Cluster-Based Semi-Asynchronous Power-Saving Protocols for Multi-hop Ad Hoc Networks

Size: px
Start display at page:

Download "Cluster-Based Semi-Asynchronous Power-Saving Protocols for Multi-hop Ad Hoc Networks"

Transcription

1 Cluster-Based emi-asynchronous Power-aving Protocols for Multi-hop Ad Hoc Networks Chih-hun Hsu Department of Information Management Nanya Institute of Technology Chung-i, 320, Taiwan Yu-Chee Tseng Department of Computer cience and Information Engineering National Chiao Tung University Hsin-Chu, 300, Taiwan Abstract Existing power saving (P) protocols for mobile adhoc networks (MANETs) can be categorized into synchronous and asynchronous ones. The synchronous P protocol can not be applied to a multi-hop MANET, because it will cause three problems, namely clock synchronization, neighbor discovery, and network partitioning. Although asynchronous solutions are attractive, yet, the cost is high as opposed to synchronous protocols. Hosts in asynchronous protocols need to keep awake for longer time, so as to discover asynchronous P neighbors. Besides, a broadcast message has to be sent multiple times if a sending host s neighbors wake up asynchronously. To conquer the deficiency of asynchronous P protocols, we propose several cluster-based semi-asynchronous P protocols for multi-hop MANETs. The basic idea is to cluster neighboring hosts such that synchronous P protocols can be adopted within individual clusters, and conserving a lot of energy. Two asynchronous schemes are provided in the inter-cluster level, including NR-probabilitybased and location-based schemes. imulation results show that, the proposed semi-asynchronous approaches outperform the asynchronous P protocols when applied to a multi-hop MANET. I. INTRODUCTION ince most mobile devices do not have plug-in power, battery is the only source to support their operations. Battery energy is a limited resource. Therefore, how to conserve battery energy is a critical issue for a MANET, which consists of mobile hosts only. A lot of works have dedicated to the design of wakeup and sleep patterns of mobile hosts [1], [2], [3]. However, these protocols are not power efficient in a sparse network, because almost all the hosts need to keep active all the time. IEEE s P protocol is synchronous in the sense that all hosts must remain time-synchronized. Clock synchronization in a large scale MANET is difficult. To solve the synchronization problem, asynchronous power-saving (P) protocols have been proposed. It is first pointed out in [4] that without harmonization there could exist neighbor discovery and network partitioning [4] problems. Three asynchronous P protocols, namely dominating-awake-interval, periodically-fully-awakeinterval, and quorum-based protocols, are proposed in [4] for multi-hop MANETs. Another asynchronous P protocol for multi-hop MANETs is proposed in [5], which formulates the problem of generating wakeup schedules as a block design problem in combinatorics. To improve the works in [4], several quorum-based P protocols, namely grid quorum, torus quorum, cyclic quorum, and finite projective plane quorum protocols, are proposed in [6]. In this paper, we observe that although asynchronous P protocols can conquer the clock synchronization problem, they may have some performance concerns. In order to discover asynchronous neighbors, hosts need to keep awake for some extra time. Besides, the broadcasting cost is high, because it takes several transmissions for a host to wake up all its asynchronous neighbors. To conquer these deficiencies, we propose several cluster-based semi-asynchronous P protocols for multi-hop MANETs. Although, a cluster-based semiasynchronous P protocol for wireless sensor network (- MAC) has been proposed in [7], yet, -MAC is designed for a static network. When applied to multi-hop MANETs, neighbor discovery and network partitioning problems may occur. The proposed protocol works as follows. irst, hosts are clustered. Inside each cluster, hosts adopt a synchronous P protocol so as to save more energy. Then each cluster is regarded as a super node and among super nodes we will run an asynchronous P protocol. To realize this idea, within each cluster we will request some hosts to serve as watchers in a rotation manner. Only watchers need to run the asynchronous P protocol. We propose two schemes to delegate hosts as watchers: NR-probability-based and location-based schemes. These schemes are adaptive, energy-efficient, and sensitive to the change of neighbors. imulation results show that the proposed semi-asynchronous approaches do outperform asynchronous P protocols when applied to a multi-hop MANET. The rest of this paper is organized as follows. In ection 2, we present our cluster-based semi-asynchronous powersaving protocols. Routing protocols based on our power-saving mechanisms are discussed in ection 3. imulation results are presented in ection 4. ection 5 concludes this paper. II. CUTER-BAED EMI-AYNCHRONOU POWER-AVING PROTOCO The goal of our P protocol is to achieve the power efficiency of the synchronous P protocol, while still being able to be applied to a multi-hop MANET. We partition the network into several clusters and synchronize all the hosts in the same cluster. The host with enough energy and the fastest

2 clock among all its neighbors will be chosen as the cluster head and each host will follow the clock of its cluster head. ince the distance between the cluster head and cluster member is only single hop, it would be much easier for the cluster head to synchronize all the hosts in the same cluster. When all hosts in the same cluster are synchronized, each P host can adopt the synchronous P protocol (eg. IEEE s P protocol) as its intra-cluster protocol, so that it can conserve more power. If we regard each cluster as a super node, the clustering MANET can be regarded as a network consists of several asynchronous super nodes. Therefore, how to design the intercluster strategy, so that the asynchronous super nodes (clusters) can detect each other, is an important issue. Each of the super node (cluster) may adopt the asynchronous P protocol to detect its asynchronous neighbors. ince each cluster may consist of several P hosts, it is not necessary for every cluster member to adopt the asynchronous P protocol simultaneously. The members of each cluster may serve as watchers by adopting the asynchronous P protocol in turn. The P host not serving as watchers may adopt the synchronous P protocol. Each P host can adopt either synchronous or asynchronous P protocols according to the schemes proposed in section II-B. Because the paper length is limited and the clustering problem of MANET has been studied extensively [8], we will not discuss how to cluster the MANET in this paper. In the following subsections, we will first show the channel model of our protocol. Then two schemes are proposed to guide the scheduling of P modes. A. Channel Model ince the proposed P protocol is cluster-based and semiasynchronous, its channel model is different from that of IEEE and asynchronous protocols. To maintain the cluster structure and synchronize the hosts in each individual cluster, the structure of beacon interval needs to be redesigned. Each beacon interval may contain four different windows, namely active window, synchronous window, beacon window, and MTIM (Multi-hop TIM) window. The structure of a beacon interval may vary for different protocols (to be elaborated later). The active window is the extra active period that the P host should turn on its receiver to listen to any packet and take proper actions. The synchronous window is for the cluster head to send its beacon, while the beacon window is for the other P hosts to send their beacons. The MTIM window is for other hosts to send their MTIM frames to the P host. MTIM frames serve the similar purpose as ATIM frames in IEEE To avoid collisions among beacons/mtims, a host should wait for a random number of slots before sending out its beacon/mtims. Normally, the host adopts the synchronous P protocol. The structure of the synchronous interval is similar to that of IEEE , each interval starts with a synchronous window followed by an MTIM window. When serving as a watcher, the host may adopt the periodically-fully-awakeinterval or quorum-based protocols [4]. When the periodically- ig. 1. interval ully-awake Interval ynchronous Window ow-power Interval Beacon Window MTIM Window ynchronous Interval (c) ActiveWindow.ully-awake interval,.ow-power interval (c).ynchronous fully-awake-interval protocol is adopted, the beacon intervals are classified as low-power and fully-awake intervals. The fully-awake intervals arrive periodically every p intervals, and the rest of the intervals are low-power intervals. The structures of these beacon intervals are defined as follows. Each low-power interval starts with a synchronous window followed by a beacon window and an MTIM window. In the rest of the time, the host can go to the sleep mode. Each fully-awake interval also starts with a synchronous window followed by a beacon window and an MTIM window. However, the host must remain awake in the rest of the time. When the quorum-based protocol is adopted, the beacon intervals are classified as fully-awake (quorum) and synchronous (non-quorum) intervals. ig. 1,, and (c) show the structures of the fully-awake, low-power, and synchronous intervals, respectively. B. Power Mode cheduling When a host has idled for a certain period of time, it may switch to P mode. The synchronous P protocol is adopted as the intra-cluster P protocol and the asynchronous P protocol is adopted as the inter-cluster P protocol. The P host follows the clock of the cluster head to turn on and turn off its radio periodically. To detect the approaching asynchronous cluster, some hosts need to serve as watchers by adopting the asynchronous P protocol. To conserve energy, the other P hosts would adopt the synchronous P protocol. The designing features of our protocols are shown as follows: adaptive: the protocol should be adaptive to host density, mobility, and location. sensitive to neighbor change: each cluster should be able to detect the change of neighboring clusters. or any two asynchronous watchers, if their duty time are overlapping, they would have chance to detect each other. energy efficient: the proposed protocol should be more efficient than the asynchronous P protocol in terms of power consumption. According to the above features, we propose two schemes for our power mode scheduling protocol. In the beginning of each round, the P host decides its power mode according to the proposed scheduling schemes. There are p beacon intervals in each round, where p is a multiple of the quorum size or period length of the adopted asynchronous P protocol. If the P host serves as a watcher, it will adopt the asynchronous P protocol in this round, otherwise, it will adopt the synchronous P protocol in this round.

3 1st round 2nd round 1st round 2nd round ig. 2..An example of adopting the periodically-fully-awake-interval protocol as the asynchronous P protocols.an example of adopting the cyclic quorum scheme as the asynchronous P protocols, where represents synchronous, represents fully-awake, and represents low-power intervals. In ig. 2 and, assuming the P host decides (or is dispatched) to serve as a watcher in the first round and become normal host in the second round. The round length is set as 10 beacon intervals. In ig. 2, the periodically-fully-awakeinterval protocol is adopted as the asynchronous P protocol. The fully-awake interval arrives at the first interval and the low-power interval arrives at the second, third,..., and tenth intervals of the first round. In ig. 2, the cyclic quorum scheme [6] is adopted as the asynchronous P protocol. The quorum interval arrives at the first, second, third, and sixth intervals of the first round. The synchronous interval arrives at the other intervals. To detect the change of neighboring clusters, each cluster should have at least one host to serve as the watcher in each round. In a loosely coupled cluster, since the cluster head does not maintain the cluster structure, each host decides its power mode according to its own knowledge. An N R-probabilitybased is proposed for loosely coupled clusters. The probability is set according to the number of detected cluster members, the NR (ignal Noise Ratio) of the beacon frame sent by the cluster head and the mobility of the host. The host can use the detected N R to estimate its distance from the cluster head. The greater the NR is, the shorter the estimative distance becomes. The host that has longer distance from the cluster head will have higher probability to switch to detecting mode, since it is closer to the border of the cluster. or example, if the number of detected cluster members is n, k is a factor set according to the moving speed of the host, the estimative distance between the host and the cluster head is d, and the communication range is r, the probability that the host will switch to detecting mode is (d + r/2)k/nr. This scheme is adaptive to host density, mobility and distance. In a tightly coupled cluster structure, since the cluster head has the knowledge of all its cluster members, it can use these information to dispatch proper hosts to serve as watchers. A location-based is proposed for tightly coupled clusters. In this scheme, the cluster head needs to record the locations of all its cluster members. (The location of the host may be derived from GP or other location estimating methods.) In each round, the cluster head constructs a convex hull according to all its cluster members locations. ince the coverage area of the hosts inside the convex hull may be covered by other hosts, only the hosts belonging to the convex hull need to be dispatched as watchers. The cluster head dispatches k watchers in each round according to a greedy algorithm. Assuming the set of hosts belonging to the convex hull is denoted as CH. The cluster head first dispatches a host a, which is farthest from the cluster head, from CH. And then host a is removed ig. 3. An example of anycasting in a MANET with asynchronous clusters. from CH. The rest k 1 watchers are dispatched according to their extra coverage area. The k 1 hosts those can cover the greatest extra area are dispatched as the watchers. In the following rounds, the set CH would be updated, but the removed hosts will not be added back to set CH until CH =. When CH =, the cluster head will reset CH. This scheme is adaptive to host density, mobility and location. III. ROUTING PROTOCO OR THE PROPOED POWER-AVING PROTOCO When transmitting packets to the P host in the same cluster, we can adopt the unicast protocol of IEEE s P protocol. or inter-cluster communication, the anycast protocol can be adopted. It is similar to the unicast protocol in IEEE s P protocol, except that the destination host s id is replaced by the destination cluster s id. During the destination cluster s MTIM window, the sender contends to send its MTIM packet to the destination cluster. Any of the host belonging to the destination cluster received the MTIM packet would reply an ACK after an I and stay awake in the remaining of the beacon interval. If the sender hears a busy tone after the MTIM packet has been sent, it will adopt the DC procedure to send the buffered packet to the receiver after the MTIM window. With the anycast protocol, each host needs not to be very sensitive to the change of neighbors. As for the broadcast protocol, since all the hosts in the same cluster are synchronized, we can adopt the broadcast protocol of IEEE s P protocol. ig. 3 shows an example, where host A wants to transmit a packet to a neighboring cluster, where hosts B and C belong to the same cluster. During the cluster s MTIM window, an MTIM frame is sent from host A to the cluster. In response, hosts B and C will reply with ACKs. After the cluster s MTIM window finishes, host A can try to send out its data packet. In our routing protocol, the route request packet is scattered along the backbone, which consists of cluster heads and gateways. irst, the source host (if it is not the cluster head) will unicast the route request packet to the cluster head. After received the route request packet, the cluster head will broadcast the route request packet to its cluster members, and then the gateways use the anycast protocol to scatter the route request packet to the neighboring cluster, and so on. When the route request packet has reached the destination, unicast can be used to send the route reply packets. When P hosts in the

4 chosen route receive the route reply packet, it can go to the active mode. In a cluster-based network, except the host close to the border of the network, most of the hosts would become cluster heads or gateways. To reduce redundant transmissions, two strategies can be adopted while scattering the route request packet. In a loosely coupled cluster, each gateway may give up to send its anycast packet, if it has overheard the same packet, as its own anycast packet, being sent to the same destination. In a tightly coupled cluster, the cluster head will assign proper gateways to transmit packets to neighboring clusters and thus reduce redundant transmissions. IV. IMUATION EXPERIMENT To evaluate the performance of the proposed P protocol, we have developed a simulator using C. In the simulations, we assume that there are 100 hosts in the network, the area size is 1000m 1000m, and the transmission radius is 250 meters. Hosts transmission rate is 2M bits/sec, the length of the beacon interval is 100 ms, and the battery power of each mobile host is 100 J. The MAC part basically follows the IEEE standard [9], except the power management part. or the proposed P protocols, the routing protocol proposed in section III is adopted; for asynchronous P protocols, the AODV routing protocol is adopted. When the route is detected to be broken, the data packets would be dropped. The periodically-fully-awake-interval and cyclic quorum protocols are adopted as the asynchronous P protocols. The source and the destination of each route are randomly selected. Two parameters are tunable in our simulations: Traffic load: Routes are generated by a Poisson distribution with rate between 1 5 routs/sec. or each route, 40 packets, each of size 256 bytes, will be sent. Mobility: Host mobility follows the random way-point model. The pause time is set to 30 seconds. When moving, a host will move at a speed between 0 20 m/sec. Basically, each simulation lasts until all the hosts have run out of energies. Each result is obtained from the average of 100 simulation runs. or simplicity, we assume that all hosts are in the P mode. Three performance metrics are used in the simulations: survival ratio: the number of surviving hosts over the total number of hosts. (A host is said to be surviving if its power is not exhausted yet.) Throughput: the average number of MAC-layer data packets successfully received in the network per second. The throughput is evaluated up to the time when any of the host run out of energy. ifetime throughput: the total number of MAC-layer data packets successfully received during the lifetime of the network. The power model in [10] is adopted, which is obtained by real experiments on ucent WaveAN cards. To make comparison, we also simulate the two asynchronous P protocols: periodically-fully-awake interval [4] and cyclic quorum ig. 4. (a ).Throughput vs. mobility..ifetime throughput vs. mobility. scheme [6]. ince the active ratios of the periodically-fullyawake interval with period length 5 and cyclic quorum scheme with quorum size 35 are almost the same ( 1 5 ), the round lengths are set as 5 and 35 beacon intervals when periodicallyfully-awake interval and cyclic quorum scheme are adopted, respectively. or simplicity, the asynchronous P protocols, periodicallyfully-awake-interval protocol with parameter p and the cyclic quorum scheme with parameter n, are denoted as P(p) and C(n), respectively. The NR-probability-based scheme adopting P(p) and C(n) as the asynchronous P protocols are denoted as PNR(p) and CNR(n), respectively. The location-based scheme adopting P(p) and C(n) as the asynchronous P protocols are denoted as P CB(p) and CCB(n), respectively. A. Impact of Mobility To observe the effect of mobility, we fix the traffic load as 1 route/sec and vary hosts moving speed between 0 20 m/sec. ig. 4 shows the impact of mobility on throughput. Mobility has a negative impact on throughput for all schemes because the routes are more likely to be broken as the moving speed increases, and thus the data packets are more likely to be dropped. The throughput of the proposed schemes (e.g. PNR(5), CNR(35), PCB(5), and CCB(35)) is slightly lower than that of the asynchronous schemes (e.g. P(5) and C(35)), because the asynchronous schemes adopt AODV as their routing protocol, which uses flooding to discover route, and thus are less sensitive to mobility. However, as ig. 5 shows, the hosts adopting the proposed schemes survive much longer than the hosts adopting the asynchronous schemes. Hence, the lifetime throughput of the proposed schemes is much better than that of the asynchronous schemes as shown in ig. 4. Overall, the scheme adopting the cyclic quorum protocol performs better than the one adopting the periodically-fully-awake protocol, because the cyclic quorum scheme transmits less beacons than the periodically-fullyawake scheme and thus causes lees interferences and has a better throughput. The NR-probability-based scheme performs slightly better than the location-based scheme in terms of throughput, because the NR-probability-based scheme is based on a loosely coupled cluster structure, which is less sensitive to mobility. ig. 5 shows the impact of mobility on survival ratio. Higher mobility may bring more hosts to act as watchers and thus consume more power. However, the route is more likely to

5 ig. 5. urvival ratio vs. mobility..moving speed = 0 m/sec, and.moving speed = 20 m/sec. ig. 6. urvival ratio vs. traffic load..traffic load = 1 route/sec, and.traffic load = 5 routes/sec. be broken in high mobility environment and thus less data packets are transmitted and less power is consumed. The hosts adopting the proposed schemes survive much longer than the hosts adopting the asynchronous schemes, because the broadcasting cost is much lower and only a few P hosts need to serve as watchers by adopting asynchronous P protocol. In the proposed schemes, since most of the P hosts adopt the synchronous P protocol for most of the lifetime and lots of redundant transmissions are reduced, lots of power can be conserved. B. Impact of Traffic oad To observe the impact of traffic load, we fix the moving speed as 10 meters/sec and vary the traffic load between 1 5 routes/sec. ig. 6 shows how traffic load decreases the survival ratio of hosts. As the traffic load increases, each P host needs to keep awake for a longer period of time to establish routes and transmit data packets, and thus consumes more power. The effect of traffic load on throughput is shown in ig. 7. As the traffic load becomes higher, the throughput increases. When the traffic load is high, the proposed schemes outperform the asynchronous schemes in terms of throughput. ince the proposed schemes spend less cost to establish a route, the proposed scheme can tolerate a higher traffic load and saturate slower than the asynchronous schemes. ig. 7 shows that the proposed schemes outperform the asynchronous schemes in terms of lifetime throughput significantly, because the proposed schemes possess a longer network lifetime and a higher throughput. Overall, the location-based scheme performs slightly better than the NR-probability-based scheme scheme in terms of survival ratio, and the NR-probabilitybased scheme performs slightly better than the location-based scheme in terms of throughput. V. CONCUION In this paper, we have addressed the problems of asynchronous P protocols in a multi-hop MANET. We have pointed out two major drawbacks. irst, the host needs to keep awake for longer time, so as to discover asynchronous P neighbors. Besides, a broadcasting message has to be sent multiple times if a sending host s neighbors wake up asynchronously. To conquer the deficiency of asynchronous P protocols, we have proposed several cluster-based semiasynchronous P protocols for multi-hop MANETs. Two strategies have been provided in our inter-cluster strategy, including NR-probability-based and location-based schemes. imulation results have shown that the proposed schemes outperform the asynchronous schemes in terms of survival ratio and lifetime throughput. Overall, the NR-probabilitybased scheme adopting the cyclic quorum protocol performs the best in terms of lifetime throughput and the location-based scheme adopting the cyclic quorum protocol outperforms the others in terms of survival ratio. REERENCE [1] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, pan: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, Proc. of the International Conference on Mobile Computing and Networking, pp , [2] Y. Xu, J. Heidemann, and D. Estrin, Geography-informed Energy Conservation for Ad Hoc Routing, Proc. of the International Conference on Mobile Computing and Networking, pp , [3] Y.-C. Tseng and T.-Y. Hsieh, ully Power-Aware and occation-aware Protocols for Wireless Multi-hop Ad Hoc Networks, IEEE ICCCN, [4] Y.-C. Tseng, C.-. Hsu, and T.-Y. Hsieh, Power-aving Protocols for IEEE Based Multi-Hop Ad Hoc Networks, IEEE INOCOM, pp , [5] R. Zheng, J. C. Hou, and. ha, Asynchronous Wakeup for Ad Hoc Networks, ACM MobiHoc, pp , [6] J.-R. Jiang, Y.-C. Tseng, C.-. Hsu, and T.-H. ai, Quorum-based asynchronous power-saving protocols for ieee ad hoc networks, Proceedings of International Conference on Parallel Processing, [7] W. Ye, J. Heidemann, and D. Estrin, An energy-efficient mac protocol for wireless sensor networks, IEEE INOCOM, pp , [8] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energyefficient communication protocol for wireless microsensor networks, Proceedings of the Hawaii International Conference on ystem ciences, pp , [9] AN MAN tandards Committee of the IEEE Computer ociety, IEEE td , Wireless AN Medium Access Control (MAC) and Physical ayer (PHY) specifications, IEEE, [10]. M. eeney and M. Nilsson, Investigating the Energy Consumption of Wireless Network Interface in an Ad Hoc Networking Environment, IEEE INOCOM, pp , ig. 7. load..throughput vs. traffic load..ifetime throughput vs. traffic

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks Zehua Zhou Xiaojing Xiang State University of New York at Buffalo Buffalo, NY, USA {zzhou5, xxiang}@cse.buffalo.edu Xin Wang

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Random Asynchronous Wakeup Protocol for Sensor Networks

Random Asynchronous Wakeup Protocol for Sensor Networks Random Asynchronous Wakeup Protocol for Sensor Networks Vamsi Paruchuri, Shivakumar Basavaraju, Arjan Durresi, Rajgopal Kannan and S.S. Iyengar Louisiana State University Department of Computer Science

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

Initialization Protocols for IEEE Based Ad Hoc Networks Λ

Initialization Protocols for IEEE Based Ad Hoc Networks Λ Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,

More information

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University

More information

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe Sensor Deployment, Self- Organization, And Localization Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley, 2007 5/20/2008 WiSeLab@WMU; www.cs.wmich.edu/wise

More information

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks A MAC Protocol with Little Idle Listening for Wireless Sensor Networks Chaoguang Men 1,, Yongqian Lu 1, Dongsheng Wang 1, 1 Research and Development Center of High Dependability Computing Technology, Harbin

More information

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

A novel efficient power-saving MAC protocol for multi-hop MANETs

A novel efficient power-saving MAC protocol for multi-hop MANETs INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. (2011) Published online in Wiley Online Library (wileyonlinelibrary.com)..1328 A novel efficient power-saving MAC protocol for multi-hop

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

Exploiting Routing Redundancy using MAC layer Anycast to Improve Delay in WSN

Exploiting Routing Redundancy using MAC layer Anycast to Improve Delay in WSN Exploiting Routing Redundancy using MAC layer Anycast to Improve Delay in WSN Farhana Ashraf, Robin H. Kravets and Nitin H. Vaidya University of Illinois at Urbana-Champaign Email: {fashraf2, rhk, nhv}@illinois.edu

More information

An Asynchronous and Adaptive Quorum Based MAC Protocol for Wireless Sensor Networks

An Asynchronous and Adaptive Quorum Based MAC Protocol for Wireless Sensor Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING XX, XXX-XXX (2013) An Asynchronous and Adaptive Quorum Based MAC Protocol for Wireless Sensor Networks 1 L. SHERLY PUSPHA ANNABEL AND 2 K. MURUGAN 1 Department

More information

PERFORMING CLOCK SYNCHRONIZATION FOR POWER MANAGEMENT IN MULTI-HOP AD HOC NETWORKS

PERFORMING CLOCK SYNCHRONIZATION FOR POWER MANAGEMENT IN MULTI-HOP AD HOC NETWORKS International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 17 PERFORMING CLOCK SYNCHRONIZATION FOR POWER MANAGEMENT IN MULTI-HOP AD HOC NETWORKS Jatinder Singh Sant Longowal Institute

More information

Gaussian Firefly Algorithm Based Unilateral Wakeup Scheme in Mobile Adhoc Networks

Gaussian Firefly Algorithm Based Unilateral Wakeup Scheme in Mobile Adhoc Networks ISSN 2320 2602 Volume 3, No.8, August 2014 S.Indira et al., International Journal Journal of Advances of Advances in Computer Science in Computer and Technology, Science 3(8), August and 2014, Technology

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks

Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks AUTHORS: B. CHEN, K.JAMIESON, H. BALAKRISHNAN, R. MORRIS TARGET: A power saving technique 2 Multi-hop

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

An Efficient Power Saving MAC Protocol for IEEE Ad Hoc Wireless Networks *

An Efficient Power Saving MAC Protocol for IEEE Ad Hoc Wireless Networks * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1171-1188 (2007) An Efficient Power Saving MAC Protocol for IEEE 802.11 Ad Hoc Wireless Networks * Department of Computer Science and Information Engineering

More information

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks

Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks Abstract Tao Wu and Subir Biswas 1 Dept. of Electrical and Computer Engineering, Michigan State University wutao2@egr.msu.edu,

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Is Clock Synchronization Essential for Power Management in IEEE Based Mobile Ad Hoc Networks?

Is Clock Synchronization Essential for Power Management in IEEE Based Mobile Ad Hoc Networks? 1 Is Clock Synchronization Essential for Power Management in IEEE 802.11-Based Mobile Ad Hoc Networks? Ming Liu Ten H. Lai Ming-Tsan Liu Department of Computing and Information Science The Ohio State University

More information

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless

More information

Ferry Route Design with MAC Protocol in Delay Tolerant Networks

Ferry Route Design with MAC Protocol in Delay Tolerant Networks Ferry Route Design with MAC Protocol in Delay Tolerant Networks Chaitra T K 1, Dr A S Poornima Ph.D 2 1 Student, Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

RWPS: A Low Computation Routing Algorithm for Sensor Networks

RWPS: A Low Computation Routing Algorithm for Sensor Networks RWPS: A Low Computation Routing Algorithm for Sensor Networks Pierpaolo Bergamo, Daniela Maniezzo, Gianluca Mazzini Engineering Dept., University of Ferrara, Italy Mario Gerla Computer Science Dept., UCLA,

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29,

Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 211 Design and Implementation of Low Power Network Maintenance Protocols

More information

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations Sang Hoon Lee, Joon Ho Park, and Lynn Choi Department of Electronics and Computer Engineering Korea University

More information

On-demand power management for ad hoc networks q

On-demand power management for ad hoc networks q Ad Hoc Networks 3 (2005) 51 68 www.elsevier.com/locate/adhoc On-demand power management for ad hoc networks q Rong Zheng *, Robin Kravets Department of Compute Science, University of Illinois at Urbana-Champaign,

More information

DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost

DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost Mark Perillo and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester Rochester,

More information

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks Chao-Lieh Chen 1, Jeng-Wei Lee 2, Cheng-Zh Lin 3, Yi-Tsung Chen 2, Jar-Shone Ker 3, and Yau-Hwang Kuo 2 1 Department of Electronic

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Wireless Sensor Networks 8th Lecture

Wireless Sensor Networks 8th Lecture Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

BQPS: A Broadcast Mechanism for Asynchronous Quorum-based Power Saving Protocols in Ad-Hoc Networks

BQPS: A Broadcast Mechanism for Asynchronous Quorum-based Power Saving Protocols in Ad-Hoc Networks Journal of Computer and Robotics 1 (2010) 27-35 27 BQPS: A Broadcast Mechanism for Asynchronous Quorum-based Power Saving Protocols in Ad-Hoc Networks Shahrzad Shirazipourazad * Computer Engineering Department,

More information

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Dalimir Orfanus (IFI UiO + ABB CRC), 27.10.2011, Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Clustering in Wireless Sensor Networks Agenda LEACH Energy efficient

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set Available online at www.sciencedirect.com Procedia Computer Science 6 (2011) 408 412 Complex Adaptive Systems, Volume 1 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science

More information

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Baisakh Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, India

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

A new contention-based MAC protocol for geographic forwarding in ad hoc and sensor networks

A new contention-based MAC protocol for geographic forwarding in ad hoc and sensor networks A new contention-based MAC protocol for geographic forwarding in ad hoc and sensor networks Michele Zorzi UdR CNIT, Università di Ferrara via Saragat, 1 44100 Ferrara, Italy ph.: +39-0532-974840 fax: +39-0532-974870

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

Selective Backbone Construction for Topology Control in Ad Hoc Networks

Selective Backbone Construction for Topology Control in Ad Hoc Networks Selective Backbone Construction for Topology Control in Ad Hoc Networks Haitao Liu and Rajiv Gupta Dept. of Computer Science The University of Arizona Tucson, Arizona 85721 Email: {haitaol,gupta}@cs.arizona.edu

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Topology control in MANET for efficient energy conservation

Topology control in MANET for efficient energy conservation Topology control in MANET for efficient energy conservation Krushna J. Pandit 1, Shah Niyati 2 Abstract The MANET is a Mobile Ad-hoc Network. Topology control is an important issue in design of MANETs,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Study on Energy Conservation in MANET

Study on Energy Conservation in MANET 78 JOURNAL OF NETWORKS, VOL. 5, NO. 6, JUNE 21 Study on Energy Conservation in MANET Yu Wang School of Computer Science, Chongqing University of Arts and Science, Chongqing, China Email: cqwu29718@163.com

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Sensors & Transducers Published by IFSA Publishing, S. L.,

Sensors & Transducers Published by IFSA Publishing, S. L., Sensors & Transducers Published by IFSA Publishing, S. L., 2016 http://www.sensorsportal.com Compromises Between Quality of Service Metrics and Energy Consumption of Hierarchical and Flat Routing Protocols

More information

WP-PD Wirepas Mesh Overview

WP-PD Wirepas Mesh Overview WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

On-demand Power Management for Ad Hoc Networks

On-demand Power Management for Ad Hoc Networks On-demand Power Management for Ad Hoc Networks Rong Zheng, Robin Kravets Dept. of Department of Compute Science University of Illinois at Urbana-Champaign Urbana, IL 6181 E-mail: {zheng4,rhk}@cs.uiuc.edu

More information

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail

More information

IMAC: An Interference-aware Duty-cycle MAC Protocol for Wireless Sensor Networks Employing Multipath Routing

IMAC: An Interference-aware Duty-cycle MAC Protocol for Wireless Sensor Networks Employing Multipath Routing 211 211 Ninth IFIP IEEE/IFIP Ninth International Conference on on Embedded and and Ubiquitous Computing IMC: n Interference-aware uty-cycle MC Protocol for Wireless ensor Networks Employing Multipath Routing

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks Yoh-han Lee Department of Electrical Engineering Korea Advanced Institute of Science & Technology Daejeon, KOREA yohhanlee@kaist.ac.kr

More information