CHAPTER 2 RELATED WORK

Size: px
Start display at page:

Download "CHAPTER 2 RELATED WORK"

Transcription

1 17 CHAPTER 2 RELATED WORK With the fast advances in inexpensive sensor technology and wireless communications, the design and development of large-scale WSN has become cost-effective and viable enough to attract the attention of several applications, such as health/environmental monitoring and battlefields surveillance. The main function of a wireless sensor network is to monitor a field and report data to the BS for further analysis and processing. However, the sensors suffer from several scarce resources, such as battery power, storage, CPU, and bandwidth, with energy being the most critical resource (Akyildiz et al 2002). Therefore, protocols designed for WSN, and particularly those for field coverage and data forwarding, should be as energyefficient as possible to enhance the lifetime of network. In addition to energy efficiency, coverage and connectivity are other two critical issues that need to be addressed in WSN. Hence, a major challenge of power management in WSNs is to achieve satisfactory QoS required by applications while minimizing the total energy consumption of the network so that the lifetime of network can be enhanced. Therefore, WSNs must satisfy both Sensing Coverage QoS and Network Connectivity QoS required by the applications simultaneously. The first section of this chapter presents different approaches to the energy conservation of WSNs. Survey on topology control protocols is given in the second section. Third section reviews different power aware routing protocols. Next section describes, related work in coverage, connectivity, and

2 18 sleep scheduling approaches for WSNs. Finally a survey on several clustering protocols is presented followed by the summary of this chapter. 2.1 ENERGY CONSERVATION SCHEMES: Energy Conservation Schemes Duty Cycling Power Aware Routing Clustering Protocols Topology Control Power Management Location Driven (Coverage Topology) Connectivity Driven (Connectivity Topology) Coverage Preserving Schemes Connectivity Maintenance Protocols Scheduling Algorithms Centralized Decentralized Figure 2.1 Categories of Energy Conservation Schemes Figure 2.1 shows the general categories of energy conservation schemes. The following gives an overview of each category: To reduce power consumption in WSN, the most effective way is by placing the radio transceiver in the low-power sleep mode whenever communication is not required. Ideally, the radio should be switched off as soon as there is no more data to send/receive, and should be resumed as soon as a new data becomes ready. This way nodes alternate between active and sleep periods depending on network activity. This behavior is usually referred

3 19 to as duty cycling, and duty cycle is defined as the fraction of time nodes are active during their lifetime (Anastasi et al 2009 and Wang et al 2006). Duty cycling can be achieved through two different methods. In the first method, it is possible to identify node redundancy and adaptively select only a minimum subset of nodes to remain active for maintaining connectivity. Nodes that are not temporarily needed for ensuring connectivity can go to sleep and save energy. Finding the optimal subset of nodes that guarantee connectivity is referred to as topology control. Therefore, the idea behind topology control is to reduce the spatial density of active nodes while maintaining desirable network connectivity and in turn increase the network lifetime. In the second method, active nodes that are selected by the topology control protocol need not maintain their radio continuously on. They can switch off the radio i.e., put it in the low-power sleep mode when there is no network activity, thus alternating between sleep and active states to reduce the idle listening time. Duty cycling operated on active nodes are referred to as power management. Therefore, topology control and power management are complementary techniques that implement duty cycling with different granularity. There are two issues that a topology control protocol must address: Density of sensor nodes in active mode Duration of activation of nodes Various factors can be used to decide which nodes are need to be activated/deactivated, and when. From this point of view, topology control protocols can be classified into two categories: Location driven: The decision about which node to turn on, and when, is based on the location of sensor nodes which is assumed to be known as Geographical Adaptive Fidelity (Xu et al 2001). Connectivity driven: Sensor nodes are dynamically

4 20 activated/deactivated in such way to ensure network connectivity (Cerpa et al 2002 and Chen et al 2002) or complete sensing coverage are fulfilled ( Koushanfar et al 2006). Topology control protocols can extend the network lifetime by a factor of 2-3 depending on the network redundancy with respect to a network with nodes always on ( Ganesan et al 2004 and Mainwaring et al 2002). However, many sensor network applications require a much longer network lifetime. To further increase network lifetime, topology control protocols must be combined with power management which introduces duty cycling even in active nodes (Yang et al 2004). An effective method for energy conservation in WSN is sleep/wakeup scheduling. For the sensor network to operate successfully, the active nodes must maintain both coverage and connectivity. This scheduling algorithm can be classified as centralized or decentralized localized and distributed. Centralized algorithms require global information of the whole sensor network. The centralized algorithms always provide nearly optimal solution since the algorithm has global view of the whole network. They have low-adaptability to the change of the network and are not suitable for largescalable network. Decentralized (localized and distributed) algorithms require only the local information to function and are run at large number of sensor nodes. Each sensor then makes its own decision of turning on or off. Thus, it is very adaptable to the dynamic and scalable nature of sensor networks. Power-aware routing aims at minimizing the per packet transmission power in multi-hop routing and enhance the system lifetime. As an active branch of energy conservation scheme in WSN, Clustering protocols mainly focus on energy consumption and network lifetime.

5 TOPOLOGY CONTROL ALGORITHMS The purpose of Topology Control protocols is to preserve network connectivity through reduced transmission power (Ababneh et al 2006). Most of the existing algorithms aim at maintaining network connectivity. In the literature Rodoplu et al (1999), a node chooses to relay through other nodes only when less power is used. Ramanathan et al (2000) proposed two centralized algorithms to minimize the maximal power used per node while maintaining the connectivity of the network. Two algorithms are proposed by Narayanaswamy et al (2002 ) and Kawadia et al (2003) to maintain network connectivity using the minimal transmission power. Li et al (2003) proposed LMST (Local Minimum Spanning Tree) a MST-based topology control scheme which preserves the network connectivity and has bounded node degree in a location based protocols. Li et al (2004) proposed a localized algorithm that builds a K-vertex connected topology based on the extended Kruskal s MST algorithm. Li et al (2003b) proposed a localized algorithm that preserves K-connectivity by having each node choose K closest neighbors in each of the p 6 cones. Hajiaghayi et al (2003) proposed three approximate algorithms (two centralized and one distributed) that build the K- connected topology. Santi (2005) proposed Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption and radio interference and extends the network operational time. The goal of this technique is to control the topology of the graph representing the communication links between network nodes with the purpose of maintaining some global graph property (e.g., connectivity), while reducing energy consumption and/or interference that are strictly related to the nodes' transmitting range. GAF is a location driven protocol that reduces energy consumption while keeping a constant level of routing fidelity. GAF is based on node

6 22 location information that can be provided by a Global Positioning System (GPS). GAF is independent from the routing protocol. It can be used with any existing routing protocol. It is able to conserve energy by identifying node redundancy, thus allowing the network lifetime to increase in proportion to node density (Xu et al 2001). All nodes within a cell are interchangeable from a routing perspective. This may result in an underutilization of radio coverage areas as nodes are forced to cover less than half the distance allowed by the radio range. In addition, GAF requires knowing the exact location of each node in the network, which might be expensive to achieve. This drawback is overcome by connectivity-driven protocols. Chen et al (2002) describes SPAN as a connectivity-driven protocol that adaptively elects coordinators of all nodes in the network. Coordinators stay awake continuously and perform multihop routing, while the other nodes stay in sleeping mode and periodically check if there is a need to wake up and become a coordinator. The protocol achieves the following four goals. First, it ensures that there is always sufficient number of coordinators so that every node is in the transmission range of at least one coordinator. Second, to spread energy consumption as uniformly as possible among network nodes, SPAN rotates the coordinators. Third, it tries to minimize the number of coordinators so that the network lifetime can be increased while avoiding performance degradation in terms of network capacity and message latency. Fourth, it elects coordinators in a decentralized way by using only local information. The SPAN election algorithm requires knowing neighbor and connectivity information to decide whether a node should become a coordinator or not. Such information is provided by the routing protocol. Therefore, SPAN depends on the routing protocol and requires modification in the routing lookup process. Hence, SPAN does not guarantee a connected topology. However, SPAN ensures energy efficiency and also improves communication latency.

7 23 Adaptive Self-Configuring sensor Network Topologies (ASCENT) is another connectivity-driven protocol that does not depend on the routing protocol and does not require modifying the routing state (Cerpa and Estrin 2004). In ASCENT a node decides whether to join the network or continues to sleep, based on the information about connectivity and packet loss that are determined locally by the node itself. The basic idea of ASCENT is that initially only some nodes are active, while all other nodes are passive, i.e., they listen to packets but do not transmit. In addition, it limits the packets loss due to collisions because the nodes density is regulated by the Neighbor Threshold value. The protocol has good scalability properties. However, energy saving does not increase proportionally with the node density because it depends on passive-sleep cycle and not on the number of active nodes. The Cone-Based Topology Control algorithm (CBTC) was proposed by Wattenhofer et al (2001) to ensure the network connectivity. An analysis of CBTC algorithm was presented in the literature Li et al (2001) and proves that 5 /6 is a tight upper bound on the cone degree for the algorithm to preserve connectivity. Also, the authors have presented three optimizations to the basic algorithm: the shrink-back operation, asymmetric edge removal, and pair wise edge removal, and proved that these improved performance while still preserving connectivity. The drawback of CBTC is that nodes should be equipped with multiple directional antennae, and this requires high cost for sensor nodes. Sparse Topology and Energy Management (STEM) trades off energy consumption in the monitoring state versus latency of switching back to the transfer state; the result is a significant increase of network lifetime (Schurgers et al 2002). STEM can be easily integrated into other topology control techniques such as GAF and SPAN for further energy savings. Compared to a network without topology control, a combination of GAF and

8 24 STEM can conserve more energy. However, these benefits come at the cost of increased setup latency, which depends on the number of hops in the multihop path, and the specific applications in use, which controls how much latency is allowed, and consequently how much energy consumption can be reduced. Another disadvantage is when STEM and GAF combined together; the routing protocol needs to address virtual nodes instead of real nodes (Ababneh 2010). XTC is an ad-hoc topology control algorithm presented by Wattenhofer and Zollinger (2004), which consists of three phases: Phase 1: Neighbor ordering: Phase 2: Neighbor order exchange: Phase 3: Edge selection: The XTC is a simple, local and fully distributed algorithm, since the algorithm is executed on each node in the network. Every node communicates with its neighbors not more than twice. XTC does not require node location and neighbor s position information. Also, XTC does not consider node failure and mobility, and fail to have reasonable spanner properties. But algorithm guarantees global connectedness using directional information. Minimum Energy Network Connectivity (MENC) problem was proposed by Cheng et al (2004), which is an NP-complete problem in ad hoc wireless networks. The problem consists of minimizing the transmission power of each sensor node in a wireless network, which results in minimizing the energy consumption of the network, while keeping its global connectivity at the same time. Two polynomial time approximation heuristics were provided to compute the power assignment of wireless nodes in both static and low mobility ad hoc wireless networks. Melodia et al (2005) determine optimal local topology knowledge for energy efficient geographic routing in ad hoc and sensor networks. They provide different localized forwarding scheme to demonstrate that only a limited local knowledge is needed to take energy efficient decisions.

9 25 An effective method for energy conservation is sleep scheduling. Ababneh and Selvakennedy (2007) and Ababneh (2010) proposed a topology control algorithm, called OTC (Optimized Topology Control Algorithm), for sensor networks. It uses two-hop neighborhood information to select a subset of nodes to be active among all nodes in the neighborhood. Each node in the network selects its own set of active neighbors from among its one-hop neighbors. This set is determined in such a way that it covers all two-hop neighbors. OTC achieves significant energy savings against (GAF, SPAN) others, while ensuring a load-balanced network which prolongs network life time. But, there is no proof that XTC has spanner properties on general weighted graph. Ma et al (2007) construct network with small number of coordinators while still maintain the topology connectivity. They assume that all wireless links in a sensor network are bidirectional since MAC has an ACK mechanism for every frame. They consider their problem as minimal connected dominated set problem. Three topology algorithms have been proposed with different time complexity and power saving. Two heuristics are presented by Li et al (2008) for the minimum power topology control problem on general model, i.e., given a set of sensors in the Euclidean plane and a transmission power threshold for each directed pair of sensors; it finds a power assignment for each sensor to achieve a strong connectivity with minimum total transmission power. A distributed topology control algorithm, called ECTC (Energy efficient Topology Control Algorithm for Wireless Sensor Network) was presented by Ababneh et al (2009), which uses a clustering approach. It is built on the notion that when a region of a shared channel wireless sensor network has a sufficient density of nodes, significant energy saving is obtained by allowing redundant nodes to sleep. Using the two-hop

10 26 neighborhood information, certain nodes sequentially select a subset of nodes to be active among all nodes in the neighborhood, to ensure connectivity. Moreover, to ensure fairness, the role of active nodes is rotated periodically to ensure energy-balanced operations (Ababneh et al 2009). ECTC topology control algorithm that does not require location information a priori with the goal of minimizing the total energy spent in the network to communicate the information gathered by these sensor nodes to the BS. It was also found that there is a decreasing improvement on network lifetime, when more nodes are deployed within the same region (Ababneh 2010). A Link Quality Assured Topology Control (LQATC) algorithm for sensor network was investigated by He et al (2010), which is based on the received signal strength indicator. LQATC can guarantee the network connectivity, link symmetry, and reasonable degree of nodes. Furthermore, it improves network performance in terms of energy efficiency and average interference degree. An Energy Efficient Topology Maintenance Scheme (EETMS) was proposed by Yin et al (2011) to maintain the network connectivity and communication performance while reducing the maintenance overhead when nodes fail. In EETMS, the appropriate maintenance strategy is chosen according to different recovery modes. It was shown that EETMS can repair the network with small overhead. Most of the above works aim at maintaining connectivity of a network through reduced transmission power with the purpose of enhancing lifetime. However, network connectivity is not sufficient to provide a satisfactory communication performance when the links among nodes are lossy. Further, topology control only minimizes the transmission power of the network which does not consider idle power. Topology control protocols are

11 27 based on a communication network graph; they do not address the issue of sensing redundancy. 2.3 POWER-AWARE ROUTING Power-aware routing aims at minimizing the per packet transmission power in multi-hop routing. Singh et al (1998) proposed five power-aware routing metrics to reduce energy consumption and enhance the system lifetime. The implementation of a minimum energy routing protocol based on Dynamic Source Routing (DSR) was discussed by Doshi et al (2002) and Doshi and Brown (2002). An online power-aware routing scheme was proposed by Li et al (2001a) to optimize system lifetime of WSNs. Chang and Tassiulas (2000) studied the problem of maximizing the lifetime of a network with known data rates. Chang et al (2000) formulated the problem of choosing routes and transmission power of each node to maximize the system lifetime as a linear programming problem and discussed two centralized algorithms. Sankar et al (2004) formulated maximum lifetime routing as a maximum concurrent flow problem and proposed a distributed algorithm. Dong et al (2005) studied the problem of minimum transmission energy routing in the presence of unreliable communication links. Two basic protocols: Minimum Transmission (MT) routing and Minimum Transmission Power (MTP) routing were presented by Woo et al (2003). MT was shown to be more reliable than the hop-count based routing scheme when given a lossy networks. A node in MT chooses the next hop node with the minimum expected number of transmissions to the BS. All communication links in the original MT protocol use the same transmission power. A node in MTP chooses the next hop node with minimum total expected transmission power to the BS.

12 28 Chipara et al (2006) proposed the Real time Power-Aware Routing (RPAR) protocol, which supports energy-efficient real-time communication in WSNs. RPAR achieves this by dynamically adapting transmission power and routing decisions based on packet deadlines. RPAR has several salient features. First, it improves the number of packets meeting their deadlines at low energy cost. Second, it has an efficient neighborhood manager that quickly discovers forwarding choices (pairs of a neighbor and a transmission power) that meet packet deadlines while introducing low communication and energy overhead. During high congestions RPAR retransmits the packet several times before the packet is successfully received which in turn increases the transmission power and energy wasted in active listening of nodes and also fails to find a route in the presence of holes in the network topology. Zimmerling et al (2008) introduced two routing schemes that efficiently utilize energy: Minimum Energy Relay Routing (MERR) and Adaptive MERR (AMERR) were introduced.these routing schemes take into account the channel characteristics, the radio component, and the distribution of the sensor nodes along a linear path modeled by a one-dimensional homogeneous Poisson process. Based on these parameters and assumptions, theoretical optimal lower bound of routing in a linear WSN is formed. AMERR achieves optimal performance, while MERR rapidly approaches optimal performance as the Poisson rate increases. MERR and AMERR are less complex and have better scalability. This routing protocol does not take fairness into account. The Dynamic Source Routing (DSR) allows nodes to dynamically discover a source route across multiple network hops to any destination in the network. To do this, each packet header contains the complete, ordered list of traversed nodes. If an intermediate node is not the destination or it does not

13 29 have any route to the destination in its route cache, it will initiate a route discovery process via request broadcast to its neighbors. If available, the complete route to the destination is found and returned to the initiator. Otherwise, the neighbor appends its address to the route record and re broadcast to its neighbors. When routes become invalid, DSR adapts by sending a route error packet to the source node, which stops using the route. For better reliability, DSR maintains multiple route entries in its routing table. The complete routing algorithm was described by Yang et al (2007) and Manjeshwar and Agrawal (2008). Ad hoc On-Demand Distance Vector Routing Protocol (AODV) is a routing protocol designed for wireless networks. AODV builds routes using a route request / route reply query cycle. When a source node desires a route to a destination for which it does not already have a route, it broadcasts a route request (RREQ) packet across the network. Nodes receiving this packet update their information for the source node and set up backward pointers to the source node in the route tables. In addition to the source node's IP address, current sequence number, and broadcast ID, the RREQ also contains the most recent sequence number for the destination of which the source node is aware. A node receiving the RREQ may send a route reply (RREP) if it is either the destination or if it has a route to the destination with corresponding sequence number greater than or equal to that contained in the RREQ. If this is the case, it unicast a RREP back to the source. Otherwise, it rebroadcasts the RREQ. The complete routing algorithm was described in the literature ( Notani 2008 and Perkins et al 2008). A novel real time Power Aware Two-Hop (PATH) based protocol was proposed by Rezayat et al (2010), that can improve real time performance in WSNs. PATH integrates the concept of using two-hop neighbor information with the power control mechanism to achieve better real-time

14 30 performance. This integration reduces the number of packet that cannot meet their delay requirement and so perform well. Also the reduction of packet dropping results in better energy consumption performance. An Energy Efficient, Power Aware Routing algorithm was presented by Ajina (2011), where energy efficiency scheme is integrated with power awareness parameters for routing of packets. This protocol significantly reduces the total number of route request packets, and it results in an increased packet delivery ratio, decreasing latency for the data packets, lower control overhead, and fewer collisions of packets, supporting reliability and decreasing power consumption. Each route request carries the cumulative cost, so very little bit overhead is increased to carry the cumulative cost. The major limitation of power-aware routing protocols is that it only minimizes the transmission power of nodes and ignores the power consumption in other radio states. As a result, it is only effective for the radio platforms with high transmission power or the networks with high workload where nodes operate in transmission state most of the time. 2.4 COVERAGE, CONNECTIVITY, AND SCHEDULING PROTOCOLS An effective method for energy conservation in WSN is sleep scheduling. For the sensor network to operate successfully, the active nodes must maintain both coverage and connectivity. Further, the network must be able to configure itself to any feasible degree of sensing coverage and network connectivity in order to support different applications and environments with diverse requirements. Number of configuration protocols for coverage and connectivity in WSN has been proposed with a goal to enhance the network lifetime. This

15 31 section reviews some of these protocols and presents summary of these protocols Coverage Preserving Protocols The issue of determining the required number of sensors to achieve full coverage of a desired region was addressed by Adlakha and Srivastava (2003). The minimum number of sensors needed to achieve k-coverage with high probability was presented by Kumar et al (2004) to be approximately the same, regardless of whether the sensors are deployed deterministically or randomly, if the sensors fail or sleep independently with equal probability. An optimal deployment pattern for achieving k-barrier coverage was established, efficient global algorithms for checking k-barrier coverage of a given region were developed, and it was shown that the non existence of localized algorithms for testing the existence of global barrier coverage (Kumar et al 2005). To address this limitation, localized algorithms were proposed by Chen et al (2007), so sensors can locally determine the existence of local barrier coverage. Moreover, optimal polynomial-time algorithms were proposed to solve the sleep-wake up problem for the barrier coverage model using sensors with equal and unequal lifetimes (kumar et al 2007). A directional sensors-based approach for network coverage was proposed by Ai and Abouzeid (2006), where the coverage region of a sensor depends on its location and orientation. The coverage problem in heterogeneous sensor networks was discussed by Lazos and Poovendran (2006a). They formulated the coverage problem as a set intersection problem and derived analytical expressions, which quantify the coverage achieved by stochastic coverage. An efficient distributed algorithm to optimally solve the best-coverage problem with the least energy consumption was discussed in the literature (Li et al 2003a). Optimal polynomial time worst and average

16 32 case algorithms for coverage calculation based on the Voronoi diagram and graph search algorithms were proposed in the literature (Megerian et al 2005 and Meguerdichian et al 2001). Huang et al (2005) proposed polynomial-time algorithms, in terms of the number of sensors. Surveys of a variety of approaches on energy-efficient coverage problems are discussed in the literature ( Cardei and Wu 2006, Ghosh and Das 2006). Wan and Yi (2006) investigated the issue on how the probability that a WSN can k-cover an area varies depending upon the sensor s sensing radius and the number of the sensors. The K-coverage eligibility (KE) algorithm was presented in (Xing et al 2005), which ensures that a monitored area is K-covered, but incurs a considerably high computation cost. Huang et al (2005) have attempted to reduce the computational cost of the K-coverage configuration. They proposed a K-perimeter-covered (KPC) algorithm to calculate the coverage degree of each sensor node by tracing the perimeter segments covered by its neighbors. Because this algorithm does not require the coverage to be considered within the sensing range of a node, the computational cost can be effectively reduced, but at the expense of reduced accuracy of determining the eligibility for each sensor node. Wueng and Hwang (2006) proposed an Efficient K-coverage Eligibility (EKE) algorithm that can correctly determine the eligibility of each sensor node with low cost. A distinct feature of the EKE algorithm is that the neighbors of each sensor node are classified into R neighbors and 2R neighbors. Instead of calculating the coverage degree of all intersection points within the sensing range of a node, the EKE algorithm only requires to focus on the candidate intersection points surrounding the lower coverage regions based on the characteristics of the R neighbors and 2R neighbors. Therefore, the computational cost of the EKE algorithm can be highly reduced. Because

17 33 the algorithm aims to determine the regions that exhibit a lower coverage degree and not the minimal coverage degree, its accuracy may be reduced. Wueng et al (2008) proposed an efficient and accurate K-coverage eligibility (AKCE) algorithm to ensure K-coverage with low computation cost. This algorithm accurately determines whether a sensor node is eligible to sleep or stay active within the sensing range of this node. Various Coverage Strategies for WSN have been reviewed in the literature (Aziz et al 2009). The strategies reviewed are categorized into three groups based on the approaches used, namely: force based, grid based or computational geometry based approach. The strategies studied are used during deployment phase where the coverage is calculated based on the placement of the sensors on the Region Of Interest (ROI). It was shown that triangular lattice pattern is optimal in terms of the number of sensors needed to provide coverage. The design considerations for coverage problems in WSN was reviewed by Fan and Jin (2010), and presented the existing solutions, and discussed the open problems in coverage of WSN. The existing solutions focus on the following consideration: evaluating and improving coverage performance of area and path coverage, while maintaining connectivity and maximizing the network lifetime. Although many schemes have been proposed and progress has been made in coverage problems of WSN, there are still many open research issues. An effective coverage scheme should be proposed to implement real applications but limited to theoretical study. Therefore, most existing centralized solutions need to be developed to include the distributed and localized algorithms. Most of the above work considers the coverage issue only. For the sensor network to operate successfully, the active nodes must maintain both coverage and connectivity.

18 Connectivity Maintenance Protocols This section discusses the various connectivity maintenance protocols and summarizes the limitations of the same. Approach for reducing idle listening power consumption of radios is to maintain communication connectivity composed of a small number of active nodes and schedule other nodes to sleep. ASCENT (Adaptive Self- Configuring sensor Networks Topologies) (Cerpa and Estrin 2004) and SPAN (Chen et al 2001) are two adaptive connectivity maintenance protocols in which each node assesses its local connectivity with neighbors and decides whether to join the communication backbone of the network. Adaptive Fidelity Energy-Conserving Algorithm (AFECA) (Xu et al 2000) is a routing scheme in which each node decides to be active or asleep based on application-level information as well as network density. Xu et al (2001) proposed a connectivity maintenance protocol called GAF that utilizes geographic information to ensure every node in the network is covered by the communication range of at least one active node. In the literature, the authors, Krohn et al (2006), present cooperative transmission to increase the connectivity, the disconnected parts of a WSN which had the disadvantage of the separation issue of multi-hop sensor networks. This approach gives better connectivity compared to multihop method with decreased number of nodes required in full coverage. Watfa (2008) provided algorithms to achieve connectivity in a sensor network. This paper first provides a simple multi hop connectivity algorithm and then when the network is disconnected, cooperative transmission techniques which can support especially topologies of clustered and partitioned networks that contain separated group of nodes was provided. This new communication principle can overcome connectivity problems in

19 35 sparse settings or heavily partitioned topologies. This algorithms increase the connectivity of a network while minimizing the energy consumption. Hefeeda and Ahmadi (2009) presented a simple Probabilistic Connectivity Model (PCMP). They have introduced the network packet delivery rate as a quantitative metric for communication quality. PCMP is a fairly general protocol that can employ different probabilistic as well as deterministic communication models, with minimal configuration. The advantages of PCMP are it achieves the target network delivery rates; PCMP is quite robust to several factors common in real environments such as node failures, drifts in node clocks, and errors in node locations, and Probabilistic communication models expose a tradeoff between packet delivery rates and number of activated nodes, which could be exploited by sensor network designers to optimize the number of deployed nodes. PCMP does not consider coverage and connectivity with degrees higher than one under probabilistic sensing and communication models In the literature (Anand et al 2012), the authors reviewed the major connectivity issues in WSNs, namely connectivity maintenance and monitoring, and surveyed various methods and protocols to monitor and also to maintain the connection. The connectivity maintenance protocol has the following limitations: As connectivity maintenance protocol only reduces the idle listening power of nodes, it is only effective when the idle power of the radio is high or the network workload is low. It is only suitable for the networks that are dense enough such that extraneous nodes can be turned off without impairing the network performance.

20 Integrated Coverage and Connectivity Schemes This section reviews the various Integrated Coverage and Connectivity schemes. Necessary and sufficient conditions for 1-covered, 1-connected wireless sensor grid network were given in the literature (Shakkottai et al 2005 and Shakkottai et al 2003). Also, a variety of algorithms have been proposed to maintain connectivity and coverage in large WSN (Shakkottai et al 2005 and Shakkottai et al 2003). The problem of coverage and connectivity in three-dimensional networks were studied in the literature (Alam and Haas 2006). In the literature (Ravelomanana 2004), several fundamental characteristics of randomly deployed WSN regarding communication and sensing range for connectivity and coverage in three-dimensional sensor networks were investigated. An optimal deployment strategy to achieve both full coverage and 2-connectivity regardless of the relationship between communication and sensing radii of the sensors was proposed by Bai et al (2006). The relationship between coverage and connectivity of WSN was studied and distributed protocols to guarantee both their coverage and connectivity were proposed by Huang et al (2007). A joint scheduling scheme based on a randomized algorithm for providing statistical sensing coverage and guaranteed network connectivity was presented by Liu et al (2006). A distributed algorithm to keep a small number of active sensors in a network regardless of the relationship between sensing and communication ranges was proposed by Zhang and Hou (2005). It was also proved that if the original network is connected and the identified active nodes can cover the same region as all the original nodes, then the network formed by the active nodes is connected when the communication range is at least twice the sensing range (Tian et al 2005).

21 37 In the literature (Gupta et al 2006), centralized and distributed algorithms for connected sensor cover were proposed so the network can selforganize its topology in response to a query and activate the necessary sensors to process the query. Datta et al (2005) proposed two self-stabilizing algorithms to the problem of minimal connected sensor cover. Zhou et al (2005) proposed a distributed and localized algorithm using the concept of the k th -order Voronoi diagram to provide fault tolerance and extend the network lifetime, while maintaining a required degree of coverage. Control and coordination algorithms were designed for a multi-vehicle network with limited sensing and communication capabilities (Cortes et al 2004). Also, adaptive, distributed, and asynchronous coverage algorithms were proposed for mobile sensing networks. Indeed, it was proved that mobility can be used to improve coverage in WSN (Liu et al 2005). The study on k-coverage and connectivity was given by Xing et al (2005) and it was proved that if the radius of the communication ranges of sensors is double the radius of their sensing ranges, the network is connected provided that sensing coverage is guaranteed. The network connectivity was also computed, based on whether the disconnected node is boundary or interior, and proposed a network configuration protocol based on the degree of coverage of the sensing application (Xing et al 2005). The k-coverage set and the k-connected coverage set problems were formalized in terms of linear programming and two non-global solutions were proposed for them (Yang et al 2006). A probabilistic Markov model was proposed to solve the problem of minimizing power consumption in each sensor while ensuring coverage and connectivity (Yener et al 2007). Sensing coverage and network connectivity are two of the most fundamental issues in WSNs, which have a great impact on the communication performance of WSNs. Classification of the coverage

22 38 problem from different angles was given by Zhu et al (2012), which describe the evaluation metrics of coverage control algorithms, analyze the relationship between sensing coverage and network connectivity Scheduling Sensors to Achieve Coverage/Connectivity The Sensors scheduling algorithms can be classified as centralized or decentralized localized and distributed. Centralized Algorithms require global information (such as sensor s sensing ranges, sensor s location, sensor s residual energy, etc.) of the whole sensor network. Besides, the algorithms are always executed at a powerful base station. The centralized algorithms always provide nearly optimal solution since the algorithm has global view of the whole network. However, its disadvantage is very slow speed for collecting the information through the network. They have low-adaptability to the change of the network and are not suitable for large-scalable network. Decentralized (localized and distributed) algorithms require only the local information to function and are run at large number of sensor nodes. Each sensor then makes its own decision of turning on or off. Thus, it is very adaptable to the dynamic and scalable nature of sensor networks. Obviously, the distributed and localized algorithms are preferred in wireless sensor network. Normally, the localized and distributed algorithms result in nondisjoint set covers. The following reviews are based on distributed algorithms. The main approaches of Ottawa Protocol (Tian et al 2002) and Coverage Configuration Protocol (CCP) (Wang et al 2003) are to find offduty eligibility rules for redundant nodes and then schedule the work status of these eligible nodes. The off-duty eligibility rule for a sensor to determine whether it is redundant is critical to such protocols. In the eligibility rule of

23 39 Ottawa protocol, node i is said to be eligible for turning off if the sum of the angles created by all of its neighboring nodes are larger than 2. However, this rule only takes the neighbors within a node s sensing area into account, bypassing the nodes outside the sensing area but still contributing to coverage sponsorship. Therefore, it is a sufficient but unnecessary condition, the Ottawa protocol can result in redundancy after turning off only a subset of eligible nodes. Hence, Ottawa protocol does not support configurable coverage degree. An extension to the Ottawa protocol was proposed as the Optimal Coverage-Preserving Scheme (OCoPS) in the literature ( Boukerche et al 2007), to provide more accurate coverage control. However, both Ottawa protocol and OCoPS only support 1-coverage only. Wang et al (2003) proposed a coverage and connectivity configuration protocol (CCP) which tries to maximize the number of sleeping nodes while maintaining k-coverage and k-connectivity. Here, k-coverage means each point in the monitoring area of the sensor network is sensed by at least k different nodes of the network. The authors prove that k-coverage implies k-connectivity and to decide k-coverage, a node only needs to check whether the intersection points inside its sensing area are k-covered. In CCP, a coverage-configurable off-duty rule is adopted to determine node eligibility. The CCP rule considers a node to be eligible if all the intersection points inside its sensing area are k-covered. An intersection point is defined as the intersection point of the sensing circles of two nodes or that of the sensing circle of one node with the boundary of the field. The CCP protocol performs better than the Ottawa protocol in coverage efficiency. However, CCP rule does not test the intersection points on a node s sensing circle. Therefore, blind points might be occurred in CCP. A probing based density control algorithm called PEAS is proposed by Ye et al (2003) to ensure prolonged network lifetime and sensing

24 40 coverage. Some functional nodes in PEAS continue working until they drain down the battery energy, which may cause reduced network connectivity. In order to balance energy consumption among the network, the ALUL (Average Linear Uncovered Length) protocol is presented by Gui and Mohapatra (2004). The design and analysis of novel protocols that can dynamically configure a network to achieve guaranteed degrees of sensing coverage and network connectivity was presented by Xing et al (2005). Authors first presented Coverage Configuration Protocol (CCP) that can provide different degrees of coverage requested by applications and also provided a geometric analysis of the relationship between coverage and connectivity. This analysis yields key insights for treating coverage and connectivity within a unified framework. The main aim of the CCP is to achieve the guaranteed degree of coverage and connectivity while achieving long life time of the sensor by maximizing the number of sleeping nodes. But the main limitation is, it cannot guarantee the connectivity when the communication range is less than twice that of the sensing range. To avoid this limitation, CCP can be integrated with SPAN protocol to provide both coverage and connectivity guarantees. But CCP should need accurate location information and neighborhood table. This is the limitation of CCP. Zhang and Hou (2005) proved that coverage implies connectivity if the ratio between the transmission range and sensing range is at least two. Depending on this, they proposed Optimal Geographic Density Control (OGDC) algorithm to maximize the number of sleeping sensor nodes while maintaining coverage. A sensor node is active only in the case it minimizes the overlapping area with the existing active sensor nodes and it covers an intersection point of two sensors. A sensor node decides this by using its own location and the location of other active nodes. OGDC first finds the position

25 41 where each active node should locate if a full coverage is achieved. Then OGDC selects the nodes closest to these positions as active node set and put all the other nodes into sleep to conserve energy. OGDC ignores boundary positions; hence, the desired coverage degree is not achieved In the literature (Gao et al 2006), the Sensor Scheduling for k- Coverage (SSC) problem was investigated, which requires to efficiently schedule the sensors, so that the monitored area can be k-covered throughout the whole network lifetime with the purpose of enhancing network lifetime. The SSC problem is NP-hard and they proposed two heuristic algorithms under different scenarios. In addition, they developed a guideline for users to better design a sensor deployment plan to save energy by using a density control scheme. Yener et al (2007) considers a multi-hop sensor network and addresses the problem of minimizing power consumption in each sensor node locally while ensuring two global properties: (i) communication connectivity, and (ii) sensing coverage. A sensor node saves energy by suspending its sensing and communication activities according to a Markovian stochastic process. It was shown that a power level to induce a coverage radius w(n)/n is sufficient for connectivity provided that w(n). Authors present a Markov model and its solution for steady state distributions to determine the operation of a single node. Given the steady state probabilities, they have constructed a non-linear optimization problem to minimize the power consumption. An energy-efficient scheduling protocol for k-covered WSNs was proposed by Ammari and Das (2009). The design of a geographic forwarding protocol for duty-cycled k-covered WSNs with data aggregation was discussed. This paper addresses the joint k-coverage and geographic forwarding protocol for WSN.

26 42 Bulut and Korpeoglu (2011) proposed distributed and energy efficient sleep scheduling and routing scheme that can be used to extend the lifetime of a sensor network while maintaining a user defined coverage and connectivity. This scheme can activate and deactivate the three basic units of a sensor node (sensing, processing, and communication units) independently. This paper also provides a probabilistic method to calculate how much the sensing area of a node is covered by other active nodes in its neighborhood. The method is utilized by the proposed scheduling and routing scheme to reduce the control message overhead while deciding the next modes (fullactive, semi-active, inactive/sleeping) of sensor nodes. This sleep scheduling and routing scheme can significantly increase the network lifetime while keeping the message complexity low and preserving both connectivity and coverage. The protocol can work to maintain a desired partial coverage only. Sahoo and Sheu (2011) proposed potential connectivity and coverage maintenance algorithms for the WSN that let the sensors work alternatively by identifying the redundant sensing regions in the post deployed scenarios and maintain the network with limited mobility. Decision of mobility of the nodes among immediate neighbors of a dead node is totally autonomous and distributed, and it is made to maintain the network without disturbing the existing coverage and connectivity. Average mobility distance and energy consumption of the nodes are limited to maintain the coverage and connectivity of this approach. Moreover, the proposed algorithms work for the communication range (R c ) of a node that is equal to sensing range (R s ) or for R c <2R s. In duty-cycled WSN for event monitoring, existing approaches are mainly concentrated on energy-efficient scheduling of sensor nodes to guarantee the coverage performance, ignoring another crucial issue of connectivity. The connectivity problem is extremely challenging in the duty-

27 43 cycled WSNs due to the fact that the link connections between nodes are transient and unstable. He et al (2012) proposed a new kind of network, called partitioned synchronous network, to address the coverage and connectivity problem at the same time. Synchronous network has a better connectivity performance than that of asynchronous network, while coverage performances of the two types of networks are similar. In this section, a variety of approaches that compute the sensor spatial density that is needed to guarantee some degree of coverage of a field was described. However, all the schemes bound for the sensor spatial density are asymptotic and depend on the geometry of the field and its size. The sensor spatial density to achieve coverage should depend only on the sensing range of the sensors and the degree of coverage required by the application. Hence, new approaches are required to provide more accurate bounds on the sensor spatial density. Furthermore, different approaches for coverage, connectivity, duty-cycling, and data forwarding in WSN were presented. However, due to their dependency, a few protocols that combine some of them have been proposed. Hence, more energy efficient protocol need to be proposed in which coverage, connectivity, scheduling, are jointly considered. 2.5 CLUSTERING ALGORITHMS FOR WSN Clustering is needed in WSNs because of its network scalability, energy-saving attributes and network topology stabilities. However, there also exists some disadvantages associated with individual clustering scheme, such as additional overheads during cluster-head (CH) selection, assignment and cluster construction process. Most of the clustering protocols in WSNs mainly focus on energy consumption and network lifetime. They do not support adaptive multi-level clustering (Amis et al 2000, Kawadia et al 2003, Karenos et al 2008 and Changjiang et al 2011).

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe Sensor Deployment, Self- Organization, And Localization Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley, 2007 5/20/2008 WiSeLab@WMU; www.cs.wmich.edu/wise

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks

A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks Lan Wang and Yang Xiao Department of Computer Science The University of Memphis 373 Dunn Hall Memphis, TN 38152 USA Emails: lanwang@memphis.edu,

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost

DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost Mark Perillo and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester Rochester,

More information

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks Hogil Kim and Eun Jung Kim Department of Computer Science Texas A&M University College Station,

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Journal of Wireless Sensor Networks. Topology control in Heterogeneous Wireless Sensor Network

Journal of Wireless Sensor Networks. Topology control in Heterogeneous Wireless Sensor Network JWSN 216, 3, 1-18 Journal of Wireless Sensor Networks ISSN: 21-6417 www.wsn-journal.com Article Topology control in Heterogeneous Wireless Sensor Network Deepak Dandekar 1, *, Prashant Deshmukh 2 1 Electronics

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang *, Chenyang Lu, Robert Pless, Christopher Gill Department of Computer Science

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

A review on Coverage factors in Wireless Sensor Networks

A review on Coverage factors in Wireless Sensor Networks A review on Coverage factors in Wireless Sensor Networks Shikha Nema*, Branch CTA Ganga Ganga College of Technology, Jabalpur (M.P) Abstract Wireless sensor networks are an increasing area of research.

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

WSN WIRELESS WSN WSN WSN. Application agriculture SENSOR. Application geophysical. Application agriculture NETWORK: 11/30/2016

WSN WIRELESS WSN WSN WSN. Application agriculture SENSOR. Application geophysical. Application agriculture NETWORK: 11/30/2016 WIRELESS SENSOR NETWORK: ENERGY CONSERVATION APPROACHES agriculture Localized environmental conditions varies over short distances. Yitian Shui agriculture Problems of traditional monitoring techniques

More information

Sleep scheduling with expected common coverage in wireless sensor networks

Sleep scheduling with expected common coverage in wireless sensor networks DOI 10.1007/s11276-010-0262-2 Sleep scheduling with expected common coverage in wireless sensor networks Eyuphan Bulut Ibrahim Korpeoglu Ó Springer Science+Business Media, LLC 2010 Abstract Sleep scheduling,

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network

Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network Shikha Swaroop Department of Information Technology Dehradun Institute of Technology Dehradun, Uttarakhand. er.shikhaswaroop@gmail.com

More information

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

Using Consensus Estimate Technique Aimed To Reducing Energy Consumption and Coverage Improvement in Wireless Sensor Networks

Using Consensus Estimate Technique Aimed To Reducing Energy Consumption and Coverage Improvement in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8, August 2016 1 Using Consensus Estimate Technique Aimed To Reducing Energy Consumption and Coverage Improvement in Wireless

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

A3: A Topology Construction Algorithm for Wireless Sensor Networks

A3: A Topology Construction Algorithm for Wireless Sensor Networks A3: A Topology Construction Algorithm for Wireless Sensor Networks Pedro M. Wightman 1 and Miguel A. Labrador Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage: Ad Hoc Networks 7 (2009) 537 568 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc Energy conservation in wireless sensor networks: A survey Giuseppe

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering

More information

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks RAFE ALASEM 1, AHMED REDA 2 AND MAHMUD MANSOUR 3 (1) Computer Science Department Imam Muhammad ibn Saud Islamic University

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Energy Efficiency and Latency Improving In Wireless Sensor Networks Energy Efficiency and Latency Improving In Wireless Sensor Networks Vivekchandran K. C 1, Nikesh Narayan.P 2 1 PG Scholar, Department of Computer Science & Engineering, Malabar Institute of Technology,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

Developing Energy-Efficient Topologies and Routing for Wireless Sensor Networks

Developing Energy-Efficient Topologies and Routing for Wireless Sensor Networks Developing Energy-Efficient Topologies and Routing for Wireless Sensor Networks Hui Tian, Hong Shen and Teruo Matsuzawa Graduate School of Information Science Japan Advanced Institute of Science and Technology

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

LOW ENERGY CONSUMPTION RATEINHOME SENSORS USING PRIME NODES

LOW ENERGY CONSUMPTION RATEINHOME SENSORS USING PRIME NODES LOW ENERGY CONSUMPTION RATEINHOME SENSORS USING PRIME NODES Hesham Abusaimeh Computer Science Middle East University, Amman, Jordan E-Mail: habusaimeh@meu.edu.jo ABSTRACT Many of conventional home and

More information

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Anil Kumar Mahto anil.fiem16@gmail.com Ajay Prasad Department

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,

More information

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid. A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics

More information

On the Analysis of Expected Distance between Sensor Nodes and the Base Station in Randomly Deployed WSNs

On the Analysis of Expected Distance between Sensor Nodes and the Base Station in Randomly Deployed WSNs On the Analysis of Expected Distance between Sensor Nodes and the Base Station in Randomly Deployed WSNs Cüneyt Sevgi 1 & Syed Amjad Ali 2 1 Işık University, Istanbul & 2 Bilkent University, Ankara, Turkey

More information

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Flávio V. C. Martins, cruzeiro@dcc.ufmg.br Frederico P. Quintão, fred@dcc.ufmg.br Fabíola G. Nakamura fgnaka@dcc.ufmg.br,fabiola@dcc.ufam.edu.br

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing 309 Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing Sinchan Roychowdhury Instrumentation Control Engineering Calcutta Institute of Engineering & Management Kolkata, India

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

Balanced Load Sharing Protocol for Wireless Sensor Networks

Balanced Load Sharing Protocol for Wireless Sensor Networks Balanced Load Sharing Protocol for Wireless Sensor Networks Maytham Safarª, Rabie Al-Mejbas b ªCollege of Engineering and Petroleum Kuwait University, Kuwait State ªE-mail: maytham@me.com, b mejbas@hotmail.com

More information

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

More information

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

RWPS: A Low Computation Routing Algorithm for Sensor Networks

RWPS: A Low Computation Routing Algorithm for Sensor Networks RWPS: A Low Computation Routing Algorithm for Sensor Networks Pierpaolo Bergamo, Daniela Maniezzo, Gianluca Mazzini Engineering Dept., University of Ferrara, Italy Mario Gerla Computer Science Dept., UCLA,

More information

PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS

PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS Zahariah Manap 1, M. I. A Roslan 1, W. H. M Saad 1, M. K. M. Nor 1, Norharyati Harum 2 and A. R. Syafeeza 1 1 Faculty

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information