Cluster-Based Semi-Asynchronous Power-Saving Protocols for Multi-hop Ad Hoc Networks
|
|
- Charlotte Harvey
- 5 years ago
- Views:
Transcription
1 Cluster-Based emi-asynchronous Power-aving Protocols for Multi-hop Ad Hoc Networks Chih-hun Hsu Department of Information Management Nanya Institute of Technology Chung-i, 320, Taiwan Yu-Chee Tseng Department of Computer cience and Information Engineering National Chiao Tung University Hsin-Chu, 300, Taiwan Abstract Existing power saving (P) protocols for mobile adhoc networks (MANETs) can be categorized into synchronous and asynchronous ones. The synchronous P protocol can not be applied to a multi-hop MANET, because it will cause three problems, namely clock synchronization, neighbor discovery, and network partitioning. Although asynchronous solutions are attractive, yet, the cost is high as opposed to synchronous protocols. Hosts in asynchronous protocols need to keep awake for longer time, so as to discover asynchronous P neighbors. Besides, a broadcast message has to be sent multiple times if a sending host s neighbors wake up asynchronously. To conquer the deficiency of asynchronous P protocols, we propose several cluster-based semi-asynchronous P protocols for multi-hop MANETs. The basic idea is to cluster neighboring hosts such that synchronous P protocols can be adopted within individual clusters, and conserving a lot of energy. Two asynchronous schemes are provided in the inter-cluster level, including NR-probabilitybased and location-based schemes. imulation results show that, the proposed semi-asynchronous approaches outperform the asynchronous P protocols when applied to a multi-hop MANET. I. INTRODUCTION ince most mobile devices do not have plug-in power, battery is the only source to support their operations. Battery energy is a limited resource. Therefore, how to conserve battery energy is a critical issue for a MANET, which consists of mobile hosts only. A lot of works have dedicated to the design of wakeup and sleep patterns of mobile hosts [1], [2], [3]. However, these protocols are not power efficient in a sparse network, because almost all the hosts need to keep active all the time. IEEE s P protocol is synchronous in the sense that all hosts must remain time-synchronized. Clock synchronization in a large scale MANET is difficult. To solve the synchronization problem, asynchronous power-saving (P) protocols have been proposed. It is first pointed out in [4] that without harmonization there could exist neighbor discovery and network partitioning [4] problems. Three asynchronous P protocols, namely dominating-awake-interval, periodically-fully-awakeinterval, and quorum-based protocols, are proposed in [4] for multi-hop MANETs. Another asynchronous P protocol for multi-hop MANETs is proposed in [5], which formulates the problem of generating wakeup schedules as a block design problem in combinatorics. To improve the works in [4], several quorum-based P protocols, namely grid quorum, torus quorum, cyclic quorum, and finite projective plane quorum protocols, are proposed in [6]. In this paper, we observe that although asynchronous P protocols can conquer the clock synchronization problem, they may have some performance concerns. In order to discover asynchronous neighbors, hosts need to keep awake for some extra time. Besides, the broadcasting cost is high, because it takes several transmissions for a host to wake up all its asynchronous neighbors. To conquer these deficiencies, we propose several cluster-based semi-asynchronous P protocols for multi-hop MANETs. Although, a cluster-based semiasynchronous P protocol for wireless sensor network (- MAC) has been proposed in [7], yet, -MAC is designed for a static network. When applied to multi-hop MANETs, neighbor discovery and network partitioning problems may occur. The proposed protocol works as follows. irst, hosts are clustered. Inside each cluster, hosts adopt a synchronous P protocol so as to save more energy. Then each cluster is regarded as a super node and among super nodes we will run an asynchronous P protocol. To realize this idea, within each cluster we will request some hosts to serve as watchers in a rotation manner. Only watchers need to run the asynchronous P protocol. We propose two schemes to delegate hosts as watchers: NR-probability-based and location-based schemes. These schemes are adaptive, energy-efficient, and sensitive to the change of neighbors. imulation results show that the proposed semi-asynchronous approaches do outperform asynchronous P protocols when applied to a multi-hop MANET. The rest of this paper is organized as follows. In ection 2, we present our cluster-based semi-asynchronous powersaving protocols. Routing protocols based on our power-saving mechanisms are discussed in ection 3. imulation results are presented in ection 4. ection 5 concludes this paper. II. CUTER-BAED EMI-AYNCHRONOU POWER-AVING PROTOCO The goal of our P protocol is to achieve the power efficiency of the synchronous P protocol, while still being able to be applied to a multi-hop MANET. We partition the network into several clusters and synchronize all the hosts in the same cluster. The host with enough energy and the fastest
2 clock among all its neighbors will be chosen as the cluster head and each host will follow the clock of its cluster head. ince the distance between the cluster head and cluster member is only single hop, it would be much easier for the cluster head to synchronize all the hosts in the same cluster. When all hosts in the same cluster are synchronized, each P host can adopt the synchronous P protocol (eg. IEEE s P protocol) as its intra-cluster protocol, so that it can conserve more power. If we regard each cluster as a super node, the clustering MANET can be regarded as a network consists of several asynchronous super nodes. Therefore, how to design the intercluster strategy, so that the asynchronous super nodes (clusters) can detect each other, is an important issue. Each of the super node (cluster) may adopt the asynchronous P protocol to detect its asynchronous neighbors. ince each cluster may consist of several P hosts, it is not necessary for every cluster member to adopt the asynchronous P protocol simultaneously. The members of each cluster may serve as watchers by adopting the asynchronous P protocol in turn. The P host not serving as watchers may adopt the synchronous P protocol. Each P host can adopt either synchronous or asynchronous P protocols according to the schemes proposed in section II-B. Because the paper length is limited and the clustering problem of MANET has been studied extensively [8], we will not discuss how to cluster the MANET in this paper. In the following subsections, we will first show the channel model of our protocol. Then two schemes are proposed to guide the scheduling of P modes. A. Channel Model ince the proposed P protocol is cluster-based and semiasynchronous, its channel model is different from that of IEEE and asynchronous protocols. To maintain the cluster structure and synchronize the hosts in each individual cluster, the structure of beacon interval needs to be redesigned. Each beacon interval may contain four different windows, namely active window, synchronous window, beacon window, and MTIM (Multi-hop TIM) window. The structure of a beacon interval may vary for different protocols (to be elaborated later). The active window is the extra active period that the P host should turn on its receiver to listen to any packet and take proper actions. The synchronous window is for the cluster head to send its beacon, while the beacon window is for the other P hosts to send their beacons. The MTIM window is for other hosts to send their MTIM frames to the P host. MTIM frames serve the similar purpose as ATIM frames in IEEE To avoid collisions among beacons/mtims, a host should wait for a random number of slots before sending out its beacon/mtims. Normally, the host adopts the synchronous P protocol. The structure of the synchronous interval is similar to that of IEEE , each interval starts with a synchronous window followed by an MTIM window. When serving as a watcher, the host may adopt the periodically-fully-awakeinterval or quorum-based protocols [4]. When the periodically- ig. 1. interval ully-awake Interval ynchronous Window ow-power Interval Beacon Window MTIM Window ynchronous Interval (c) ActiveWindow.ully-awake interval,.ow-power interval (c).ynchronous fully-awake-interval protocol is adopted, the beacon intervals are classified as low-power and fully-awake intervals. The fully-awake intervals arrive periodically every p intervals, and the rest of the intervals are low-power intervals. The structures of these beacon intervals are defined as follows. Each low-power interval starts with a synchronous window followed by a beacon window and an MTIM window. In the rest of the time, the host can go to the sleep mode. Each fully-awake interval also starts with a synchronous window followed by a beacon window and an MTIM window. However, the host must remain awake in the rest of the time. When the quorum-based protocol is adopted, the beacon intervals are classified as fully-awake (quorum) and synchronous (non-quorum) intervals. ig. 1,, and (c) show the structures of the fully-awake, low-power, and synchronous intervals, respectively. B. Power Mode cheduling When a host has idled for a certain period of time, it may switch to P mode. The synchronous P protocol is adopted as the intra-cluster P protocol and the asynchronous P protocol is adopted as the inter-cluster P protocol. The P host follows the clock of the cluster head to turn on and turn off its radio periodically. To detect the approaching asynchronous cluster, some hosts need to serve as watchers by adopting the asynchronous P protocol. To conserve energy, the other P hosts would adopt the synchronous P protocol. The designing features of our protocols are shown as follows: adaptive: the protocol should be adaptive to host density, mobility, and location. sensitive to neighbor change: each cluster should be able to detect the change of neighboring clusters. or any two asynchronous watchers, if their duty time are overlapping, they would have chance to detect each other. energy efficient: the proposed protocol should be more efficient than the asynchronous P protocol in terms of power consumption. According to the above features, we propose two schemes for our power mode scheduling protocol. In the beginning of each round, the P host decides its power mode according to the proposed scheduling schemes. There are p beacon intervals in each round, where p is a multiple of the quorum size or period length of the adopted asynchronous P protocol. If the P host serves as a watcher, it will adopt the asynchronous P protocol in this round, otherwise, it will adopt the synchronous P protocol in this round.
3 1st round 2nd round 1st round 2nd round ig. 2..An example of adopting the periodically-fully-awake-interval protocol as the asynchronous P protocols.an example of adopting the cyclic quorum scheme as the asynchronous P protocols, where represents synchronous, represents fully-awake, and represents low-power intervals. In ig. 2 and, assuming the P host decides (or is dispatched) to serve as a watcher in the first round and become normal host in the second round. The round length is set as 10 beacon intervals. In ig. 2, the periodically-fully-awakeinterval protocol is adopted as the asynchronous P protocol. The fully-awake interval arrives at the first interval and the low-power interval arrives at the second, third,..., and tenth intervals of the first round. In ig. 2, the cyclic quorum scheme [6] is adopted as the asynchronous P protocol. The quorum interval arrives at the first, second, third, and sixth intervals of the first round. The synchronous interval arrives at the other intervals. To detect the change of neighboring clusters, each cluster should have at least one host to serve as the watcher in each round. In a loosely coupled cluster, since the cluster head does not maintain the cluster structure, each host decides its power mode according to its own knowledge. An N R-probabilitybased is proposed for loosely coupled clusters. The probability is set according to the number of detected cluster members, the NR (ignal Noise Ratio) of the beacon frame sent by the cluster head and the mobility of the host. The host can use the detected N R to estimate its distance from the cluster head. The greater the NR is, the shorter the estimative distance becomes. The host that has longer distance from the cluster head will have higher probability to switch to detecting mode, since it is closer to the border of the cluster. or example, if the number of detected cluster members is n, k is a factor set according to the moving speed of the host, the estimative distance between the host and the cluster head is d, and the communication range is r, the probability that the host will switch to detecting mode is (d + r/2)k/nr. This scheme is adaptive to host density, mobility and distance. In a tightly coupled cluster structure, since the cluster head has the knowledge of all its cluster members, it can use these information to dispatch proper hosts to serve as watchers. A location-based is proposed for tightly coupled clusters. In this scheme, the cluster head needs to record the locations of all its cluster members. (The location of the host may be derived from GP or other location estimating methods.) In each round, the cluster head constructs a convex hull according to all its cluster members locations. ince the coverage area of the hosts inside the convex hull may be covered by other hosts, only the hosts belonging to the convex hull need to be dispatched as watchers. The cluster head dispatches k watchers in each round according to a greedy algorithm. Assuming the set of hosts belonging to the convex hull is denoted as CH. The cluster head first dispatches a host a, which is farthest from the cluster head, from CH. And then host a is removed ig. 3. An example of anycasting in a MANET with asynchronous clusters. from CH. The rest k 1 watchers are dispatched according to their extra coverage area. The k 1 hosts those can cover the greatest extra area are dispatched as the watchers. In the following rounds, the set CH would be updated, but the removed hosts will not be added back to set CH until CH =. When CH =, the cluster head will reset CH. This scheme is adaptive to host density, mobility and location. III. ROUTING PROTOCO OR THE PROPOED POWER-AVING PROTOCO When transmitting packets to the P host in the same cluster, we can adopt the unicast protocol of IEEE s P protocol. or inter-cluster communication, the anycast protocol can be adopted. It is similar to the unicast protocol in IEEE s P protocol, except that the destination host s id is replaced by the destination cluster s id. During the destination cluster s MTIM window, the sender contends to send its MTIM packet to the destination cluster. Any of the host belonging to the destination cluster received the MTIM packet would reply an ACK after an I and stay awake in the remaining of the beacon interval. If the sender hears a busy tone after the MTIM packet has been sent, it will adopt the DC procedure to send the buffered packet to the receiver after the MTIM window. With the anycast protocol, each host needs not to be very sensitive to the change of neighbors. As for the broadcast protocol, since all the hosts in the same cluster are synchronized, we can adopt the broadcast protocol of IEEE s P protocol. ig. 3 shows an example, where host A wants to transmit a packet to a neighboring cluster, where hosts B and C belong to the same cluster. During the cluster s MTIM window, an MTIM frame is sent from host A to the cluster. In response, hosts B and C will reply with ACKs. After the cluster s MTIM window finishes, host A can try to send out its data packet. In our routing protocol, the route request packet is scattered along the backbone, which consists of cluster heads and gateways. irst, the source host (if it is not the cluster head) will unicast the route request packet to the cluster head. After received the route request packet, the cluster head will broadcast the route request packet to its cluster members, and then the gateways use the anycast protocol to scatter the route request packet to the neighboring cluster, and so on. When the route request packet has reached the destination, unicast can be used to send the route reply packets. When P hosts in the
4 chosen route receive the route reply packet, it can go to the active mode. In a cluster-based network, except the host close to the border of the network, most of the hosts would become cluster heads or gateways. To reduce redundant transmissions, two strategies can be adopted while scattering the route request packet. In a loosely coupled cluster, each gateway may give up to send its anycast packet, if it has overheard the same packet, as its own anycast packet, being sent to the same destination. In a tightly coupled cluster, the cluster head will assign proper gateways to transmit packets to neighboring clusters and thus reduce redundant transmissions. IV. IMUATION EXPERIMENT To evaluate the performance of the proposed P protocol, we have developed a simulator using C. In the simulations, we assume that there are 100 hosts in the network, the area size is 1000m 1000m, and the transmission radius is 250 meters. Hosts transmission rate is 2M bits/sec, the length of the beacon interval is 100 ms, and the battery power of each mobile host is 100 J. The MAC part basically follows the IEEE standard [9], except the power management part. or the proposed P protocols, the routing protocol proposed in section III is adopted; for asynchronous P protocols, the AODV routing protocol is adopted. When the route is detected to be broken, the data packets would be dropped. The periodically-fully-awake-interval and cyclic quorum protocols are adopted as the asynchronous P protocols. The source and the destination of each route are randomly selected. Two parameters are tunable in our simulations: Traffic load: Routes are generated by a Poisson distribution with rate between 1 5 routs/sec. or each route, 40 packets, each of size 256 bytes, will be sent. Mobility: Host mobility follows the random way-point model. The pause time is set to 30 seconds. When moving, a host will move at a speed between 0 20 m/sec. Basically, each simulation lasts until all the hosts have run out of energies. Each result is obtained from the average of 100 simulation runs. or simplicity, we assume that all hosts are in the P mode. Three performance metrics are used in the simulations: survival ratio: the number of surviving hosts over the total number of hosts. (A host is said to be surviving if its power is not exhausted yet.) Throughput: the average number of MAC-layer data packets successfully received in the network per second. The throughput is evaluated up to the time when any of the host run out of energy. ifetime throughput: the total number of MAC-layer data packets successfully received during the lifetime of the network. The power model in [10] is adopted, which is obtained by real experiments on ucent WaveAN cards. To make comparison, we also simulate the two asynchronous P protocols: periodically-fully-awake interval [4] and cyclic quorum ig. 4. (a ).Throughput vs. mobility..ifetime throughput vs. mobility. scheme [6]. ince the active ratios of the periodically-fullyawake interval with period length 5 and cyclic quorum scheme with quorum size 35 are almost the same ( 1 5 ), the round lengths are set as 5 and 35 beacon intervals when periodicallyfully-awake interval and cyclic quorum scheme are adopted, respectively. or simplicity, the asynchronous P protocols, periodicallyfully-awake-interval protocol with parameter p and the cyclic quorum scheme with parameter n, are denoted as P(p) and C(n), respectively. The NR-probability-based scheme adopting P(p) and C(n) as the asynchronous P protocols are denoted as PNR(p) and CNR(n), respectively. The location-based scheme adopting P(p) and C(n) as the asynchronous P protocols are denoted as P CB(p) and CCB(n), respectively. A. Impact of Mobility To observe the effect of mobility, we fix the traffic load as 1 route/sec and vary hosts moving speed between 0 20 m/sec. ig. 4 shows the impact of mobility on throughput. Mobility has a negative impact on throughput for all schemes because the routes are more likely to be broken as the moving speed increases, and thus the data packets are more likely to be dropped. The throughput of the proposed schemes (e.g. PNR(5), CNR(35), PCB(5), and CCB(35)) is slightly lower than that of the asynchronous schemes (e.g. P(5) and C(35)), because the asynchronous schemes adopt AODV as their routing protocol, which uses flooding to discover route, and thus are less sensitive to mobility. However, as ig. 5 shows, the hosts adopting the proposed schemes survive much longer than the hosts adopting the asynchronous schemes. Hence, the lifetime throughput of the proposed schemes is much better than that of the asynchronous schemes as shown in ig. 4. Overall, the scheme adopting the cyclic quorum protocol performs better than the one adopting the periodically-fully-awake protocol, because the cyclic quorum scheme transmits less beacons than the periodically-fullyawake scheme and thus causes lees interferences and has a better throughput. The NR-probability-based scheme performs slightly better than the location-based scheme in terms of throughput, because the NR-probability-based scheme is based on a loosely coupled cluster structure, which is less sensitive to mobility. ig. 5 shows the impact of mobility on survival ratio. Higher mobility may bring more hosts to act as watchers and thus consume more power. However, the route is more likely to
5 ig. 5. urvival ratio vs. mobility..moving speed = 0 m/sec, and.moving speed = 20 m/sec. ig. 6. urvival ratio vs. traffic load..traffic load = 1 route/sec, and.traffic load = 5 routes/sec. be broken in high mobility environment and thus less data packets are transmitted and less power is consumed. The hosts adopting the proposed schemes survive much longer than the hosts adopting the asynchronous schemes, because the broadcasting cost is much lower and only a few P hosts need to serve as watchers by adopting asynchronous P protocol. In the proposed schemes, since most of the P hosts adopt the synchronous P protocol for most of the lifetime and lots of redundant transmissions are reduced, lots of power can be conserved. B. Impact of Traffic oad To observe the impact of traffic load, we fix the moving speed as 10 meters/sec and vary the traffic load between 1 5 routes/sec. ig. 6 shows how traffic load decreases the survival ratio of hosts. As the traffic load increases, each P host needs to keep awake for a longer period of time to establish routes and transmit data packets, and thus consumes more power. The effect of traffic load on throughput is shown in ig. 7. As the traffic load becomes higher, the throughput increases. When the traffic load is high, the proposed schemes outperform the asynchronous schemes in terms of throughput. ince the proposed schemes spend less cost to establish a route, the proposed scheme can tolerate a higher traffic load and saturate slower than the asynchronous schemes. ig. 7 shows that the proposed schemes outperform the asynchronous schemes in terms of lifetime throughput significantly, because the proposed schemes possess a longer network lifetime and a higher throughput. Overall, the location-based scheme performs slightly better than the NR-probability-based scheme scheme in terms of survival ratio, and the NR-probabilitybased scheme performs slightly better than the location-based scheme in terms of throughput. V. CONCUION In this paper, we have addressed the problems of asynchronous P protocols in a multi-hop MANET. We have pointed out two major drawbacks. irst, the host needs to keep awake for longer time, so as to discover asynchronous P neighbors. Besides, a broadcasting message has to be sent multiple times if a sending host s neighbors wake up asynchronously. To conquer the deficiency of asynchronous P protocols, we have proposed several cluster-based semiasynchronous P protocols for multi-hop MANETs. Two strategies have been provided in our inter-cluster strategy, including NR-probability-based and location-based schemes. imulation results have shown that the proposed schemes outperform the asynchronous schemes in terms of survival ratio and lifetime throughput. Overall, the NR-probabilitybased scheme adopting the cyclic quorum protocol performs the best in terms of lifetime throughput and the location-based scheme adopting the cyclic quorum protocol outperforms the others in terms of survival ratio. REERENCE [1] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, pan: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, Proc. of the International Conference on Mobile Computing and Networking, pp , [2] Y. Xu, J. Heidemann, and D. Estrin, Geography-informed Energy Conservation for Ad Hoc Routing, Proc. of the International Conference on Mobile Computing and Networking, pp , [3] Y.-C. Tseng and T.-Y. Hsieh, ully Power-Aware and occation-aware Protocols for Wireless Multi-hop Ad Hoc Networks, IEEE ICCCN, [4] Y.-C. Tseng, C.-. Hsu, and T.-Y. Hsieh, Power-aving Protocols for IEEE Based Multi-Hop Ad Hoc Networks, IEEE INOCOM, pp , [5] R. Zheng, J. C. Hou, and. ha, Asynchronous Wakeup for Ad Hoc Networks, ACM MobiHoc, pp , [6] J.-R. Jiang, Y.-C. Tseng, C.-. Hsu, and T.-H. ai, Quorum-based asynchronous power-saving protocols for ieee ad hoc networks, Proceedings of International Conference on Parallel Processing, [7] W. Ye, J. Heidemann, and D. Estrin, An energy-efficient mac protocol for wireless sensor networks, IEEE INOCOM, pp , [8] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energyefficient communication protocol for wireless microsensor networks, Proceedings of the Hawaii International Conference on ystem ciences, pp , [9] AN MAN tandards Committee of the IEEE Computer ociety, IEEE td , Wireless AN Medium Access Control (MAC) and Physical ayer (PHY) specifications, IEEE, [10]. M. eeney and M. Nilsson, Investigating the Energy Consumption of Wireless Network Interface in an Ad Hoc Networking Environment, IEEE INOCOM, pp , ig. 7. load..throughput vs. traffic load..ifetime throughput vs. traffic
SENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationImproving IEEE Power Saving Mechanism
1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of
More informationEnhanced Power Saving Scheme for IEEE DCF Based Wireless Networks
Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationDelay Analysis of ML-MAC Algorithm For Wireless Sensor Networks
Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate
More informationAn Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks
An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks Zehua Zhou Xiaojing Xiang State University of New York at Buffalo Buffalo, NY, USA {zzhou5, xxiang}@cse.buffalo.edu Xin Wang
More informationCOMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.
COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,
More informationROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path
More informationMobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad
More informationH-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks
H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationRandom Asynchronous Wakeup Protocol for Sensor Networks
Random Asynchronous Wakeup Protocol for Sensor Networks Vamsi Paruchuri, Shivakumar Basavaraju, Arjan Durresi, Rajgopal Kannan and S.S. Iyengar Louisiana State University Department of Computer Science
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationResearch Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks
Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless
More informationInitialization Protocols for IEEE Based Ad Hoc Networks Λ
Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,
More informationADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks
AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University
More informationSensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe
Sensor Deployment, Self- Organization, And Localization Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley, 2007 5/20/2008 WiSeLab@WMU; www.cs.wmich.edu/wise
More informationA MAC Protocol with Little Idle Listening for Wireless Sensor Networks
A MAC Protocol with Little Idle Listening for Wireless Sensor Networks Chaoguang Men 1,, Yongqian Lu 1, Dongsheng Wang 1, 1 Research and Development Center of High Dependability Computing Technology, Harbin
More informationCHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS
89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationA novel efficient power-saving MAC protocol for multi-hop MANETs
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. (2011) Published online in Wiley Online Library (wileyonlinelibrary.com)..1328 A novel efficient power-saving MAC protocol for multi-hop
More informationCollision Free and Energy Efficient MAC protocol for Wireless Networks
110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin
More informationExploiting Routing Redundancy using MAC layer Anycast to Improve Delay in WSN
Exploiting Routing Redundancy using MAC layer Anycast to Improve Delay in WSN Farhana Ashraf, Robin H. Kravets and Nitin H. Vaidya University of Illinois at Urbana-Champaign Email: {fashraf2, rhk, nhv}@illinois.edu
More informationAn Asynchronous and Adaptive Quorum Based MAC Protocol for Wireless Sensor Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING XX, XXX-XXX (2013) An Asynchronous and Adaptive Quorum Based MAC Protocol for Wireless Sensor Networks 1 L. SHERLY PUSPHA ANNABEL AND 2 K. MURUGAN 1 Department
More informationPERFORMING CLOCK SYNCHRONIZATION FOR POWER MANAGEMENT IN MULTI-HOP AD HOC NETWORKS
International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 17 PERFORMING CLOCK SYNCHRONIZATION FOR POWER MANAGEMENT IN MULTI-HOP AD HOC NETWORKS Jatinder Singh Sant Longowal Institute
More informationGaussian Firefly Algorithm Based Unilateral Wakeup Scheme in Mobile Adhoc Networks
ISSN 2320 2602 Volume 3, No.8, August 2014 S.Indira et al., International Journal Journal of Advances of Advances in Computer Science in Computer and Technology, Science 3(8), August and 2014, Technology
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationSpan: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks
Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks AUTHORS: B. CHEN, K.JAMIESON, H. BALAKRISHNAN, R. MORRIS TARGET: A power saving technique 2 Multi-hop
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationGeographical Routing Algorithms In Asynchronous Wireless Sensor Network
Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationAn Efficient Power Saving MAC Protocol for IEEE Ad Hoc Wireless Networks *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1171-1188 (2007) An Efficient Power Saving MAC Protocol for IEEE 802.11 Ad Hoc Wireless Networks * Department of Computer Science and Information Engineering
More informationHierarchical Low Power Consumption Technique with Location Information for Sensor Networks
Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita
More informationMaximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication
Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationReducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks
Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks Abstract Tao Wu and Subir Biswas 1 Dept. of Electrical and Computer Engineering, Michigan State University wutao2@egr.msu.edu,
More informationPresented by: Murad Kaplan
Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical
More informationIs Clock Synchronization Essential for Power Management in IEEE Based Mobile Ad Hoc Networks?
1 Is Clock Synchronization Essential for Power Management in IEEE 802.11-Based Mobile Ad Hoc Networks? Ming Liu Ten H. Lai Ming-Tsan Liu Department of Computing and Information Science The Ohio State University
More informationPerformance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless
More informationFerry Route Design with MAC Protocol in Delay Tolerant Networks
Ferry Route Design with MAC Protocol in Delay Tolerant Networks Chaitra T K 1, Dr A S Poornima Ph.D 2 1 Student, Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University
More informationRWPS: A Low Computation Routing Algorithm for Sensor Networks
RWPS: A Low Computation Routing Algorithm for Sensor Networks Pierpaolo Bergamo, Daniela Maniezzo, Gianluca Mazzini Engineering Dept., University of Ferrara, Italy Mario Gerla Computer Science Dept., UCLA,
More informationNetworking Sensors, I
Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement
More informationQoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks
QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationProceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29,
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 211 Design and Implementation of Low Power Network Maintenance Protocols
More informationAMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations
AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations Sang Hoon Lee, Joon Ho Park, and Lynn Choi Department of Electronics and Computer Engineering Korea University
More informationOn-demand power management for ad hoc networks q
Ad Hoc Networks 3 (2005) 51 68 www.elsevier.com/locate/adhoc On-demand power management for ad hoc networks q Rong Zheng *, Robin Kravets Department of Compute Science, University of Illinois at Urbana-Champaign,
More informationDAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost
DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost Mark Perillo and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester Rochester,
More informationGeneric Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks
Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks Chao-Lieh Chen 1, Jeng-Wei Lee 2, Cheng-Zh Lin 3, Yi-Tsung Chen 2, Jar-Shone Ker 3, and Yau-Hwang Kuo 2 1 Department of Electronic
More informationCACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department
More informationAN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationReliable and Energy Efficient Protocol for Wireless Sensor Network
Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India
More informationMAC Essentials for Wireless Sensor Networks
MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer
More informationIssues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study
Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American
More informationWireless Sensor Networks 8th Lecture
Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationLink Estimation and Tree Routing
Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationScheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network
International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge
More informationOutline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols
Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University
More informationTMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks
: A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer
More informationBQPS: A Broadcast Mechanism for Asynchronous Quorum-based Power Saving Protocols in Ad-Hoc Networks
Journal of Computer and Robotics 1 (2010) 27-35 27 BQPS: A Broadcast Mechanism for Asynchronous Quorum-based Power Saving Protocols in Ad-Hoc Networks Shahrzad Shirazipourazad * Computer Engineering Department,
More informationDalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples
Dalimir Orfanus (IFI UiO + ABB CRC), 27.10.2011, Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Clustering in Wireless Sensor Networks Agenda LEACH Energy efficient
More informationProbabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
More informationTOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set
Available online at www.sciencedirect.com Procedia Computer Science 6 (2011) 408 412 Complex Adaptive Systems, Volume 1 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science
More informationEnergy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks
Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Baisakh Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, India
More informationAn Adaptive Self-Organization Protocol for Wireless Sensor Networks
An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,
More informationA new contention-based MAC protocol for geographic forwarding in ad hoc and sensor networks
A new contention-based MAC protocol for geographic forwarding in ad hoc and sensor networks Michele Zorzi UdR CNIT, Università di Ferrara via Saragat, 1 44100 Ferrara, Italy ph.: +39-0532-974840 fax: +39-0532-974870
More informationA PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN
A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia
More informationSelective Backbone Construction for Topology Control in Ad Hoc Networks
Selective Backbone Construction for Topology Control in Ad Hoc Networks Haitao Liu and Rajiv Gupta Dept. of Computer Science The University of Arizona Tucson, Arizona 85721 Email: {haitaol,gupta}@cs.arizona.edu
More informationMobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks
Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,
More informationReview on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks
RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,
More informationWPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/
WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network
More informationTopology control in MANET for efficient energy conservation
Topology control in MANET for efficient energy conservation Krushna J. Pandit 1, Shah Niyati 2 Abstract The MANET is a Mobile Ad-hoc Network. Topology control is an important issue in design of MANETs,
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationStudy on Energy Conservation in MANET
78 JOURNAL OF NETWORKS, VOL. 5, NO. 6, JUNE 21 Study on Energy Conservation in MANET Yu Wang School of Computer Science, Chongqing University of Arts and Science, Chongqing, China Email: cqwu29718@163.com
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationSensors & Transducers Published by IFSA Publishing, S. L.,
Sensors & Transducers Published by IFSA Publishing, S. L., 2016 http://www.sensorsportal.com Compromises Between Quality of Service Metrics and Energy Consumption of Hierarchical and Flat Routing Protocols
More informationWP-PD Wirepas Mesh Overview
WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,
More informationImproving Channel Scanning Procedures for WLAN Handoffs 1
Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationOn-demand Power Management for Ad Hoc Networks
On-demand Power Management for Ad Hoc Networks Rong Zheng, Robin Kravets Dept. of Department of Compute Science University of Illinois at Urbana-Champaign Urbana, IL 6181 E-mail: {zheng4,rhk}@cs.uiuc.edu
More informationAN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS
International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail
More informationIMAC: An Interference-aware Duty-cycle MAC Protocol for Wireless Sensor Networks Employing Multipath Routing
211 211 Ninth IFIP IEEE/IFIP Ninth International Conference on on Embedded and and Ubiquitous Computing IMC: n Interference-aware uty-cycle MC Protocol for Wireless ensor Networks Employing Multipath Routing
More informationPessimistic Backoff for Mobile Ad hoc Networks
Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of
More informationAn Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks
An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks Yoh-han Lee Department of Electrical Engineering Korea Advanced Institute of Science & Technology Daejeon, KOREA yohhanlee@kaist.ac.kr
More information