Research Article QPRD: QoS-Aware Peering Routing Protocol for Delay-Sensitive Data in Hospital Body Area Network

Size: px
Start display at page:

Download "Research Article QPRD: QoS-Aware Peering Routing Protocol for Delay-Sensitive Data in Hospital Body Area Network"

Transcription

1 Moble Informaton Systems Volume 15, Artcle ID , 16 pages Research Artcle : QoS-Aware Peerng Routng Protocol for Delay-Senstve Data n Hosptal Body Area Network Zahoor A. Khan, 1 Shyamala Svakumar, 2 Wllam Phllps, 3 Bll Robertson, 3 and Nadeem Javad 4 1 CIS, Hgher Colleges of Technology, Fujarah Campus, P.O. Box 4114, Fujarah, UAE 2 Sant Mary s Unversty, Halfax, NS, Canada B3H 3C3 3 InternetworkngProgram,FE,DalhouseUnversty,Halfax,NS,CanadaB3H4R2 4 COMSATS Insttute of Informaton Technology, Islamabad 44, Pakstan Correspondence should be addressed to Zahoor A. Khan; zahoor.khan@dal.ca Receved 1 November 14; Accepted 15 January 15 Academc Edtor: Haroon Malk Copyrght 15 Zahoor A. Khan et al. Ths s an open access artcle dstrbuted under the Creatve Commons Attrbuton Lcense, whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal work s properly cted. Consstent performance, energy effcency, and relable transfer of data are crtcal factors for real-tme montorng of a patent s data, especally n a hosptal envronment. In ths paper, a routng protocol s proposed by consderng the QoS requrements of the Body Area Network (BAN) data packets. A mechansm for handlng delay-senstve packets s provded by ths protocol. Moreover, lnear programmng based modelng along wth graphcal analyss s also done. Extensve smulatons usng the OMNeT++ based smulator Castala 3.2 llustrate that the proposed algorthm provdes better performance than other QoS-aware routng protocols n terms of hgher successful transmsson rates (throughputs), lower overall network traffc, no packets dropped due to MAC buffer overflow, and fewer numbers of packet tme outs n both the moble and statc patent scenaros. The scalablty of the protocol s demonstrated by smulatng a 24-bed real hosptal envronment wth 49 nodes. It s shown that, even n the larger real hosptal scenaro requrng the transmsson of delay-senstve data packets wth strngent delay requrements, outperforms comparable protocols. 1. Introducton A patent s real-tme health-related data montorng s possble wth the help of a new emergng feld, Body Area Networks (BANs). Body Area Network s a small wreless network whch conssts of sensors placed nsde or outsde of the human body. The body mplant or wearable sensors transmt the data to a central devce called Body Area Network Coordnator (BANC). BANC s computatonally more powerful devce then the body sensors. BANC s responsble for transferrng the sensors data to the next node or destnaton relably. Some mportant ssues of BAN data transmsson are to ensure the hgh relablty, low latency, compatblty wth movable sensors, and low energy consumpton. The specfc need of BAN communcaton s not fulflled by the exstng Personal Area Network (PAN) standards [1]. IEEE task group 6 was assgned a job n November 7 to suggest a BAN communcaton standard by the consderaton of short range transmsson, relablty and latency requrements of QoS, and less energy consumpton [2]. The real-tme montorng of patents requres the transmsson of delaysenstve data such as vdeo magng, moton sensng, and Electromyography (EMG) usng BAN. Some projects lke SMART [3], CareNet [4], AID-N [5], and ALARM-NET [6] provde dfferent methods to montor the patent data. In these methods, the transmsson of BAN data from body sensors to the central database s consdered and then BAN data s downloaded and montored from the central database. However, these technques do not montor or dsplay n real-tme BAN data n hosptal envronment. The advantages of usng a centralzed system are to have better control and mantan the data prvacy of the patent. However, traffc congeston, server falure, or lnk falure can cause consderable delays n montorng the patent data whch can badly affect treatment. On the other hand, dstrbuted

2 2 Moble Informaton Systems data approaches help to reduce the traffc load and can better accommodate patent moblty. The ZK-BAN peerng framework proposed n [7] suggests a semcentralzed system for relably montorng BAN data. The hybrd ZK-BAN uses bothcentralzedanddstrbutedtechnques. The routng protocols EPR, proposed and dscussed n [7], resolves the problem of handlng ordnary data packets. The QoS-aware peerng routng protocol for relabltysenstve data (QPRR) [8, 9] provdes a mechansm of handlng the relablty-senstve packets n addton to the ordnary data packets. The requrement of real-tme dsplay for delay-senstve packets s dfferent from those of ordnary and relablty-senstve packets. Hence, a new QoS-aware routng protocol s requred to handle delay-senstve packets. A novel routng protocol that addresses the ssue of handlng delaysenstve data and dsplayng n real-tme delay-senstve BAN data s proposed n ths paper. The proposed QoS-aware peerng routng protocol for delay-senstve packets () sdesgnedforthezk-banpeerngframeworkdscussedn [7]. provdes an nnovatve approach to the relable transmsson of ordnary packets (OPs) and delay-senstve packets (DSPs). The ntal results and archtecture of were presented n IEEE conference proceedngs [1]. Ths paper s organzed as follows: Secton 2 provdes the related work; Secton 3 dscusses the problem formulaton and modelng; Secton 4 provdes the proposed QoS-aware peerng routng protocol for delay-senstve data (); Secton 5 descrbes the performance evaluaton; Secton 6 dscusses the scalablty test of and Secton 7 presents the conclusons. 2. Related Work A smart montorng system of BAN data n hosptal envronment can resolve the challenges related to the management of patents medcal nformaton [11]. The Scalable Medcal Alert and Response Technology (SMART) [3] s desgned to montor the patent s data n hosptal emergency area. The datafromsensorsstransferredtothepdaandthenthepda sends t to the next ter by usng wreless standard 82.11b. CareNet [4] provdes an ntegrated wreless sensor based soluton to montor the patent s data from remote hosptals. The two-ter wreless communcaton s used n the projects [3, 4]. A GPS system s used n [5] to montor the patent s data only n outdoor BAN communcaton. A wreless sensor network for asssted-lvng and resdental montorng system wth a query based protocol s provded n ALARM-NET [6]. A three-ter communcaton approach s used n [12] to store the BAN data on the server and then make ths data avalable for the physcan to analyze the patent s data. The projects [3 6, 12] used a centralzed approach to montor the patent s data. However, the real-tme dsplay of data by consderng the delay requrements of delay-senstve packets s not consdered. To access the data from a centralzed server may cause delay and even a smple lnk falure can completely dsconnect the healthcare system from the central server. In [7], an energy-aware peerng routng protocol (EPR) was presented whch consders the energy level and geographc nformaton of the neghbor nodes for choosng the best next hop. The EPR only consders ordnary packets. It was shown that EPR has an overall lower energy consumpton than comparable protocols [11, 13 16] and provdes better results n terms of reduced overall network traffc, reduced number of packets forwarded by ntermedate nodes, and hgher successful data transmsson rates. However, EPR does not provde a mechansm for dealng wth delay-senstve packets (DSPs). In ths paper, delay-senstve packets are consdered by the proposed QoS-aware peerng routng protocol for delay-senstve data () and ther performance s nvestgated by comparng t to the exstng protocol [13]. In [13], categorzes the data packets nto four types: ordnary packets (OPs), crtcal packets (CPs), relablty-drven packets (RPs), and delay-drven packets (DPs). The [13] provdes better results for delaydrven packets than several prevously nvestgated methods [11, 14 16] n terms of end-to-end path delay. However, employs a hop-by-hop approach to determne the next hop. consders the neghbor devce wth the lowest delay, and the next hop then determnes the best next upstream hop wth least delay. The dsadvantage of ths hop-by-hop delay-drven approach employed n s that only neghborng nodes delay nformaton s consdered bysourcenode.thesourcenodeforwardsthepackettoa partcular neghbor node whch has lower node delay than therequreddelay.theneghbornodesendstheacknowledgement of the successfully receved packet to the source node. Now, the packet recevng neghbor node determnes ts best upstream node n terms of delay requrement and forwards the packet to the upstream node f the node delay of upstream node s less than the requred delay. In case the neghbor node does not fnd any upstream node wth node delay less than requred delay, then the packet s dropped. In ths case, the packet does not reach the destnaton, but the source node assumes that the packet has been successfully receved by the destnaton. Furthermore, the hop-by-hop approach used n causes an ncrease n overall network traffc, and the requred end-to-end latency may not be guaranteed. In ths paper, the proposed addresses these shortcomngs by selectng and choosng the next hop devce based on the lowest end-to-end path delay from the source node to the destnaton. 3. Problem Formulaton and Modelng The motvaton that BAN conssts of nodes connected wth each other va wreless lnks leads us to model t as a drected graph. Ths secton focuses on two ponts: () to maxmze throughput, and () to mnmze the end-to-end delay. These two problems are modeled va lnear programmng [17, 18] because requrements to these problems could easly be represented by lnear relatonshps Throughput Maxmzaton. We consder BAN as a drected graph G = (S, L), S = s, and L = l; S s the set of nodes and L s the set of drected graphs (lnks). If the network operatons are dvded nto rounds, each round r s the duraton from the network establshment tll the death

3 Moble Informaton Systems 3 ofallnodes;thenlnearprogrammngbasedmathematcal formulaton for throughput maxmzaton s as follows: where such that Max T (r), r R, (1) r T (r) = l (,Dst) T (,Dst) S, (2) l (,Dst) = { 1 f packet delvery s guaranteed { otherwse { (3) s selected to prevent routng latency for future demands, s addressed here. The lnear programmng problem s formulated as follows: where Mn DL path(,dst), S, (5) DL path(,dst) = { DL node() + DL path(j,dst) j = Dst { DL { node() j=dst, DL node() = DL trans() + DL queue+channel + DL proc, S (6) (7) B B max, (4a) such that E E, S, (4b) DL path(,dst) t out(,dst), S, (4c) f ( 1,) + d (,Dst) R tx, S, (4d) λ t f (,Dst), S. (4e) The objectve functon n (1) ams to maxmze throughput T durng each round r such that (2) assocates packet delvery from source to destnaton Dst wth lnk flag l.equaton(3) provdes detals about the status of l beng rased (l = 1) f packet delvery through that lnk s guaranteed else not (l = ). Constrant n (4a) provdes the upper bound for the allocated bandwdth B as B max. Smlarly, constrant n (4b) deals wth lmted energy constrant; that s, each node s equpped wth an energy source E such that E s upper bounded by E. Node ceases transmsson whenever ts battery s draned out, so, energy effcent utlzaton s very mportant (routng and MAC layer protocols play a crtcal role here). Constrant n (4c) comes nto consderaton f and only f (m/p) P QoS ; m path(s) out of total P satsfes the gven qualty of servce P QoS where DL path s the end-to-end delay and t out s the tmeout perod. Ths means that, as a frst prorty, QoS needs to be satsfed. Afterwards, f there s more than one QoS path, then as a second prorty end-to-end delay s checked. Transmsson range R tx constrant n (4d) demonstrates that packet delvery s successful f a source node transmts data to an n-range destnaton node where d (,Dst) s the dstance between source and destnaton. For data generaton rate λ, (4e) constrant entals flow conservaton such that the ncomng data flow f ( 1,) plus the data generated durng tme t should not exceed the outgong data flow f (,Dst). Volaton of (4c), (4d),and(4e) leads to packets beng dropped whch ultmately results n decreased throughput Delay Mnmzaton. The delay mnmzaton problem, whle routng dynamcally such that path for each request l path(,dst) = 1, S, (8a) R bt R max bt, (8b) t max t=1 λ arrval n n cap, (8c) < λ departure, S, (8d) node () s, S, (8e) N e bt Nproc bt. (8f) The objectve functon n (5) ams to mnmze the end-toend path delay DL path(,dst),where(6) depcts the two possble cases: communcaton va ntermedate node and wthout ntermedate node, and (7) defnes the node delay DL node() calculated at the network layer as the addton of packet delays due to transmsson DL trans(), queung DL queue, channel capturng DL channel,andprocessngdl proc. Constrant (8a) clearly says that the lnk through whch data s routed must be establshed where l path s the lnk flag. Constrant n (8b) provdes the upper bound of data rate R bt as R max bt such that R bt s nversely proportonal to DL trans accordng to (15) explaned n later Secton 4.4. Constrant n (8c) says that the number of transmtted packets n n 4 seconds (t max =4sec) should not exceed the packet handlng capacty n cap because, at neglgble load, there s constant small delay. However, queungdelaysoneachnodeareaddedassoonasthenetwork load ncreases and when n exceeds n cap delays ncrease wthoutbound.smlarly,constrantn (8d) deals wth queue stablty meanng that the packet arrval rate λ arrval should be always less than the packet departure rate λ departure.volaton of (8d) results n nonavalablty of buffer space leadng to queue nstablty whch n turn leads to congeston and thus causng ncreaseddelay. Constrantn (8e) states that the total number of nodes node() n the gven network s lmted such that has an nverse relaton wth DL channel.inother words, ncreasng the number of nodes means that there are more chances that one of the noncapturng nodes mght have

4 4 Moble Informaton Systems a lower backoff tme as compared to that of the capturng node, thereby ncreasng the dle tme due the backng off of noncapturng nodes. Constrant n (8f) deals wth DL proc.it s obvous that the total bt level errors N e bt should not exceed a certan threshold N proc bt ; otherwse ncreased erroneous bts wouldncreasedl proc and performance of the network would degrade n terms of processng delays at the nodes Graphcal Analyss. Consder the smplfed path B 3 -B 1 -NSC where B 3 candrectlysenddatatonscaswellas va B 1 (refer to Fgure 3 n Secton 4.4). Moreover, NSC can also send data to tself. For typcally assumed delay values, path delay s maxmum when B 1 s nvolved n forwardng the data of B 3 ntended for the destnaton NSC (.e., 5 ms), and path delay s mnmum when B 3 drectly communcates wth NSC (.e., ms). Let z = DL path(,dst), x = DL node(), and y = DL path(j,dst). The objectve functon n (5) can be reformulated as y (ms) L 1 :x+y=5 L 3 :y=3 P3(, 3) P4(, 3) L 4 :x= L L 5 :y= 2 :x= 1 P1(, ) P2(, ) x (ms) Fgure 1: Feasble regon. where Mn (z), (9) z=x+y (1) between B 3 and NSC. Smlarly, z=3 ms when B 1 drectly communcates wth NSC. On the other hand, end-to-end path delay s maxmum when B 3 communcates wth NSC va an ntermedate B 1 ; z=5 ms. such that x+y, x+y 5, x, y 3. (11a) (11b) (11c) The objectve functon n (9) ams to mnmze end-to-end delay regardng the selected path, whereas (1) llustrates nature of the objectve functon, that s, two-dmensonal lnear programmng problem. Constrants n (11a) and (11b) provde lower and upper bounds for the selected path, respectvely, whereas constrant n (11c) deals wth smlar bounds for x as well as y. For smplcty n calculaton, we replace the nequaltes n (11a), (11b), and(11c) wth equaltes, respectvely. In subject to the gven constrants, Fgure 1 shows the set of feasble solutons whch s obtaned by the ntersecton of lnes, L 1, L 2, L 3,andL 4,andsndcated by coloured regon such that each pont n the feasble regon satsfes each constrant. We can fnd the mnmum value of z by testng t at each of the vertces (refer to P1, P2, P3, and P4 nfgure1) as follows: at P1(, ): z=ms, at P2(, ): z= + = ms, at P3(, 3): z= + 3 = 3 ms, at P4(, 3): z= + 3 = 5 ms. The mnmum value of z s ms at x = and y =. However, ths value ndcates self transmsson or communcaton wthn NSC. The next mnmum value s z = ms showng the case of drect communcaton 4. QoS-Aware Peerng Routng Protocol for Delay-Senstve Data () Based on the mathematcal analyss n Secton 3, theproposed QoS-aware routng protocol used n an ndoor hosptal ZK-BAN peerng framework [7] s dscussed n ths secton. The proposed provdes a mechansm to (1) calculate the node delays and path delays of all possble paths from the source node to the destnaton,(2) determne the best path, and (3) choose the best next hop NH D based on the delay requrements of the packet. For each destnaton, the routng table contans nformaton about the next hop devce connected to the path wth the least end-to-end latency. For any DSP, f the path delay (DL path(,dst) )slessthanorequal tothedelayrequrement,thesourcenodesendsthedsp through that path. The archtecture of proposed, based on the mathematcal formulaton of the end-to-end path delay problem, s shown n Fgure 2. It conssts of seven modules: MAC recever, delay module (DM), packet classfer (PC), Hello protocol module (HPM), routng servces module (RSM), QoS-aware queung module (QQM), and MAC transmtter. The modules are dscussed below MAC Recever. The MAC recever receves the data or Hello packets from other nodes (BAN, MDC, or NSC). It checks the MAC address of the packet. It only forwards the broadcast packets or the packets whch have the same node s MAC address as destnaton address to the network layer Delay Module (DM). The delay module montors the tme requred to capture the channel (DL channel() ), MAC layer queung delay (DL MAC queue() ), and transmsson tme

5 Moble Informaton Systems 5 From upper layers Layer 3 Data packets QoS classfer Routng servces DSP Path selector OP Routng table constructor Energy-aware algorthm Delay algorthm Routng table Data packets Hello protocol Neghbor table Neghbor table constructor Delay calculaton Hello packet QoS-aware queung Packet classfer Hello packets OPDSP Hgher prorty Data or Hello packets MAC recever Delay module MAC transmtter Layer 2 Data or Hello packets Data or Hello packets From other nodes (.e. BAN, MDC, or NSC) Fgure 2: protocol archtecture. To other nodes (.e. BAN, MDC, or NSC) (DL trans() ) of a packet. The delay module sends ths nformaton to the network layer. The network layer uses ths nformaton to calculate the node delay (DL node() ) Packet Classfer (PC). The packet classfer (PC) receves all the packets from the MAC recever. The data packets and Hello packets are dfferentated by the PC. The PC forwards the data and Hello packets to the routng servces module and Hello protocol module, respectvely Hello Protocol Module (HPM). The neghbor table constructorandtheneghbortablearethetwosubmodulesof Hello protocol module. The nformaton receved from the delaymoduleofthemaclayerandthehellopacketssused bytheneghbortableconstructortoconstructtheneghbor table. Intally, Hello packets are broadcasted by each of type 1 (NSC) and type 2 (MDC) devces. The node receves the Hello packet. The neghbor table constructor of node calculates ts own DL path(,dst) based on the nformaton n the Hello packets. The Hello packet s updated and forwarded by node to the other nodes. The Hello packet felds of node j are shown as follows. Hello Packet Structure. Consder ID Dst L Dst ID j L j D (j,dst) E j T j DL path(j,dst) (12) The commonly used notatons n ths paper and ther descrptons are summarzed n notatons secton. The neghbor table contans felds for both hop-by-hop delay (DL node() ) and end-to-end path delay (DL path(,dst) ). The neghbor table constructor updates the neghbor table perodcally after recevng every new Hello packet. The neghbor table structure of node s shown as follows. The Neghbor Table Structure. Consder ID Dst L Dst ID j L j D (j,dst) D (,j) C j T j DL node() DL path(,dst) (13)

6 6 Moble Informaton Systems The node delay (DL node() ) can be found by addng the packet delays due to transmsson, queung, processng, and channel capturng: DL node() = DL trans() + DL queues+channel + DL proc. (14) The node updates ts Hello packets perodcally; 4 seconds are used n for smulaton purposes. The tme nterval 4 seconds s used because the delay module sends the delays of MAC queue and channel capture after every 4 seconds. The average transmsson delay (DL trans ) before sendng the Hello packets s calculated by usng DL trans = 1 n z=1 N bt(z), (15) R bt n where R bt s the data rate and as per BAN requrement 25kbpssusednthesmulatons.N bt s the total number of bts n each packet. n s the number of packets transmtted n 4 seconds. The delay due to the MAC and network layers queues andcapturngthechannelcanbecalculatedbyusngthe Exponentally Weghted Movng Average (EWMA) formula and s gven n DL queues+channel =(1 ρ) DL queues+channel +ρ (16) DL queues+channel, where queues are both network and MAC layers queues. Intal values of DL queues+channel are the delay of the frst packet sent by the node. ρ s the average weghtng factor that satsfes < ρ 1. The selecton of ρ value s heurstc and was chosen based on smulatons experence. The recommended values are.2 ρ.3. The best suted value of ρ found for smulatons s.2. The path delay between node and destnaton node Dst (DL path(,dst) )scalculatedbyusng DL path(,dst) = DL node() + DL path(j,dst), (17) where ntal value of DL path(j,dst) s zero when j=dst. An example of fndng the path delay from node (B 3 ) to Dst (NSC) s shown n Fgure 3. The delay calculaton of two paths B 3 -B 1 -MDC 2 -NSC (path 1) and B 3 -MDC 3 -B 2 -MDC 1 -NSC (path 2) s gven for llustratve purposes.thetypcalassumedvaluesarechosenforllustratedpurposes.thendvdualnodedelaysusednths example are gven below: DL node(nsc) = ms, (18a) DL node(mdc2 ) = 4 ms, DL node(b1 ) = 3 ms, DL node(b3 ) = ms, DL node(mdc1 ) = ms, DL node(b2 ) = 3 ms, DL node(mdc3 ) = 1 ms. (18b) (18c) (18d) (18e) (18f) (18g) The path delay of destnaton (DL path(dst,dst) )sapproxmately zero, because the tme requred to receve the packet from MAC to network layer s neglgble. So, n ths example ntal path delay s gven below: DL path(nsc,nsc) = ms. (19) Each node calculates the path delay from tself to the NSC. Frst, the calculatons of the path delay for path 1 (B 3 -B 1 -MDC 2 -NSC) are consdered. The path delay of MDC 2 (DL path(mdc2,nsc)) scalculated by usng (17): DL path(mdc2,nsc) = DL node(mdc2) + DL path(nsc,nsc). () Usng the values from (18a) and (19) n the above equaton, we get DL path(mdc2,nsc) = 4 + = 4 ms. (21) The path delay of BAN B 1 s calculated below: DL path(b1,nsc) = DL node(b1 ) + DL path(mdc2,nsc), (22) DL path(b1,nsc) = = 7 ms. The node B 3 determnes the path delay by usng the values from (18d) and (22): DL path(b3,nsc) = DL node(b3 ) + DL path(b1,nsc), (23) DL path(b3,nsc) = + 7 = 9 ms. In the same manner, the path delay of path 2 (B 3 -MDC 3 -B 2 -MDC 1 -NSC) can be calculated as follows: DL path(mdc1,nsc) = + = ms, DL path(b2,nsc) = 3 + = 5 ms, DL path(mdc3,nsc) = = 6 ms, DL path(b3,nsc) = + 6 = 8 ms. (24) Equatons (23) and (24) show that the path delays of path 1 and path 2 are 9 ms and 8 ms, respectvely. It s qute possble that the path wth less delay s longer (has more hops) than the other paths. As t s observed from the above example, path 2 ncludes fve devces and path 1 has four devces. However, the path delay of path 2 s lower than the path delay of path Routng Servces Module (RSM). The routng servces module s responsble for constructng the routng table, categorzng the data packets nto delay-senstve packets (DSPs) and ordnary packets (OPs). It also chooses the best path(s) for each category (DSPs or OPs) of traffc. QoS classfer, routng table constructor, path selector, and routng table are the submodules of routng servces module. The routng table structure for node s shown as follows. The Routng Table Structure for. Consder ID Dst L Dst NH E NH D DL path(,dst) (25)

7 Moble Informaton Systems 7 DL path(b3,nsc) = DL node(b3 ) + DL path(b1,nsc) =ms +7ms =9ms DL path(b3,nsc) = DL node(b3 ) + DL path(mdc3,nsc) =ms +6ms =8ms DL path(b3,nsc) = DL node(mdc3 ) + DL path(b2,nsc) =1ms +5ms =6ms B 3 DL path(b1,nsc) = DL node(b1 ) + DL path(mdc2,nsc) =3ms +4ms =7ms MDC 3 B 1 DL path(b2,nsc) = DL node(b2 ) + DL path(mdc1,nsc) =3ms +ms =5ms Path1 DL path(mdc2,nsc) = DL node(mdc2 ) + DL path(nsc,nsc) =4ms +ms =4ms B 2 Path2 DL path(mdc1,nsc) = DL node(mdc1 ) + DL path(nsc,nsc) =ms +ms =ms MDC 2 MDC 1 NSC DL path(nsc,nsc) = DL node(nsc) =ms Fgure 3: Example of fndng the path delay. The notatons and ther descrptons are lsted n notaton secton. Two next hop entres NH E and NH D are gven for each destnaton Dst n routng table. The routng table constructor contans the energy-aware and delay algorthms. The energy-aware algorthm dscussed n [7] s used to fnd next hop NH E for OPs. Resdual energy and geographc locaton of the neghbor nodes are consdered for choosng NH E. For DSPs, the new proposed algorthm fnds the best possble path to ensure the mnmum requred path delay. The routng table s constructed by usng the neghbor table entres. Neghbor table contans multple records for each destnaton. For example, Fgure3 shows that there are many paths from B 3 to NSC. Some of these paths are B 3 -B 1 -MDC 2 -NSC, B 3 -MDC 3 -B 2 -MDC 1 -NSC, and so forth. For each destnaton, the routng table constructor stores the next hop (NH D ) whch has the lowest latency. Algorthm 1 shows that node dentfes the next hop canddatesbysearchngtherecordswhchhavethesameid Dst ntheneghbortable.thepathdelayhasbeencalculatedby usng the neghbor table constructor and stored n neghbor table for each next hop canddate, usng (17).Thenodestores the neghbor nodes IDs n the varable NH (lne 2). If NH has onlyoneentry,thsmeanstheresonlyonepathavalable.the node stores ths entry to NH D (lne 4). Otherwse, the node sorts the NH entres n ascendng order of delay and then stores the frst entry whch has the lowest path delay n NH D (lnes 6-7). The next hop canddate NH D s then stored wth ts path delay value (DL path(,dst) )n the routng table. The data packets from both upper layers andpacketclassferarerecevedbyqosclassfer.theqos classfer classfes the packets nto DSP and OP data. For each data packet, the path selector (PS) checks the QoS requrement and chooses the most approprate next hop(s) by usng Algorthm 2. The path selector compares the delay requrement (DL req ) wth the path delay (DL path(,dst) )ofnh D whch s stored n the routng table. If the path delay (DL path(,dst) )slowerthan requred delay (DL req ), the packet s sent to NH D (lnes 3-4). Otherwse, the packet s dropped (lne 6). For ordnary packets, the PS returns the next hop NH E whch s dscussed by the EPR (lnes 8-9); else the packet s dropped QoS-Aware Queung Module (QQM). The routng servces module passes the data packets to the QoS-aware queung module (QQM) after choosng the approprate next hop(s). The QQM receves the data packets and separates these packets n two classes (DSP and OP). An ndvdual queue s used for each class of packets. QQM functons are thesameasdscussedn[13]. The prorty of the DSP queue s hgher than that of the OP queue. By default, the DSP queue wth hgher prorty sends the packets frst. The packets from lower prorty OP queue wll be sent only when the DSP queue s empty. However, for far treatment of OP data, a tmeout s used by all the queues. A queue sends the packets to the MAC layer wthn the perod specfed by the tmeout for that queue. QQM changes the control from hgher prorty queue to lower prorty queue after the queue tmeout occurs or when the hgher prorty queue s empty whchever s earler MAC Transmtter. The MAC transmtter receves the data and Hello packets from the network layer and stores t n

8 8 Moble Informaton Systems INPUT: Neghbor table, s neghbor table records NH (,Dst), Dst {MDC, NSC, BAN} (1) for each destnaton Dst {NSC, MDC, BAN} do (2) NH = {All neghbor nodesj NH (,Dst) } (3) f ( NH ==1) then (4) NH D NH (5) else f ( NH >1) then (6) Sort NH n ascendng order of DL path(,dst) (7) NH D =frstneghbornodej NH; (8) end f (9) end for Algorthm 1: Routng table constructon algorthm for delay-senstve packets. INPUT: Routng table, s routng table records NH (,Dst), Dst {MDC, NSC, BAN} (1) for each data packet do (2) f data packet s delay-senstve packet (DSP) (3) f (DL path(,dst) DL req ) then (4) send to NH D (5) else (6) Drop the packet mmedately (7) end f (8) else f data packet s Ordnary Packet (OP) (9) send to NH E (1) else (11) drop the packet mmedately (12) end f (13) end for Algorthm 2: Path selector algorthm for delay-senstve packets. the queue. The queue works n a Frst-In-Frst-Out (FIFO) fashon. It transmts the packets after capturng the channel by usng CSMA/CA algorthm. MDC 1 B 1 (2, 5) (5, 5) 5. Performance Evaluaton Smulatons are performed on OMNeT++ based smulator Castala 3.2 [19]. In ths secton, the proposed algorthm s compared wth the [13] and noroutng protocols. In noroutng, the delay-senstve data packets are forwarded to random next hop devces nstead of algorthm s next hop based on end-to-end path delay routes. The network parameters used n smulatons are shown n Table 1. Three scenaros are consdered for smulaton. All the nodes used n scenaro 1 are statc, whereas the source node B 4 s movng n scenaro 2. Scenaro 3 s used for the scalablty test of the protocol. The transmt power used n the smulatons s 25 dbm. The performance of the s measured by calculatng the throughput, number of packets forwarded by the ntermedate nodes, overall network traffc, packets tmeout due to not fulfllng the requred delay condton,andpacketsdroppedduetothebufferoverflow. The better results provded by are n accordance wth the equatons used n Secton 4.Thehgherthroughputsdue totheuseofobjectvefunctonn,asdescrbedn(1), and the least volatons of (4c), (4d), and(4e). The smulaton NSC and MDC 4 MDC 3 B 3 B (, 3) 4 (3, 3) (6, 3) (9, 3) MDC2 (2, 1) B 2 (5, 1) Fgure 4: Node deployment for scenaro 1. results show that the end-to-end path delay mechansm, as dscussed n Sectons 3.2 and 4.4, usednhelpsto reduce the packets forwarded by ntermedate nodes and the packetsdroppedduetothebufferoverflow,whchresults n hgher throughput and lower overall network traffc. To acheve a 97% confdence nterval for the llustratve results, the average of three runs s smulated n every experment whch may ntroduce a maxmum error of 3 1 3,basedon the error calculaton done by Castala 3.2 smulator []. The results obtaned for frst two scenaros are dscussed below Scenaro 1: Statc Nodes. Fgure 4 shows the deployment of the expermental network for scenaro 1. All the nodes are

9 Moble Informaton Systems Successful transmsson rate (%) Forwarded packets (k packets) noroutng noroutng (a) Throughput (b) Packets forwarded by ntermedate nodes 7 12 Traffc load (k packets) Number of packets tme outs (k) noroutng noroutng (c) Overall network traffc (d) Packets tmeout 8 3 Buffer overflow (k packets) Energy consumpton (J) noroutng noroutng (e) Packets dropped due to MAC buffer overflow (f) Overall energy consumpton Fgure 5: Performance comparson for dfferent parameters when source nodes are statc.

10 1 Moble Informaton Systems Deployment Task Area Deployment type Number of nodes Intal nodes locatons Intal node energy Buffer sze Lnk layer trans. rate Transmt power Applcaton type Max. packet sze Traffc type Table 1: Parameters nformaton. Scenaros 1 and 2: 9 m by 9 m Scenaro 3: 21 m 16 m Scenaro 1: all nodes are statc Scenaro 2: movable source node B 4 Scenaro 3: hosptal envronment Scenaros 1 and 2: 8 nodes (4 BANs, 3 MDCs, 1 NSC) Scenaro 3: 49 nodes (24 BANs, 24 MDCs, 1 NSC) Scenaros 1 and 2: NSC(,3), MDC 1 (2,5), MDC 2 (2,1), MDC 3 (3,3) B 1 (5,5), B 2 (5,1), B 3 (6,3), B 4 (9,3) Scenaro 3: shown n Fgure J (= 2 AA batteres) 32 packets 25 Kbps 25 dbm Event-drven 32 bytes CBR (Constant Bt Rate) MAC IEEE Default values Smulaton Tme 3 seconds (3 seconds are setup tme. Smulaton results are the average of three rotatons.) statc n ths scenaro. The type 1 devces (BANCs: B 1,B 2,B 3, and B 4 ) are consdered as source nodes, and type 2 devces (NSC and MDCs) are the destnaton nodes. B 1 sends packets to MDC 1,B 2 sends packets to MDC 2,B 3 sends packets to MDC 3,andB 4 sends packets to NSC. The data of B 4 has to go through the other devces to reach NSC. The source nodes send a total of k delay-senstve packets. The throughput, packets forwarded by ntermedate nodes, overall network traffc, number of packets tmeout, packets dropped due to MAC buffer overflow, and overall energy consumpton are calculated after every 1 packets untl 4 k and then every 4 packets sent by all BANCs. From Fgure 5(a), tsseenthatconsstentlyprovdes throughput of 94% or more. In comparson, noroutng provdes an average of 74% transmsson rate, whereas has a throughput rangng from 49% to 57%. For low offered data loads of 1 k, has a throughput of 57% that contnues to decrease especally for hgh offered data loads of k, when the throughput s 49%. The low throughput n may be explaned by the way t selects the next hop usng the energy-aware geographc forwardng scheme. Because the best next hop does not guarantee that t has the smallest latency connecton to the destnaton, the packet may tmeout when t s sent usng the best next hop. Moreover, the energy-aware geographc forwardng scheme used n prefers the nearest next hop canddate n terms of hop count and gnores next hop nodes havng a lower delay. As a result, the network traffc s ncreased and the packets are dropped due to tmeout before reachng the destnaton. resolves these ssues by usng the end-toend path delay. B 2 s the closest node to the destnaton nodes (.e., NSC or MDCs) as shown n Fgure 4. In[13], B 2 s responsble for forwardng the data packets from other nodes to NSC or MDCs. Ths results n more energy consumpton for B 2 and ncreased traffc congeston experenced by B 2. EPR resolves these problems by choosng the most approprate next hop. In the proposed scheme, the BAN coordnator does not send data to another BAN coordnator unless t s absolutely necessary. Fgure 5(b) shows the number of packets forwarded by the ntermedate nodes. It s seen from Fgure 5(b) that number of data packets forwarded by ntermedate nodes before reachng the destnatons n areonaverage.5tmesand3tmeslowerthanand noroutng, respectvely. The lower number of forwarded packets by ntermedate nodes helps to reduce the overall network traffc. Fgure 5(c) shows the total network traffc generated by,, and noroutng as a functon of the offered traffc load. From ths Fgure, t s seen that generates about an average of 26%and99%lesstraffcnthenetworkcomparedto and noroutng, respectvely. The path calculaton n consders the delay of all the nodes and uses the best path delay nformaton to select the next hop to send the data from source to destnaton. In contrast to the method used n whch decdes on the mmedate next hop based merely on next hop delay nstead of overall path delay, each upstream hop n sends the packet to ts next hop and resultant path n may not be the most optmal. From Fgure 5(d) t s observed that and noroutnghavenopacketsthatweretmedoutforalloffered

11 Moble Informaton Systems 11 NSC and MDC 4 (, 3) MDC 1 B 1 (2, 5) (5, 5) MDC 3 (3, 3) MDC 2 B 2 (2, 1) (5, 1) Fgure 6: Node deployment for scenaro 2. B 3 B 4 (6, 3) (9, 3) traffc loads (number of data packets sent by source node range from k to k). has better performance n terms of reduced overall network traffc and fewer numbers of dropped packets due to tmeout, because the clear endto-end path delay nformaton helps the packet to reach the destnaton wthn the requested delay requrement. Moreover, the path calculaton n consders the delay of all the nodes n the network and chooses only those paths whch can guarantee delverng the packet to the destnaton before t tmes out. Fgure 5(e) shows that there s no packet dropped due to themacbufferoverflownprotocol.thssduetono volaton of the model constrants as explaned n Sectons 4.1 and 4.2. The source node chooses the path whch provdes the maxmum throughput and mnmum end-to-end path delay as descrbed n [16, 18]. Only few packets are dropped n, whereas 7.5 k packets are dropped n noroutng. It s seen from Fgure 5(f) that the end-to-end path delay mechansm used n does not affect the overall energy consumpton when compared wth. and consume the same 18 Joules to 275 Joules of energy when 1 k to k packets are sent by source nodes. On the other hand, the energy consumpton of noroutng protocol s 2.6 Joules to 47.7 Joules when 1 k to k packets are sent by source nodes. The data packets n noroutng are randomly forwarded to three neghbor nodes wthout consderng the delay requrements. The addtonal computatons for delay n consume on average 6 tmes more energy than noroutng. However, t must be noted that noroutng results n on average a 99% hgher overall network traffc. Ths may be attrbuted to the 3 tmes more packets forwarded by ntermedate nodes n noroutng resultng n a % lower throughput as compared to. In summary, outperforms and noroutng whenthesourcenodesstatc Scenaro 2: Moble Source Node. Inthesecondscenaro, thesourcenodeb 4 s movng at the speed of 1 meter per second vertcally as shown n Fgure 6. It s assumed that the speed of a fast walkng patent s 1 meter per second. Once agan, t s observed that provdes better results than and noroutng n case of moble source node scenaro. Fgure 7(a) shows that the throughput s n excess of 8% n for offered data packet rates less than 8 k. The throughput reduces slghtly at hgher offered data packet rates of 8 k and more and reduces to 71% when total offered packets sent by the source are k. In contrast wth, t s observed that when the offered data packet load s ncreased, suffers from a much lower successful data transmsson rate that reduces from 5% to 32% wth resultant low throughput. Due to node moblty, the source node moves away from ts neghbor nodes resultng n a connecton loss whch results n more packets beng lost. handles ths stuaton much more gracefully than. In, the moble nodes resume the connecton more rapdly once the nodes come back nto the range of neghbor node. The overall lower throughput n ths scenaro sduetothepacketlostwhenthemoblenodesoutofrange. Equaton (4d) n Secton 3.1 also supports ths behavor. Accordng to (4d), the packet delvery s successful only f a source node transmts data to an n-range destnaton node. The packets are dropped when the movable nodes go out of range. The noroutng provdes the lower throughput wth an average of 64%. Fgure 7(b) shows that the number of packets forwarded by the ntermedate nodes n s on average.75 tmes and 9 tmes lower when compared to the number of packets forwarded by ntermedate nodes n and noroutng protocols, respectvely. The routng mechansm used n the protocol helps to send the data drectly to the destnaton wthout transferrng the packets to the ntermedate nodes n case the destnaton s n range. It can be seen n Secton 3.3 that use of ntermedate node results n larger delay and n Secton 3.2 that the backoff of other noncapturng nodes also contrbutes to exacerbatng the problem. The performance of noroutng for ths parameter sworstastforwardsupto26kpacketswhchncreasesthe overall network traffc. It s observed from Fgure 7(c) that the overall network traffc n s about 25% and 5% less than and noroutng protocols, respectvely, for all offered network data loads consdered. Ths s due to the end-to-end path calculaton mechansm used n. The delay of all the nodes s consdered and algorthm selects the best next hop, on the bass of end-to-end path delay nformaton, to send the data from source to destnaton. From Fgure 7(d),tsseenthathasnopacketsthat were tmed out for data packet transmssons at 8 k or less. The selecton of mnmum end-to-end path delay, gven n [18], helps to send the data through a path where lower packets tme out occurs. For hgh data packets (above 8 k), the source node moves out of the neghbors rado range whch causes more packets to tme out. On the other hand, has more tmed out packets than. Intally for low offered data packet rates below 4 k, about 4% of data packets were tmed out, and for hgher offered data packets (above 4k)the4%ofdatapackettmeoutsncreaseto5%(approxmately). Ths s because the packets travel through dfferent nodes by usng hop-by-hop delay calculaton as dscussed n detal n scenaro 1. Equaton(9) n Secton 4.2 shows that the delay on each node s the summaton of four dfferent delays (.e., transmsson (DL trans ), MAC and network queues

12 12 Moble Informaton Systems 1 3 Successful transmsson rate (%) Forwarded packets (k packets) noroutng noroutng (a) Throughput (b) Packets forwarded by ntermedate nodes Traffc load (k packets) Number of packets tme outs (k) noroutng noroutng (c) Overall network traffc (d) Packets tmeout 1 3 Buffer overflow (k packets) Energy consumpton (J) noroutng noroutng (e) Packets dropped due to MAC buffer overflow (f) Overall energy consumpton Fgure 7: Performance comparson for dfferent parameters when source node s moble.

13 Moble Informaton Systems 13 3 m BAN 19 (5, 15) MDC 19 (4, 14) BAN (8, 15) MDC (7, 14) BAN 21 (11, 15) MDC 21 (1, 14) BAN 22 (14, 15) MDC 22 (13, 14) BAN 23 (17, 15) MDC 23 (16, 14) BAN 24 (, 15) MDC 24 (19, 14) 3 m 3 m 2 m BAN 18 (3, 12) MDC 18 (4, 11) 2 m 2 m MDC 13 MDC 14 MDC 15 MDC 16 MDC 17 (7, 11) BAN (1, 11) BAN (13, 11) BAN 15 (16, 11) BAN 16 (19, 11) BAN 17 (8, 1) (11, 1) (14, 1) (17, 1) (, 1) 3 m 16 m 3 m NSC (4, 7) MDC 8 BAN 8 MDC 9 (7, 8) (8, 7) (1, 8) BAN 9 (11, 7) MDC 1 (13, 8) BAN 1 (14, 7) MDC 11 (16, 8) BAN 11 (17, 7) MDC 12 (19, 8) BAN 12 (, 7) 3 m 2 m 2 m MDC 1 MDC 2 MDC 3 MDC 4 MDC 5 MDC 6 MDC 7 BAN 1 (3, 3) (4, 3) BAN 2 (7, 3) BAN 3 (1, 3) BAN 4 (13, 3) BAN 5 (16, 3) BAN 6 (19, 3) BAN 7 (2, ) (5, ) (8, ) (11, ) (14, ) (17, ) (, ) 3 m 21 m 3 m Fgure 8: Scenaro 3. Node deployment for 24 patent beds n hosptal envronment. (DL queue ), channel (DL channel ), and processng (DL proc ). The calculatonsdonebyoneachnodencreasethe processng delay whch causes the ncrease of overall node delay. The hgher node delay results n packet tme out. The source node moblty makes the packet tme out worse than scenaro 1 of Fgure 5(d). Fgure 7(e) shows that there are no packet drops due to MAC buffer overflow n and protocols, whereas 9 k packets are dropped n noroutng. The performance of s smlar to n terms of MAC buffer overflow; however, has on average 39% lower throughput and an average of 25% hgher overall network traffc. From Fgure 7(f), t s observed that the overall energy consumptons of and are 18.9 Joules to Joules when 1 k to k packets are sent by source nodes. The noroutng consumes 2.6 Joules to 47 Joules when 1 k to k packets are sent by source nodes. The computatons for delay n are almost smlar to the but provdes on average 25% lower overall network traffc, 73% fewer packets forwarded by ntermedate nodes, and, more mportantly, a 4% hgher successful data transmsson rate (throughput) as compared to. In summary, the overall performance of s better than and noroutng when the source node s moble. 6. Scalablty Test: Real Hosptal Envronment wth 24 Beds (49 Nodes) A real 24-patent-bed hosptal s consdered for the scalablty test of routng protocol, as shown n Fgure 8. The approxmate area covered s 16 m by 21 m whch s smlar to the Hematology-Oncology Unt of the Chldren Hosptal named IWK Health Centre Halfax, Canada. The dstance between two beds s 3 meters whch s n accordance wth the recommended transmsson range for BAN communcaton n hosptal envronment. The total nodes used n the deployment area are 49 (24 BANs, 24 MDCs, and 1 NSC). Each BAN transmts the data to ts peer MDC. All the BANs and MDCs are sendng or recevng Hello protocols to/from other nodes and the NSC. Both MDCs and BANs are movable. Generally, BANs can move freely anywhere and the movement of a MDC s only wthn the room where t s placed. It s assumed that the MDC of one room has a connecton wth the MDC of the next room.

14 14 Moble Informaton Systems 1 18 Successful transmsson rate (%) Network traffc (k packets) 57.5 Packets sent by source nodes (k) noroutng Packets sent by source nodes (k) noroutng (a) Throughput versus offered load (b) Overall network traffc 25 3 Buffer overflow (packets (k)) Packets tme out (k) Packets sent by source nodes (k) noroutng Packets sent by source nodes (k) noroutng (c) Packets dropped due to MAC buffer overflow (d) Packets tmeout Fgure 9: Performance comparson for dfferent parameters of scenaro 3. The smulaton results show that performs better than and noroutng even when the number of nodes s ncreased to 49. From Fgure 9(a) t s seen that the throughput provded by s n excess of 91%, whereas the throughput of noroutng and protocols s on average 74% and 52%, respectvely. From Fgure 9(b), t s observed that the overall network traffc of s 5% and 25% less than noroutng and protocols, respectvely. Fgure 9(c) shows that the packet drops due to MAC buffer overflownandprotocolsareneglgble, whereas 9k packets are dropped n noroutng. Fgure 9(d) shows that there are no packets tmeouts due to not fulfllng the delay requrements n and noroutng. On the otherhand25kpacketsaretmedoutn.fromthese results t s shown that s equally effectve when the deployment area s larger, and number of nodes has been ncreased to smulate a real hosptal scenaro wth 24 patent beds. 7. Concluson ThepapermodelsthewrelessBANasadrectedgraphand derves condtons for throughput maxmzaton and endto-end delay mnmzaton. It s shown that effcent energy utlzaton s crtcal to the proper desgn of the routng and MAC layer protocols. Smlarly, delay s mnmzed by formulatng the BAN end-to-end path delay as a lnear programmng problem wth multple constrants to be satsfed smultaneously. Basedonthemathematcalanalyss,anovelmodular QoS-aware routng protocol for hosptal BAN communcaton s proposed n ths paper. The archtecture of the new protocol conssts of seven modules: the MAC recever, the delay module (DM), the packet classfer (PC), the Hello protocol module (HPM), the routng servces module (RSM), the QoS-aware queung module (QQM), and the MAC transmtter. The proposed routng protocol provdes

15 Moble Informaton Systems 15 a mechansm for the end-to-end path delay calculaton of all possble paths from a source to destnaton and then decdes the best possble path by consderng the path delay requrements of the delay-senstve packets. OMNeT++ based smulator Castala 3.2 s used to test the performance of the proposed protocol () and compare t wth and noroutng. The smulatons are performed for both the movable source and statonary scenaros. A scalablty test s done wth larger deployment area and by usng hgher number of nodes. The results show that the offers over 94% successful data transmsson rates for delay-senstve packets n a statonary patent scenaro. provdes about 35% better results n terms of successful transmsson rate than n the movable patent scenaro. The smulaton results show that the mproves the relablty of Body Area Networks by 4% on average for each scenaro by decreasng the number of packet tme outs wth zero and averagng 729 packets for the statc and moble patent scenaros, respectvely. In addton, results n an average of 25% lower overall network traffc for each moble and statc patent scenaros as compared to smlar protocols. The scalablty test results prove that outperforms and noroutng even when a hgher number of nodes are employed n the BAN. provdes on average 93% throughput wthout any packet beng tmed out and any packet beng dropped due to MAC buffer overflow. Notatons for the Proposed Algorthm Node : Sourcenode Node j: Neghbornodeofsourcenode Node Dst: Destnaton node (.e., NSC, MDC, BAN) ID Dst : Destnaton ID L Dst : Destnaton locaton ID j : Neghbornodej ID L j : Neghbornodej locaton D (j,dst) : Dstance between neghbor node j and destnaton Dst E j : Resdualenergyofnodej T j : Devcetypeofnodej D (,j) : Dstance between node to neghbor node j NH (,Dst) : Next hop between node and destnaton Dst NH E : Energy-aware next hop NH D : Next hop for delay-senstve packets DL path(,dst) :Pathdelayfromnodetodestnaton Dst DL node() : Tme delay wthn the node DL req : Requred path delay for delay-senstve packets. Conflct of Interests The authors declare that there s no conflct of nterests regardng the publcaton of ths paper. References [1] B.Zhen,M.Patel,S.Lee,E.T.Won,andA.Astrn, tg6-techncal-requrements, IEEE Project: IEEE P82.15 Workng Group for Wreless Personal Area Networks (WPANs), 11, tg6-closng-report-march-11.ppt. [2] IEEE, IEEE WPAN task group 6 (TG6) body area networks, IEEE 82.15, 7, [3]D.Curts,E.Shh,J.Watermanetal., Physologcalsgnal montorng n the watng areas of an emergency room, n Proceedngs of the ICST 3rd Internatonal Conference on Body Area Networks (BodyNets 8), Tempe, Arz, USA, 8. [4] S. Jang, Y. Cao, S. Iyengar et al., CareNet: an ntegrated wreless sensor networkng envronment for remote healthcare, n Proceedngs of the 3rd Internatonal ICST Conference on Body Area Networks (BodyNets 8), Tempe, Arz, USA, March 8. [5] T. Gao, T. Massey, L. Selavo et al., The advanced health and dsaster ad network: a lght-weght wreless medcal system for trage, IEEE Transactons on Bomedcal Crcuts and Systems, vol. 1, no. 3, pp , 7. [6] A. Wood, G. Vrone, T. Doan et al., ALARM-NET: wreless sensor networks for asssted-lvng and resdental montorng, Tech. Rep. CS-6-11, Department of Computer Scence, Unversty of Vrgna, Charlottesvlle, Va, USA, 6. [7] Z.Khan,S.Svakumar,W.Phllps,andN.Aslam, Anewpatent montorng framework and Energy-aware Peerng Routng Protocol (EPR) for Body Area Network communcaton, Journal of Ambent Intellgence and Humanzed Computng,vol.5,no.3, pp ,14. [8] Z. Khan, S. Svakumar, W. Phllps, and B. Robertson, A QoSaware routng protocol for relablty senstve data n hosptal bodyareanetworks, Proceda Computer Scence,vol.19,pp , 13. [9] Z. Khan, S. Svakumar, W. Phllps, and B. Robertson, QPRR: QoS-aware peerng routng protocol for relablty senstve data n body area network communcaton, The Computer Journal, 14. [1] Z.Khan,S.Svakumar,W.Phllps,andB.Robertson, : QoS-aware peerng routng protocol for delay senstve data n hosptal body area network communcaton, n Proceedngs of the 7th Internatonal Conference on Broadband, Wreless Computng, Communcaton and Applcatons (IEEE BWCCA 12), pp , Unversty of Vctora, Vctora, Canada, November 12. [11] X. Huang and Y. Fang, Multconstraned QoS multpath routng n wreless sensor networks, Wreless Networks, vol. 14, no. 4, pp , 8. [12] S. Agarwal, Dvya, and G. N. Pandey, SVM based context awareness usng body area sensor network for pervasve healthcare montorng, n Proceedngs of the 1st Internatonal Conference on Intellgent Interactve Technologes and Multmeda (IITM 1), pp , Allahabad, Inda, December 1. [13] A. Razzaque, C. S. Hong, and S. Lee, Data-centrc multobjectve QoS-aware routng protocol for body sensor networks, Sensors, vol. 11, no. 1, pp , 11. [14] E. Felemban, C.-G. Lee, and E. Ekc, MMSPEED: multpath mult-speed protocol for QoS guarantee of relablty and tmelness n wreless sensor networks, IEEE Transactons on Moble Computng,vol.5,no.6,pp ,6. [15]M.Chen,T.Kwon,S.Mao,Y.Yuan,andV.C.M.Leung, Relable and energy-effcent routng protocol n dense wreless

16 16 Moble Informaton Systems sensor networks, Internatonal Journal of Sensor Networks, vol. 4,no.1-2,pp ,8. [16] M. Razzaque, M. Alam, M. Rashd, and C. Hong, Multconstraned QoS geographc routng for heterogeneous traffc n sensor networks, n Proceedngs of the 5th IEEE Consumer Communcatons and Networkng Conference (CCNC 8), Kyung HeeUnversty,LasVegas,Nev,USA,January8. [17] J. Elas and A. Mehaoua, Energy-aware topology desgn for wreless body area networks, n Proceedngs of the IEEE Internatonal Conference on Communcatons (ICC 12), pp , Ottawa, Canada, June 12. [18] N. Ababneh, N. Tmmons, J. Morrson, and D. Tracey, Energybalanced rate assgnment and routng protocol for body area networks, n Proceedngs of the 26th IEEE Internatonal Conference on Advanced Informaton Networkng and Applcatons Workshops (WAINA 12), pp , Fukuoka, Japan, March 12. [19] NICTA, Castala, Natonal ICT Australa, 11, [] A. Bouls, Castala, wreless sensor network smulator, NICTA, 11, Castala+-+User+Manual.pdf.

17 Journal of Advances n Industral Engneerng Multmeda The Scentfc World Journal Volume 14 Volume 14 Appled Computatonal Intellgence and Soft Computng Internatonal Journal of Dstrbuted Sensor Networks Volume 14 Volume 14 Volume 14 Advances n Fuzzy Systems Modellng & Smulaton n Engneerng Volume 14 Volume 14 Submt your manuscrpts at Journal of Computer Networks and Communcatons Advances n Artfcal Intellgence Volume 14 Internatonal Journal of Bomedcal Imagng Volume 14 Advances n Artfcal Neural Systems Internatonal Journal of Computer Engneerng Computer Games Technology Advances n Volume 14 Advances n Software Engneerng Volume 14 Volume 14 Volume 14 Volume 14 Internatonal Journal of Reconfgurable Computng Robotcs Computatonal Intellgence and Neuroscence Advances n Human-Computer Interacton Journal of Volume 14 Volume 14 Journal of Electrcal and Computer Engneerng Volume 14 Volume 14 Volume 14

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

QoS Aware Inter-Cluster Routing Protocol for IEEE Networks

QoS Aware Inter-Cluster Routing Protocol for IEEE Networks 215 17th UKSIM-AMSS Internatonal Conference on Modellng and Smulaton QoS Aware Inter-Cluster outng Protocol for IEEE 82.15.4 Networks Ahmed Ben Saleh Dept. Computer Scence &IT Unversty of Bsha Bsha K.

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility

Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility Optmzng Energy-Latency Trade-off n Sensor Networks wth Controlled Moblty Ryo Sughara Rajesh K. Gupta Computer Scence and Engneerng Department Unversty of Calforna, San Dego La Jolla, Calforna 9293 Emal:

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks 414 The Internatonal Arab Journal of Informaton Technology, Vol. 8, No. 4, October 011 Dstrbuted Grd based Robust Clusterng Protocol for Moble Sensor Networks Shahzad Al and Sajjad Madan Department of

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Energy and QoS aware Routing in Wireless Sensor Networks

Energy and QoS aware Routing in Wireless Sensor Networks Energy and QoS aware Routng n Wreless Sensor Networks Kemal Akkaya and Mohamed Youns Department of Computer Scence and Electrcal Engneerng Unversty of Maryland, Baltmore County Baltmore, MD 225 kemal youns@cs.umbc.edu

More information

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network Appled Mathematcal Scences, Vol. 9, 015, no. 14, 653-663 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.1988/ams.015.411911 Obstacle-Aware Routng Problem n a Rectangular Mesh Network Norazah Adzhar Department

More information

A Reliable and Real-Time AggregationAaware Data Dissemination in a Chain- Based Wireless Sensor Network

A Reliable and Real-Time AggregationAaware Data Dissemination in a Chain- Based Wireless Sensor Network SENSORCOMM 2012 : The Sxth Internatonal Conference on Sensor Technologes and Applcatons A Relable and Real-Tme AggregatonAaware Data Dssemnaton n a Chan- Based Wreless Sensor Network Zahra Taghkhak, Nrvana

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Transmit Power Control Algorithms in IEEE h Based Networks

Transmit Power Control Algorithms in IEEE h Based Networks Transmt Power Control Algorthms n IEEE 82.h Based Networks Andreas J. Könsgen, Zakr Hossan, Carmelta Görg Department of Communcaton Networks Center for Informaton and Communcaton Technology (IKOM) Unversty

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Classification Method in Integrated Information Network Using Vector Image Comparison

Classification Method in Integrated Information Network Using Vector Image Comparison Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com Classfcaton Method n Integrated Informaton Network Usng Vector Image Comparson Zhou Yuan Guangdong Polytechnc Normal Unversty

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks

FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks Int l J. of Communcatons, etwork and System Scences, 2011, 4, 403-415 do:10.4236/jcns.2011.46048 Publshed Onlne June 2011 (http://www.scrp.org/journal/jcns) FEAR: Fuzzy-Based Energy Aware Routng Protocol

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks

Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks Smulator for Energy Effcent Clusterng n Moble Ad Hoc Networks Amt Kumar 1 Dhrendra Srvastav 2 and Suchsmta Chnara 3 Department of Computer Scence and Engneerng, Natonal Insttute of Technology, Rourkela,

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information