Assessment of common routing metrics for efficient RPL-based routing in large WSNs
|
|
- Arthur Golden
- 5 years ago
- Views:
Transcription
1 Assessment of common routing metrics for efficient RPL-based routing in large WSs LAMBROS SARAKIS, STAMATIS VOLIOTIS, DIMITRIOS BARGIOTAS, THEODORE ZAHARIADIS Department of Electrical Engineering Technological Educational Institute of Sterea Ellada Psachna Evias, 344 GREECE {sarakis, svoliotis, bargiotas, Abstract: - The IPv6 routing protocol for low-power and lossy networks (RPL) is based on routing metrics to build communication paths between a source and the destination node. In this regard, the selection of the routing metric determines the path cost with respect to some performance indicator. In this paper, we consider a number of common metrics derived from the lexical composition of hop-count, expected transmission count and network-layer forwarding reliability, and assess their performance against two performance indicators. The first one evaluates the energy cost indicated by the expected number of frame transmissions (including hop-byhop retransmissions over unreliable links) needed for the successful delivery of data from the source to the sink in the presence of lossy links and non-fully cooperative relays. The second performance indicator assesses the cost of the constructed paths in terms of the achieved end-to-end throughput. We use simulation to evaluate the impact of the topological distance between source and destination nodes and draw conclusions which can be used for selecting such metrics for energy- and throughput-efficient RPL-based routing in large wireless sensor networks. Key-Words: - Routing metric, lexical metric composition, energy cost, throughput, large WS, simulation 1 Introduction Routing in Wireless Sensor etworks (WSs) has received considerable attention during the last fifteen years [1 3]. In this context, the earlier research efforts led to the introduction of numerous protocols for data-centric, hierarchical, locationbased and Quality of Service (QoS)-aware routing [1]. The majority of these protocols were designed with the goal to optimize data/information dissemination inside the network and did not aim to support (in an efficient manner) interoperability with external networks. However, the need to integrate WSs with the Internet gave impetus to a new research direction, that of providing WSs (and in general networks of constrained devices) with IP functionality and IP-based routing. These challenges have been addressed by the IETF which specified IPv6 over IEEE networks [4] and the RPL (IPv6 Routing Protocol for Low-Power and Lossy etworks) protocol [5]. (Another emerging effort involves the adaptation of the Ad hoc On- Demand Distance Vector (AODV) routing protocol to constrained mobile ad-hoc networks [6].) RPL constructs Directed Acyclic Graphs (DAGs) to route traffic from network devices towards a central control point inside the network that is called DAG root. To build the DAG, the protocol specifies the rules based on which every node selects its parent (next hop towards the root) among a possibly large set of neighbor nodes. RPL is a distancevector protocol and is, thus, based on routing metrics to compute a weight (cost) for a path interconnecting an origin and a destination node. To cover the diverse requirements imposed by different applications running on constrained networks, a set of primary link and node routing metrics (the term primary is used to discriminate from composite metrics which will be discussed below), as well as static or dynamic constraints that are suitable for RPL have been specified in [7]. The node metrics include energy and hop count, while the link metrics include throughput, latency and reliability (the latter can be quantified by the Expected Transmission Count (ETX) or the Link Quality Level metrics). However, [7] does not preclude the use of other metrics or combinations of metrics. Examples of other routing metrics that can be used include [8] ETT (Expected Transmission Time), WCETT (Weighted Cumulative ETT), MIC (Metric of Interference and Channel-switching), RSSI ISB:
2 (Received Signal Strength Indication) and energyrelated metrics (like BAMER and GAMER [9]). In the development of routing metrics like the ones just presented, cooperation of the network nodes is usually taken for granted. However, full cooperation of nodes in WSs cannot be always assumed, especially in hostile environments or in cases where nodes may act selfishly in order to save resources. For example, in the case of network layer attacks [1], a malicious (i.e., non-fully cooperative) node may refuse to forward all or part of the received traffic towards the destination. To defend against routing attacks in WSs, an efficient approach is to let the network nodes establish trust relationships based on their expectation (trust) that their neighbors will sincerely cooperate on particular tasks (e.g. data forwarding) [11]. In other words, the routing protocol considers the trustworthiness of neighboring nodes as a metric for the selection of the routing path or the forwarding node. In contrast to the node or link metrics, this type of trustworthiness defines a network-layer routing metric. Two primary metrics can be combined in a lexical manner to produce composite metrics (there is also a second type of composition called additive composition which, however, is not relevant to the study presented in this paper). In this case, the primary metrics are prioritized and the candidate paths are first evaluated using the metric with the highest priority. If this procedure delivers more than one candidate paths (these paths will have equal weights; the weight values will depend on the first routing metric used) these paths will be evaluated against the metric with the lowest priority (second metric) and the lightest among these paths will be selected. For the formal definition and the properties of the composition of routing metrics, the interested reader is referred to [12]. In this paper, we consider a number of simple composite metrics that can be used in WS routing based on RPL, and assess their performance against two indicators of the quality of the constructed paths (performance metrics). The first performance metric evaluates the energy cost indicated by the expected number of frame transmissions (including hop-byhop retransmissions over unreliable links) needed for the successful delivery of data from the source to the sink. This metric was addressed in our previous works [13] and [14], where a routing metric, called TXPFI, was used to minimize this energy cost metric and deliver energy-efficient routing in RPLbased WSs. (This energy cost performance metric has been also studied in [9]) The second performance metric assesses the quality of the constructed paths in terms of the achieved end-toend (application-layer) throughput. For both metrics, we notably study the impact of the topological distance between source and destination nodes and we draw conclusions that can be used for selecting such routing metrics in large WSs. The routing metrics used in this paper are derived from the lexical composition of three primary routing metrics: Hop-Count (HC), ETX and forwarding reliability. In particular, the HC is a primary routing metric that is used to report the number of traversed nodes along the path. By minimizing the number of traversed nodes, the overall number of transmissions is expected to be minimized leading to the consideration that also the overall energy consumption and the packet latency are reduced. However, this is true only under the assumption of equally loaded and equally lossy links, which in general does not hold. The ETX on each link expresses the number of link layer transmissions (including retransmissions) required for the successful delivery of a message to the next-hop neighbor. Even if link layer losses are recovered by retransmission mechanisms, selecting lossy links results in high energy consumption and should be avoided. The successful delivery of a link layer frame is decided based on the reception of link layer acknowledgment. Based on ETX, the lossy links are distinguished irrespective of the cause of loss, e.g. physical layer causes or contention at the MAC layer. The last metric (following the terminology in [12], we call it Packet Forward Indication PFI) assesses the forwarding reliability of the constructed path taking into account the potential presence of malicious nodes. Since PFI can detect and minimize losses at the network layer caused by misbehaving nodes, it may be considered as a type of trust-related primary routing metric. PFI is evaluated as follows: each node, after transmitting a packet to a neighbor, enters the promiscuous mode and waits to listen whether the selected neighbor has actually forwarded its packet, thus building trust knowledge [15 17]. The remainder of the paper is organized as follows. In section 2 we formulate our problem, while in section 3 we provide the analysis of the performance metrics assessing energy cost and throughput. Section 4 presents simulation results evaluating the performance of the considered composite metrics in terms of energy cost and throughput. Finally, conclusions are provided in Section 5. ISB:
3 2 Problem Formulation The motivation for this work stems from observations presented in [13,14] on the performance of lexical combinations of the HC, ETX and PFI metrics with respect to an energy consumption metric that captures the number of link-layer (L2) frame transmissions needed for the successful delivery of a packet from the WS source to the destination (we elaborate on this metric in sub-section 3.1). Those composite metrics, by not being specifically designed to minimize this energy cost, performed worse than the metric that was explicitly designed for this purpose. However, the results showed that the lexical combination of ETX and PFI clearly outperformed the other lexical metrics in a variety of simulation settings and, notably, delivered close-to-optimal results in settings with a relatively small number of hops (e.g., 5) between the source and the destination nodes. Based on these observations, we formulate our problem as follows: given a representative set of routing metrics derived from the lexical combinations of the (commonly used) primary metrics HC, ETX and PFI, a) how is the metrics performance with respect to energy cost related with the metrics performance with respect to throughput, and b) are the conclusions drawn from the comparison of the performance of the metrics for small network topologies still valid for large networks? 3 Performance Metric Analysis In this section we present the analysis of the performance metrics evaluating the energy cost and the achieved end-to-end throughput. 3.1 Analysis of the performance metric assessing energy cost The goal of any routing protocol is to establish a communication path between the source and the destination nodes. Figure 1 shows such a path interconnecting the source and the destination nodes (s and d, respectively) through relay nodes (traffic forwarders f i, i = 1 ) and + 1 lossy links. A relay node i forwards a received packet to the next node with probability p i f. The forwarding probability has been used to model the behavior of a node which drops packets due to congestion or deliberately does not always cooperate in the packet forwarding process (for example, it may represent a network attacker or a node acting selfishly in order to save energy resources that would be otherwise spent for the packet forwarding). Every link between two nodes is characterized by an ETX value, ETX i, which represents the average number of L2 frame transmissions (including retransmissions) that are needed for the delivery of a packet to the destination end of the link. s Fig. 1. A path interconnecting a source and a sink node. Regarding the model for the communication between the source and sink nodes, it is assumed that these nodes rely on an end-to-end (e.g. TCPlike) transport mechanism ensuring that data packets are delivered to the sink. According to this mechanism, if a packet is dropped at a network node before reaching the sink, the packet will be retransmitted by the source node (this retransmission is different form L2 frame retransmission taking place because of the lossy nature of the link). It is further assumed that the reception of a packet by the sink node is signaled back to the source through an acknowledgement message transmitted over a reverse loss-free communication path. Based on the modeling approach just described, the formula for the expected number of frame transmissions (including hop-by-hop retransmissions over unreliable links) needed for the successful delivery of one packet from the source to the sink reads [13] ECM p f 1 f 1 = ETX 1 + p f 1 ETX p f i ETX +1. (1) f p i Since in WSs data transmission involves, in general, greater power consumption than data reception or processing, (1) can be used for a performance metric assessing energy cost in such networks. In the following, we will refer to this metric as Energy Cost Metric (EMC). Larger values of ECM correspond to worse performance since they involve more energy consumption for the delivery of a packet from the source to the destination. The minimum value of ECM is 1 and is obtained when the source and the sink are zero hops away and communicate through a non-lossy link. p f 2 f 2 p f ETX 1 ETX 2 ETX+1... f d ISB:
4 3.2 Analysis of the performance metric assessing throughput Assuming that the source and the destination nodes communicate through a mechanism which ensures reliability through the use of acknowledgements (implemented either at the transport layer or as part of the application) and that every information item sent by the source is included in a single packet (as is the case for periodic measurements of some e.g. environmental quantity), the rate at which a saturated source (i.e., a source that has always data to send) can transmit information is 1 packet every Round Trip Time (RTT). This rate is achieved when the time-out value used in the sender (for deciding whether the last transmitted packet should be sent again) equals the RTT. If the communication link between the sender and the receiver is lossy, the useful throughput (i.e., goodput) is approximated by p f i Goodput = RTT, where 1 is the end-to-end packet loss probability. The RTT is comprised of the one-way delay at the forward and the one-way delay at the reverse path. Following a common assumption that the links are symmetric and ignoring components of delay such as processing at the intermediate nodes, delay for medium access and delays due to possible congestion, we may define the following metric (Throughput Metric TM) as a representative indicator of the path s useful throughput p i f f TM = p i +1. (2) ETX i Equation (2) can be used to derive an approximation of the (useful) throughput when the one-way delay is dominated by the time spent for L2 frame transmissions (and retransmissions) over the links of the path. For two different metrics used for the calculation of paths between given source and sink nodes, the metric that delivers the path with the larger value of TM outperforms the other metric. The maximum value of TM is 1 and is obtained under the same conditions the ECM obtains its minimum value. In section 4, the TM (as well as the ECM) will be used to assess the throughput of the paths calculated by composite routing metrics derived from the lexical combination of a) ETX and PFI (Lex(ETX,PFI)), b) PFI and ETX (Lex(PFI,ETX), and c) HC and PFI (Lex(HC,PFI)). Each of these metrics selects paths according to different rules and, thus, affects the value of the TM performance indicator in different ways. The Lex(ETX,PFI) achieves paths with minimum ETX and, thus, it will mainly affect the denominator of (2). The Lex(PFI,ETX), on the other hand, calculates paths of maximum reliability and, thus, it will have a major impact on the numerator of (2). The Lex(HC,PFI) operates closer to the Lex(ETX,PFI) and it is anticipated that its performance will be more related to that of Lex(ETX,PFI) than to that of Lex(PFI,ETX). The following question then arises: what would be the baseline performance achieved by a simple routing metric which does not take into account either the reliability of the path or the transmission count? To calculate such a baseline performance we consider the HC primary routing metric as the sole metric used in the routing protocol. The metric calculates paths of minimum number of traversed nodes (and also of traversed links) and in case more than one such paths exist the selection among the candidates is done at random. In this case, we proceed to calculate the baseline performance as follows. For a source having a minimum topological distance from a destination ( in the following analysis is the number of traversed links) the selected path will consist of 1 relay nodes. We assume that the percentage of malicious relay nodes is p mal and that the forwarding probability of each i malicious node i is a random variable (r.v.) F m obtaining values in an interval [a i, b i ], a i, b i < 1. Then the (total) expectation of the r.v. F i, which is introduced to represent the forwarding probability of a relay node (irrespectively of whether the node is malicious or not), is given by E[F i ] = E[F i i is malicious] P{i is malicious} + E[F i i is not malicious] P{i is not malicious}. Since E[F i i is malicious] = E[F m i ] and E[F i i is not malicious] = 1, we get E[F i ] = 1 p mal (1 E[F m i ]). Then, assuming that the F m i are independent and identically distributed (i.i.d.) r.vs with expected value m Fm, we have ISB:
5 1 E [ F i ] = E[F i ] 1 = [1 p mal (1 m Fm )] 1. Similarly to the forwarding probability, the ETX of the link l, l = 1, is represented by a r.v. denoted by X l. The r.vs X l and F i are independent, and, thus, the expected value of the r.v. TM rv representing the throughput cost is given by E[TM rv ] = E [ 1 Fi X i 1 ] = E[ F i 1 ] E[ X i Assuming that the X l are i.i.d. r.vs with expected value m X, the following lower bound on the value of the throughput metric TM is obtained (using Jensen s inequality) and this value is used as the baseline performance E[TM rv ] TM baseline = [1 p mal(1 m Fm )] 1 m X. (3) 4 Performance Evaluation We use a custom simulation tool to evaluate the performance of the 3 lexical combinations of HC, PFI and ETX with respect to the performance metrics calculated from (1) and (2) in network settings which involve a distance-vector protocol (like RPL), lossy links and malicious nodes. The tool computes for the composite routing metrics the paths that would be used to forward traffic from the source to the sink node. We are particularly interested to apply the metrics discussed in this paper to the RPL protocol; for this purpose, the simulator implements a suitable variation of the distributed Bellman-Ford algorithm to take account of the composite metrics. In all simulations, the network consists of 4 nodes placed on a 2x2 grid topology. Each node located at the periphery of the grid has five one-hop neighbors except from the nodes located at the corners which have three neighbors. All the rest (inner) nodes have eight neighbors. Following the modeling approach presented in section 3 the links between nodes may be unreliable (in this case they have an ETX value greater than 1) and the routing paths may include malicious forwarders. In every simulation run, the network involves one destination node placed at a corner of the grid and one source node placed at the main diagonal of ]. the grid at various topological distances (number of hops) from the source. The rest of the nodes act as forwarders. The forwarders include both malicious and non-malicious nodes. The forwarding probabilities of the malicious nodes are obtained by getting samples from a uniform distribution in [.7, 1] and then setting the forwarding probability to the quantized probability value that is closer to the sample (we have specified five probability intervals with equal length, which gives a total of five discrete forwarding probability values). The ETX value of every link is obtained by sampling the uniform distribution in [1,4], and applying a quantization to the sample similar to the one just described (for ETX we specified six intervals of equal length, which gives a maximum ETX of 3.75). The quantizations are done in order to allow composite metrics that use the PFI or the ETX as first-priority metrics in a lexical combination to make also use of the second metric. (If the probability or the ETX values were not quantized, the probability of finding two or more paths of equal PFI or ETX values, in a network with many malicious nodes and long paths, would be very small.) The performance of the Lex(ETX,PFI), Lex(PFI,ETX) and Lex(HC,PFI) with respect to the ECM, for various distances (measured in minimum number of hops) between source and destination nodes and different levels of penetration of the malicious nodes, are shown in Fig. 2. The results (for each depicted point, the value is the average over 1 simulation runs) show that as the distance between the communicating nodes increases the energy cost increases and tends to follow an exponential increase for all metrics for distances larger than 8 hops (Fig. 2b). For relatively small distances (i.e., 2 and 5 hops) the Lex(ETX,PFI) and Lex(HC,PFI) metrics show comparable performance and clearly outperform Lex(PFI,ETX). This is mainly due to the fact that the selection of the most reliable path (achieved by Lex(PFI,ETX)), especially in cases where clear paths do exist (as is the case for 5% and 75% of malicious nodes), results in significant path stretching (increase of the number of hops) which negatively impacts the path s overall ETX and thus the energy cost metric ECM. ISB:
6 Average ECM Average ECM Average ECM Lex(PFI,ETX) 5 hops Lex(HC,PFI) 5 hops Lex(ETX,PFI) 5 hops Lex(PFI,ETX) 2 hops Lex(HC,PFI) 2 hops Lex(ETX,PFI) 2 hops Malicious odes (%) (a) Lex(ETX,PFI) 11 hops Lex(HC,PFI) 11 hops Lex(PFI,ETX) 11 hops Lex(ETX,PFI) 8 hops Lex(PFI,ETX) 8 hops Lex(HC,PFI) 8 hops Malicious odes (%) (b) Lex(ETX,PFI) 17 hops Lex(HC,PFI) 17 hops Lex(ETX,PFI) 14 hops Lex(HC,PFI) 14 hops Lex(PFI,ETX) 17 hops Lex(PFI,ETX) 14 hops Malicious odes (%) (c) Fig. 2. Average Energy Cost Metric (ECM) for different topological distances between source and destination and different percentage of malicious nodes. Smaller values correspond to better performance. For a distance of 8 hops the performance of all composite metrics addressed in this study is similar. However, as the distance increases beyond 8 hops (which would be reasonable for large WSs), the difference in performance becomes more clear, especially for a large percentage of malicious forwarders. In such cases, some of the conclusions drawn previously for small distances (i.e., small networks) are not valid and the composite metric that gives priority to reliability (i.e., the Lex(PFI,ETX) metric) achieves constantly better performance than the metrics that strive to minimize the number of hops or the total ETX of the path (Fig. 2c). Furthermore, the rate of ECM increase for Lex(PFI,ETX) is lower than that of the other metrics and, notably, Lex(PFI,ETX) for 17 hops even outperforms Lex(ETX,PFI) and Lex(HC,PFI) for 14 hops (Fig. 2c). A first explanation we can give for this behavior is that the variability of the reliability of the candidate paths is proportionally larger than the variability of the paths ETX and since Lex(PFI,ETX) selects the path with maximum reliability (i.e. largest deviation from the average value) it delivers lower values of ECM, as the ETXs affect the numerators of the factors of (1) while the reliability affects the denominators of the factors of (1). The observations regarding the ECM are generally reflected to the observations stemming from the comparison of the metrics performance with respect to the TM. The performance according to TM is depicted in Fig. 3, where we have also included the baseline performance TM baseline obtained by utilizing the HC as the sole routing metric (the baseline performance is given by (3) and is illustrated with the Lower Bound LB legend in the figure). The results show that as the distance increases, the throughput achieved by each metric (which is proportional to TM) decreases. For a minimum distance of 2 hops, the Lex(PFI,ETX) metric achieves the lowest performance (this observation is in line with the observation from Fig. 2a), which, for large percentage of malicious nodes (approximately above 35%), is even lower from the baseline performance. However, for minimum distances of 5 hops and above the routing metric gradually achieves increasingly better performance compared to Lex(ETX,PFI) and Lex(HC,PFI). This observation holds even in cases the Lex(PFI,ETX) is used in settings which involve a topological distance between source and destination which is larger than that considered for the calculation of paths according to Lex(ETX,PFI) and Lex(HC,PFI). (For example, Fig. 3c illustrates that Lex(PFI,ETX) for a minimum distance of 17 hops achieves better throughput than Lex(ETX,PFI) or Lex(HC,PFI) for 14 hops.) ISB:
7 Average TM Lex(ETX,PFI) 2 hops Lex(HC,PFI) 2 hops Lex(ETX,PFI) 5 hops Lex(HC,PFI) 5 hops Lex(PFI,ETX) 2 hops LB for HC metric (2 hops) Lex(PFI,ETX) 5 hops LB for HC metric (5 hops) different percentage of malicious nodes. Larger values correspond to better performance. The Lex(ETX,PFI) and Lex(HC,PFI) achieve comparable performance in most of the settings, with Lex(ETX,PFI) achieving a slightly better throughput in cases of small penetration of malicious nodes. As a final remark, we note that in all cases the performance of Lex(HC,PFI) is almost indistinguishable from the baseline performance (based only on the use of the HC metric)..6 Average TM Average TM Lex(ETX,PFI) 8 hops Lex(HC,PFI) 8 hops Lex(ETX,PFI) 11 hops Lex(HC,PFI) 11 hops Malicious odes (%) (a) Malicious odes (%) (b) Lex(ETX,PFI) 14 hops Lex(HC,PFI) 14 hops Lex(ETX,PFI) 17 hops Lex(HC,PFI) 17 hops (c) Lex(PFI,ETX) 8 hops LB for HC metric (8 hops) Lex(PFI,ETX) 11 hops LB for HC metric (11 hops) Lex(PFI,ETX) 14 hops LB for HC metric (14 hops) Lex(PFI,ETX) 17 hops LB for HC metric (17 hops) Malicious odes (%) Fig. 3. Average Throughput Metric (TM) for different topological distances between source and destination and 5 Conclusion In WSs with lossy links and non-fully cooperative nodes, calculating routing paths of minimum energy cost and maximum end-to-end throughput is a challenging task. In this paper, we compared the performance of simple composite routing metrics that can be used in RPL-based routing in WSs against two performance indicators that assess energy cost indicated by the expected number of frame transmissions needed for the successful delivery of data from the source to the sink, and achieved end-to-end throughput. The simulation results showed that in WSs with lossy links, nonfully cooperative relays and small topological distances between the source and the destination, metrics that rely primarily on the number of traversed nodes or the link quality outperform the metric that computes paths mainly according to the forwarding reliability of the relay nodes. On the contrary, routing based primarily on the forwarding reliability achieves significantly better performance in WSs with distant sources. These conclusions can be used for selecting such metrics for energyand throughput-efficient RPL-based routing in WSs. Acknowledgment: This research has been cofinanced by the European Union (European Social Fund ESF) and Greek national funds through the Operational Program Education and Lifelong Learning of the ational Strategic Reference Framework (SRF) - Research Funding Program ARCHIMEDES III Investing in knowledge society through the European Social Fund, sub-project 8 TROLLS. References: [1] K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, ISB:
8 Elsevier Journal of Ad Hoc etworks, vol. 3, no. 3, May 25, pp [2] E. Alotaibi, and B. Mukherjee, A survey on routing algorithms for wireless Ad-Hoc and mesh networks, Computer etworks, vol.56, no.2, February 212, pp [3]. Tekbiyik, and E. Uysal-Biyikoglu, Energy efficient wireless unicast routing alternatives for machine-to-machine networks, Journal of etwork and Computer Applications, vol.34, no.5, September 211, pp [4] G. Montenegro,. Kushalnagar, J. Hui, D. Culler, Transmission of IPv6 Packets over IEEE etworks, IETF RFC 4944, September 27. [5] T. Winter, P. Thubert (Eds.), RPL: IPv6 Routing Protocol for Low-Power and Lossy etworks, IETF RFC 655, March 212. [6] T. Clausen et al., The Lightweight Ondemand Ad hoc Distance-vector Routing Protocol ext Generation (LOADng), IETF Internet-Draft draft-clausen-lln-loadng-12, October 214. [7] JP. Vasseur, M. Kim (Eds.), Routing Metrics Used for Path Calculation in Low-Power and Lossy etworks, IETF RFC 6551, March 212. [8] G. Parissidis, M. Karaliopoulos, R. Baumann, T. Spyropoulos, and B. Plattner, Routing metrics for Wireless Mesh etworks, S. Misra et al. (eds.), Guide to Wireless Mesh etworks, Computer Communications and etworks, Springer, 29, pp [9] Q. Dong, S. Banerjee, M. Adler, and A. Misra, Minimum energy reliable paths using unreliable wireless links, in Proceedings of ACM MobiHoc (25), Urbana-Champaign, Illinois, USA, pp [1] B. Kannhavong, H. akayama, Y. emoto,. Kato, and A. Jamalipour, A survey of routing attacks in mobile ad hoc networks, IEEE Wireless Communications, vol. 14, no. 5, 27, pp [11] J.H. Cho, A. Swami, and I.R. Chen, A survey on trust management for mobile ad hoc networks, IEEE Communications Surveys & Tutorials PP (99) (21), pp [12] T.H.. Velivasaki, P. Karkazis, Th. V. Zahariadis, P. T. Trakadas, and Ch.. Capsalis, Trust-aware and link-reliable routing metric composition for wireless sensor networks, Transactions on Emerging Telecommunications Technologies, Wiley, October 212. [13] P. Karkazis, I. Papaefstathiou, L. Sarakis, Th. Zahariadis, T.-H. Velivassaki, and D. Bargiotas, Evaluation of RPL with a Transmission Count-Efficient and Trust-Aware Routing Metric, in Proc. 214 IEEE International Conference on Communications (ICC), Sydney, Australia, June 214, pp [14] L. Sarakis, H. C. Leligou, P. Karkazis, T.H. Velivassaki, T. Zahariadis, Evaluation of a Transmission Count-Efficient Metric for Energy-Aware Routing in WSs, in Proc. of the International Conference on Telecommunications and Multimedia (TEMU), Heraklion, Greece, July 214, pp [15] T. Zahariadis, H. Leligou, P. Trakadas, S. Voliotis, Trust management in wireless sensor networks, European Transaction on Telecommunications, vol. 21, no. 4, April 21, pp [16] F. G. Marmol, G. M. Perez, Providing trust in wireless sensor networks using a bio-inspired technique, Telecommunication Systems, vol. 46, no. 2, 21, pp [17] Y. Sun, Z. Han, K.J.R. Liu, Defense of trust management vulnerabilities in distributed networks, IEEE Communications Magazine, vol. 25, no. 2, February 28, pp ISB:
Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks
Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks Panagiotis Karkazis, Panagiotis Trakadas, Helen C. Leligou 3, Lambros Sarakis 3, Ioannis Papaefstathiou,
More informationRouting over Low Power and Lossy Networks
outing over Low Power and Lossy Networks Analysis and possible enhancements of the IETF PL routing protocol Enzo Mingozzi Associate Professor @ University of Pisa e.mingozzi@iet.unipi.it outing over LLNs
More informationStudy of RPL DODAG Version Attacks
Study of RPL DODAG Version Attacks Anthéa Mayzaud anthea.mayzaud@inria.fr Rémi Badonnel Isabelle Chrisment Anuj Sehgal s.anuj@jacobs-university.de Jürgen Schönwälder IFIP AIMS 2014 Brno, Czech Republik
More informationEvaluating routing metric composition approaches for QoS differentiation in low power and lossy networks
Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks Panagiotis Karkazis, Panagiotis Trakadas, Helen C. Leligou, Lambros Sarakis, Ioannis Papaefstathiou
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationExpanding Ring Search for Route Discovery in LOADng Routing Protocol
Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationEnhancing Routing Protocol for Low Power and Lossy Networks
Enhancing Routing Protocol for Low Power and Lossy Networks John Abied Hatem, Haidar Safa, and Wassim El-Hajj Department of Computer Science American University of Beirut Beirut, Lebanon Email: jmh8@mail.aub.edu;
More informationAvailable online at ScienceDirect. Procedia Computer Science 87 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 87 (2016 ) 270 274 4th International Conference on Recent Trends in Computer Science & Engineering Analysis of Routing
More informationHigh-Throughput Multicast Routing Metrics in Wireless Mesh Networks
High-Throughput Multicast Routing Metrics in Wireless Mesh Networks Sabyasachi Roy Dimitrios Koutsonikolas Saumitra Das Y. Charlie Hu TR-ECE-05-7 September, 2005 School of Electrical and Computer Engineering
More informationforward packets do not forward packets
Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson
More informationQUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi
QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,
More informationBalanced Load Sharing Protocol for Wireless Sensor Networks
Balanced Load Sharing Protocol for Wireless Sensor Networks Maytham Safarª, Rabie Al-Mejbas b ªCollege of Engineering and Petroleum Kuwait University, Kuwait State ªE-mail: maytham@me.com, b mejbas@hotmail.com
More informationInternet Engineering Task Force (IETF) Category: Standards Track. September The Minimum Rank with Hysteresis Objective Function
Internet Engineering Task Force (IETF) Request for Comments: 6719 Category: Standards Track ISSN: 2070-1721 O. Gnawali University of Houston P. Levis Stanford University September 2012 The Minimum Rank
More informationThis is a repository copy of Congestion-aware RPL for 6L0WPAN networks.
This is a repository copy of Congestion-aware RPL for 6LWPAN networks. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/365/ Version: Accepted Version Proceedings Paper: Al-Kashoash,
More informationImplementation and simulation of OLSR protocol with QoS in Ad Hoc Networks
Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT
More informationStudy and Analysis of Routing Protocols RIP and DSR Using Qualnet V5
Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5 Nallamalla Anusha Department of Computer Science and Engineering Baba Institute of Technology and Sciences, Visakhapatnam, Andhra Pradesh-
More informationAN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of
More informationWITH the evolution and popularity of wireless devices,
Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication
More informationResearch Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks
Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationExpected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network
Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More informationQuantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN
Indian Journal of Science and Technology, Vol 8(19), DOI: 10.17485/ijst/2015/v8i19/76696, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Quantitative Analysis and Evaluation of RPL with
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationMeasure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.
More informationComparison of Routing Metrics for Wireless Mesh Networks
Comparison of Routing Metrics for Wireless Mesh Networks S.L. Nxumalo 1,2, M.O. Adigun 1, P. Mudali 1,2, N. Ntlatlapa 2, S.M. Ncanana 1 Department of Computer Science University of Zululand 1, P. O. Box
More informationA Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol
A Depth First Forwarding (DFF) Extension for the Routing Protocol Thomas Clausen, Jiazi Yi, Antonin Bas Laboratoire d Informatique (LIX) Ecole Polytechnique, France Thomas@ThomasClausen.org, jiazi@jiaziyi.com,
More informationDetection of Wormhole Attacks in Wireless Sensor Networks
Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics
More informationAn Adaptive Self-Organization Protocol for Wireless Sensor Networks
An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationThe P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments
The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments Emmanuel Baccelli, Matthias Philipp INRIA Saclay, France E-mail: name.lastname@inria.fr Mukul Goyal UWM, USA E-mail: mukul@uwm.edu
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationPerformance Evaluation of RPL Objective Functions
See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/281377239 Performance Evaluation of RPL Objective Functions CONFERENCE PAPER OCTOBER 2015 READS
More informationLow Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle
24 IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.12, December 212 Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle Jeehoon Lee*, Jongsoo Jeong,
More informationInternet Engineering Task Force (IETF) Request for Comments: ISSN: March 2012
Internet Engineering Task Force (IETF) J. Hui Request for Comments: 6553 JP. Vasseur Category: Standards Track Cisco Systems ISSN: 2070-1721 March 2012 The Routing Protocol for Low-Power and Lossy Networks
More informationOpportunistic RPL for Reliable AMI Mesh Networks
Noname manuscript No. (will be inserted by the editor) Opportunistic RPL for Reliable AMI Mesh Networks Sedat Gormus Filippo Tosato Zhong Fan Zubeir Bocus Parag Kulkarni Received: date / Accepted: date
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More information1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based
1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,
More informationPerformance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela
Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,
More informationScheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network
International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationDesigning Optimized Scheduling QoS-Aware RPL for Sensor- Based Smart Grid Communication Network
Journal of Computer and Knowledge Engineering, Vol. 1, No. 1. DOI: 10.22067/cke.v1i2.60500 Designing Optimized Scheduling QoS-Aware RPL for Sensor- Based Smart Grid Communication Network Mohammad Alishahi,
More informationReal-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)
Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,
More informationReliable Time Synchronization Protocol for Wireless Sensor Networks
Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu
More informationTO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL
TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,
More informationOPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS
Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:
More informationECE 598HH: Special Topics in Wireless Networks and Mobile Systems
ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic
More informationMulticast Transport Protocol Analysis: Self-Similar Sources *
Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,
More informationAn analysis of retransmission strategies for reliable multicast protocols
An analysis of retransmission strategies for reliable multicast protocols M. Schuba, P. Reichl Informatik 4, Aachen University of Technology 52056 Aachen, Germany email: marko peter@i4.informatik.rwth-aachen.de
More informationA New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization
A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization Víctor M. Aragón, Ignacio de Miguel, Ramón J. Durán, Noemí Merayo, Juan Carlos Aguado, Patricia Fernández,
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY
ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY L. Donckers, P.J.M. Havinga, G.J.M. Smit, L.T. Smit University of Twente, department of Computer Science, PO Box 217, 7 AE Enschede, the Netherlands
More informationSECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK
SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering
More informationOn the Interdependence of Congestion and Contention in Wireless Sensor Networks
On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA
More informationSecurity Scheme for Malicious Node Detection in Mobile Ad Hoc Networks
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks Punit Rathod 1, Nirali Mody 1, Dhaval Gada 1, Rajat Gogri 1, Zalak Dedhia 1, Sugata Sanyal 2 and Ajith Abraham 3 1 Mumbai University,
More informationCross-Layer QoS Support in the IEEE Mesh Network
Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationCACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department
More informationAdaptive Packet Size Control for Bulk Data Transmission in IPv6 over Networks of Resource Constrained Nodes
Packet Size Control for Bulk Data Transmission in IPv6 over Networks of Resource Constrained Nodes Yang Deng, Zhonghong Ou, and Antti Ylä-Jääski Aalto University, Espoo, Finland {yang.deng,zhonghong.ou,antti.yla-jaaski}@aalto.fi
More informationThis is the author s final accepted version.
Alayed, W., Mackenzie, L. and Pezaros, D. (2018) Evaluation of RPL s Single Metric Objective Functions. In: 10th IEEE International Conference on Internet of Things (ithings-2017), Exeter, England, UK,
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationNew Trust Metric for RPL Routing Protocol
New Trust Metric for RPL Routing Protocol Nabil Djedjig, Djamel Tandjaoui Faiza Medjek, Imed Romdhani Research Center on Scientific and Technical Information-CERIST, 03, Rue des Frres Aissou, Ben Aknoun,
More informationSIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze
80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that
More informationTrust and Energy-aware Routing Protocol for Wireless Sensor Networks
Trust and Energy-aware Routing Protocol for Wireless Sensor Networks Laura Gheorghe, Răzvan Rughiniș, Nicolae Țăpuș Department of Computer Science and Engineering University Politehnica of Bucharest Bucharest,
More informationMobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks
Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,
More informationShortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks
Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:
Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.
More informationFactors Affecting the Performance of Ad Hoc Networks
Factors Affecting the Performance of Ad Hoc Networks Dmitri D. Perkins, Herman D. Hughes, and Charles B. Owen Department of Computer Science and Engineering Michigan State University East Lansing, MI 88-6
More informationRelaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks
Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks 1 T.R.Gopalakrishnan Nair (SM-IEEE), 2 R. Selvarani, 3 Vaidehi M. 1 Director Research & Industry
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationMitigating Malicious Activities by Providing New Acknowledgment Approach
Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationAn efficient traffic management framework for multi-channel wireless backbone networks
An efficient traffic management framework for multi-channel wireless backbone networks Yuzo Taenaka 1a) and Kazuya Tsukamoto 2 1 Information Technology Center, The University of Tokyo 2 11 16 Yayoi, Bunkyo,
More informationEfficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection
Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Kin Choong Yow School of Computer Engineering Nanyang Technological University Nanyang Avenue,
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationA Survey on Path Weight Based routing Over Wireless Mesh Networks
A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi
More informationAn Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing
More informationENSC 427: COMMUNICATION NETWORKS
ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee
More informationProposal of interference reduction routing for ad-hoc networks
Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,
More informationEstimate the Routing Protocols for Internet of Things
Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of
More informationEnergy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network
Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering
More informationOn QoS Mapping in TDMA Based Wireless Sensor Networks
On QoS Mapping in TDMA Based Wireless Sensor Networks Wassim Masri and Zoubir Mammeri IRIT Paul Sabatier University Toulouse, France {Wassim.Masri, Zoubir.Mammeri}@irit.fr Abstract Recently, there have
More informationHigh-throughput multicast routing metrics in wireless mesh networks
Ad Hoc Networks xxx (2007) xxx xxx www.elsevier.com/locate/adhoc High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, Y. Charlie Hu
More informationIJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT
A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically
More informationIntended status: Informational. October 22, Requirements for Scalable DNS-SD/mDNS Extensions draft-lynn-dnssd-requirements-00
DNS-SD/mDNS Extensions Internet-Draft Intended status: Informational Expires: April 25, 2014 K. Lynn, Ed. Consultant S. Cheshire Apple, Inc. October 22, 2013 Requirements for Scalable DNS-SD/mDNS Extensions
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More information' INRIA Rocquencourt, Domaine de Voluceau
OPTIMIZED FLOODING AND INTERFERENCE-AWARE QOS ROUTING IN OLSR* Dang Quan ~ ~ u ~ and e n Pascale ' ~inet' ' INRIA Rocquencourt, Domaine de Voluceau Rocquencourt - B.P 105 78153 Le Chesnay Cedex, France
More informationand coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different
ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com PERFORMANCE ANALYSIS FOR WIRELESS MESH NETWORK CONSIDERING DIFFERENT CLIENT DISTRIBUTION PATTERNS S.Dhivya #1,
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More information