). Clearly, ths heurstc s a aor drvng factor of the perforance n ters of transent tes. In the second set of experents we nvestgated how the algorth reacts to varatons n the network topology. In these experents, ntally only one half of the deployed sensor nodes (.e., 5 nodes) s actve and send essages to the snk. The other 5 nodes becoe actve only startng fro the 5 th councaton perod. Fgure 4 shows the varaton over te n the talk nterval shared by the snk and ts chldren n a representatve sulaton run. Agan, the resultng behavor atches the expected varaton, although n ths case the varaton s lted. Nevertheless the fgure shows the adaptve echans s effectve n ths scenaro as well. We can see that the rasng transent te s lower than n the prevous experent (Table 3). Ths s because the ncrease n the resultng traffc condtons s lted, so that the addtonal essages are lkely to ft n the last (unused) part of the current talk nterval. As a consequence, the ncong essages alost edately trgger the adaptaton. V.B Analyss n statonary condtons In ths secton we assess the perforance of ASLEEP under statonary operatng condtons, and copare t aganst other (non-adaptve) slar schees,.e. pleented above the MAC layer. Specfcally, we consder three addtonal schees, whch are shortly descrbed below. Always-on. In ths schee there s no duty-cycle: nodes are always actve and forward essages as soon as they receve the. Obvously, ths approach s never used n practce and s consdered here only for coparson purposes. TAG-lke staggered schee. Sensor nodes uses a staggered schee for sleep/wakeup perod. The talk nterval s fxed and equal for all sensor nodes. It s set to the value of used, for exaple, n TAG [27] where the talk nterval s calculated as the councaton perod dvded by the depth of the routng tree. Ths s the sae rule as n TAG [27]. Therefore, throughout we wll refer to such a schee as TAG. Fxed staggered schee. In ths schee the talk nterval s fxed and equal for all nodes, lke n the TAG schee above. However, we used a dfferent rule to calculate the value of the talk nterval. Ideally, t should be set to the nu te needed by any parent node to correctly receve all essages cong fro ts chldren. In practce the deal value cannot be known n advance, so that ths schee s thus unfeasble. In our experents, we set the talk nterval by usng the value estated by our ASLEEP protocol. In detal, we frst ran an experent wth our protocol and easured the axu talk nterval n that confguraton. Then, we replaced our protocol wth the fxed staggered schee and set all talk ntervals to the axu value easured before. The ratonale s to nvestgate the perforance of a fxed staggered schee when usng the sae paraeters as ASLEEP. For brevty, n the followng ths schee wll be referred to as Fxed. In all staggered schees (TAG, Fxed and ASLEEP) essages are assued to be generated ust before the begnnng of the talk nterval. To ake the coparson far, especally n ters of essage latency, when usng the Always-on schee we assued that essages are generated at the sae te nstants as n the Fxed schee. To copare the perforance of our protocol wth those of the above schees we consdered the followng perforance ndces. Average Duty-cycle, defned as the average fracton of te a node at one hop fro the snk reans actve. Ths ndex gves a easure of the energy consued by -hop sensor nodes. Snce all traffc orgnated by source nodes ust pass through these nodes, they deterne the network lfete [23]. Delvery rato, defned as the rato between the nuber of essages successfully receved by the snk and the total nuber of essages generated by all sensor nodes. Average essage latency, defned as the average between the essage generaton te at the source node and the recepton te of the sae essage at the snk. ) Results We started consderng the basc scenaro whose paraeter settngs have been specfed at the begnnng of Secton V (bascally, 3 nodes, 2-byte essages and no data aggregaton). Then, we vared the node densty, appled dfferent data aggregaton schees, and nvestgated the nfluence of each paraeter on the perforance of the dfferent duty-cyclng schees. As a prelnary reark, we have to ephasze that perforance ndces depends on the specfc paraeter settngs. Therefore, ther absolute values are of relatve nterest for us. What s really portant s to copare the perforance of the dfferent sleep/wakeup schees under the sae operatng condtons.

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri* 126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN: 06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,

More information

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data

More information

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,

More information

Routing Time-Constrained Traffic in Wireless Sensor Networks

Routing Time-Constrained Traffic in Wireless Sensor Networks Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu

More information

Estimating Progress of Execution for SQL Queries

Estimating Progress of Execution for SQL Queries Estatng Progress of Executon for SQL Queres Surajt Chaudhur Vvek arasayya Ravshankar Raaurthy Mcrosoft Research Mcrosoft Research Unversty of Wsconsn, Madson surajtc@crosoft.co vveknar@crosoft.co rav@cs.wsc.edu

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks

Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks Multcast Tree Rearrangeent to Recover Node Falures n Overlay Multcast Networks Hee K. Cho and Chae Y. Lee Dept. of Industral Engneerng, KAIST, 373-1 Kusung Dong, Taejon, Korea Abstract Overlay ultcast

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET

A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET A study of Adaptve Replcaton Technque n routng te-constraned essages (VoIP) n MANET SWATI SAXENA Research Scholar AIM & ACT Banasthal Vdyapth Banasthal, (Ra.) Dr. MADHAVI SINHA Asst. Prof. (HOD) Dept.

More information

A New Scheduling Algorithm for Servers

A New Scheduling Algorithm for Servers A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

ALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs

ALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs ALM-FastReplca: Optzng the Relable Dstrbuton of Large Fles wthn CDNs Ludla Cherkasova Internet Systes and Storage Laboratory HP Laboratores Palo Alto HPL-005-64 Aprl 4, 005* E-al: cherkasova@hpl.hp.co

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Merging Results by Using Predicted Retrieval Effectiveness

Merging Results by Using Predicted Retrieval Effectiveness Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

User Behavior Recognition based on Clustering for the Smart Home

User Behavior Recognition based on Clustering for the Smart Home 3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

More information

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections Journal of Web ystes and Applcatons (2017) Vol. 1, Nuuber 1 Clausus centfc Press, Canada Load Balancng Algorth for Web erver Based on Weghted Mnal Connectons Pan Zhu1, a, Jangxng Zhang 2,b College of Inforaton

More information

A system based on a modified version of the FCM algorithm for profiling Web users from access log

A system based on a modified version of the FCM algorithm for profiling Web users from access log A syste based on a odfed verson of the FCM algorth for proflng Web users fro access log Paolo Corsn, Laura De Dosso, Beatrce Lazzern, Francesco Marcellon Dpartento d Ingegnera dell Inforazone va Dotsalv,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

A Unified Approach to Survivability of Connection-Oriented Networks

A Unified Approach to Survivability of Connection-Oriented Networks A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,

More information

Scheduling Workflow Applications on the Heterogeneous Cloud Resources

Scheduling Workflow Applications on the Heterogeneous Cloud Resources Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Research on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3

Research on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3 Internatonal Conference on Autoaton, Mechancal Control and Coputatonal Engneerng (AMCCE 05) Research on acton recognton ethod under oble phone vsual sensor Wang Wenbn, Chen Ketang, Chen Langlang 3 Qongzhou

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

Multi-Constraint Multi-Processor Resource Allocation

Multi-Constraint Multi-Processor Resource Allocation Mult-Constrant Mult-Processor Resource Allocaton Ar R. B. Behrouzan 1, Dp Goswa 1, Twan Basten 1,2, Marc Gelen 1, Had Alzadeh Ara 1 1 Endhoven Unversty of Technology, Endhoven, The Netherlands 2 TNO Ebedded

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

Secure Communication over Heterogeneous Networks with Clustered Mobile Ad hoc Extensions

Secure Communication over Heterogeneous Networks with Clustered Mobile Ad hoc Extensions Secure Councaton over Heterogeneous Networs wth Clustered Moble Ad hoc Extensons Dtros Vogatzs, Spyrdon Vasslaras and Gregory S. Yovanof Athens Inforaton Technology e-al: {dvog, svas, gyov}@at.edu.gr Abstract

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

1 Calculation and Analysis of Buffer

1 Calculation and Analysis of Buffer Sep. 5 Journal of Electronc Scence and Technology of Chna Vol.3 No.3 ` Calculaton and Analyss of Destnaton Buffer for ulteda Servce n ole Ad Hoc Network ZHOU Zhong, AO Yu-ng, JIANG Zh-qong. School of Councaton

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Color Image Segmentation Based on Adaptive Local Thresholds

Color Image Segmentation Based on Adaptive Local Thresholds Color Iage Segentaton Based on Adaptve Local Thresholds ETY NAVON, OFE MILLE *, AMI AVEBUCH School of Coputer Scence Tel-Avv Unversty, Tel-Avv, 69978, Israel E-Mal * : llero@post.tau.ac.l Fax nuber: 97-3-916084

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks Councatons 07; (): -7 http://www.scencepublshnggroup.co/j/co do: 0.8/j.co.0700. ISSN: 8-9 (Prnt); ISSN: 8-9 (Onlne) Handover Delay Estaton Method for IMS-Based Systes wth Heterogeneous Access Networks

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Detection of masquerade attacks on Wireless Sensor Networks

Detection of masquerade attacks on Wireless Sensor Networks Detecton of masquerade attacks on Wreless Sensor Networks Vjay Bhuse,, Ajay Gupta and Ala Al-Fuqaha Department of Computer Scence, Western Mchgan Unversty, alamazoo, MI 49008 Insttute of Securty Technology

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information