Sensor Scheduling for Aggregate Monitoring in Wireless Sensor Networks

Size: px
Start display at page:

Download "Sensor Scheduling for Aggregate Monitoring in Wireless Sensor Networks"

Transcription

1 Sensor Scheduling for Aggregate Monitoring in Wireless Sensor Networks Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubramanian School of Information and Computer Science, University of California Irvine, CA 92697, USA fxyu, sharad, Abstract Wireless sensor network is characterized by their capability of generating, processing, and communicating data. They are being explored in many scientific domains, e.g., ecology and oceanography. Most of these applications involve primarily data collection with in-network processing in which continuous aggregate queries are posed and processed. There are two principle concerns with this type of applications. First, due to the use of batteries, limited power resource has been identified as a major challenge in deploying wireless sensor networks. Minimizing power consumption becomes of ultimate importance. Second, data is usually expected to be gathered as soon as possible to facilitate the monitoring of the physical phenomena. In this paper, we tackle these issues through sensor state scheduling. The proposed technique is based on the observation that there are two types of traffic in sensor networks designed for data aggregation, bottom-up and topdown within an abstract tree structure. We show that it is possible to achieve deterministic schedules for data aggregation with very good performance. Specifically, we develop greedy algorithms to schedule transmission and listening operations for each sensor node to achieve collisionfree communication. We show that the schedules can maximize the time sensor nodes spent on low-power states which helps achieve great energy efficiency, as well as allow fast data aggregation. 1 Introduction Advances in MEMS technology has enabled the development of small, inexpensive electronic microsensor devices (e.g. Berkeley Motes [15] ) that integrate sensing, processing, and communicating components. Applications of the networks have been found in many scientific domains, such as ecological and biomedical studies [23, 26]. Portable operating systems that can be embedded into such devices (e.g. TinyOS [12]) have been developed that allow for drop and play applications to execute over such devices. Efforts are now ongoing to develop powerful programming environments to facilitate application development over sensor networks. In particular, both hardware and software designs of micro sensing devices enable them to be deployed in large-scale monitoring applications. It has been recognized that a flexible framework for queries is a key component of a sensor application development environment [21, 2]. Many of the recent works [22, 17, 27, 21] have made strong efforts on building a querying functionality as part of the basic programming environment for sensor networks. Much as in traditional SQL, such a querying module will allow application writers to declaratively specify a set of sensors of interest (e.g., sensors in a given geographical region or whose values satisfy certain conditions) and perform operations (such an aggregation) over the data of the selected sensors. This querying functionality has been shown to dramatically simplify the application development by shielding the application writers from the complexities of the sensor environments, such as networking mechanisms. It also handles the optimization issues, such as energy management and timeliness as discussed in this paper, transparently without the notice from application users. In this paper, our concern is on techniques to implement a query mechanism to collect data periodically over sensor networks while allowing in-network aggregation, which can be either numerical aggregation or message merging. We term this type of application as aggregate monitoring. In-network aggregation is desired for two reasons. First, it enables simple but efficient distributed processing of aggregate queries such as summation and nearest neighbors. On the other hand, even for pure data collection, it allows significant degree of reduction in the number of messages generated within the network, which in turn helps improve energy-efficiency. Aggregate monitoring in sensor networks consists of two phases. During the first phase, a hierarchical tree structure rooted at an access point is discovered via techniques such as network clustering [3, 16]. A continuous query is then 1

2 disseminated to the nodes of interest in the network following the tree structure. The dissemination phase is followed by the processing phase in which every sensor node periodically transmits its data to a data collection point. Data is aggregated on sensor nodes en-route. Furthermore, sensor nodes are transitioned to low energy states (e.g., by switching off their radios) after they have received and transmitted their data to conserve energy. Periodicity of the data collection is usually determined by factors such as application needs, the residual battery power on the sensor nodes, and the expected lifetime of the sensor network. Two critical concerns application developers face are power constraints of the sensor devices and the timeliness of the data collection process. The sensor devices are usually battery powered. Due to the deployment environment, physically replacing the batteries can be very painful if at all possible. Hence minimizing power consumption has been identified as a primary optimization goal in many works on wireless sensor networks. On the other hand, the timeliness of data collection is also critical to some applications in which a timely response is needed, such as biomedical monitoring or intrusion detection. Minimizing the data collection time, or in another term, makespan, becomes another important goal in these applications. Aggregate monitoring has been studied in database community in TAG [22]. Approximation techniques [6, 24] have also been explored to achieve energy-efficient data aggregation by eliminating unnecessary messages. While all of these works have been focusing on the first challenge, they have ignored the media access problems caused by shared media space. The problems are instead pushed to the existing CSMA based MAC protocols, which are designed for general network traffic. On the other hand, the utilization of CSMA based protocols can result in very long makespan which can be unbearable. In this paper, we tackle these issues by exploring sensor state scheduling for data collection and aggregation within sensor networks. Our contributions with this paper are as follows. ffl We identify the problem of aggregate monitoring and its characteristics that are critical to developing data collection schedules. ffl We identify the potential collisions relevant to aggregation monitoring in the deployed wireless environment. ffl We propose TDMA scheduling algorithms based on greedy heuristics to determine sensor node operation states to achieve energy-efficient, collision-free communication for data collection and control message dissemination with short makespans. Table 1. Communication States of Sensor Nodes Symbol Sensor Node State Radio Operation Mode S x Transmitting Transmitter S r Receiving Receiver S s Sleeping Off ffl We present preliminary experimental results to evaluate the proposed algorithms. Road Map: The rest of the paper is developed as follows. In the next section, we describe our system model and formally present the problem to be addressed in this work. In Section 3, we present two scheduling algorithms to determine sensor states for data collection and control message dissemination. Section 4 evaluates the performance of the proposed techniques. We review related works in Section 5 and conclude the paper in section 6 with a summary of the work and future research directions. 2 Preliminaries and Problem Statement 2.1 Sensor Model and Sensor Networks The sensor node we consider in this work is composed of a processor, an embedded sensor, an A/D converter, and a radio, as with Mica Mote [15]. Each of these components is controlled by a micro operating system [12]. The radio is a hybrid transceiver which allows single channel communication, i.e., either transmitting or receiving at the same frequency. The nodes are battery-powered. Based on the radio circuit operation mode, a sensor node has 3 different states as shown in table 1. While in transmitting state S x,a sensor node has its radio circuit operating as a transmitter. Receiving state S r is a state in which a sensor node has its receiver on and is ready to receive data. Generally, a sensor node consumes its power at a similar rate when operating in states S x and S r. The most energy-efficient state is the sleeping state S s in which a sensor completely turns its radio off and therefore consumes power at a much slower rate. The network under consideration has a super node, an access point (AP), with superior resources in terms of computation and communication with remote users who pose queries. All sensor nodes are scattered around the access point to form a connected network. The network topology is relatively stable. Communication between sensor nodes occur via multi-hop messaging. The sensor nodes are homogeneous and generate sensor data. They are also clock-synchronized 1. We consider single channel commu- 1 Clock synchronization is an important research issue [7] in wireless sensor networks and is required by most sensor network applications. But it is beyond the scope of this paper. 2

3 nication which means that a node can not receive and transmit at the same time. On the other hand, only if a sensor node is in the radio transmission range of one transmitting node can it successfully receive a message. Otherwise, a message contention occurs. 2.2 Sensor Data Aggregation In the applications of aggregate monitoring, a set of sensors sense the environment and generate data. The goal is to collect the data to the AP from the sensor nodes periodically while performing in-network aggregation. In-network aggregation is enabled through an aggregation tree, which is an abstract tree structure commonly used to represent a sensor network. The tree is usually build at the topology discovering phase of the deployment of a sensor network using clustering techniques[11, 20, 28, 3]. Each non-leaf node in the aggregation tree serves an extra role of an aggregator besides data deliverer and (sometimes) producer. The aggregation can be any type of operations, such as summation on numerical data or simply the merging of messages without any computation. In this work, we deal with general data aggregation without concentrating on any specific sensor data and aggregation operations. In the data aggregation process, data flows from bottom of the tree all the way up to the root following the tree links. To maximize the benefit of data aggregation, the following observation can be made about this process. The intuitive observation illustrates an important property of the applications under concern and sets a constraint for the scheduling algorithm to be developed later in the paper. Observation 1 In aggregate monitoring applications with in-network processing, a node transmits its data only after it receives data from all its child nodes in the data collection process. By deduction, a node transmits only after all its descendants have completed their data transmissions. With an aggregation tree, data is collected at a periodicity of epoch specified by users. Decided by the monitoring applications, the epoch is usually longer as compared with the communication latency to aggregate data values all the way to the AP. Within each epoch, a time interval is allocated for each parent node to receive updates from its child nodes. Child nodes resort to reservation-based CSMA MAC protocol to communicate with the parent node. Nodes go back to sleeping state when they are not communicating. Note that although an epoch can be a long period, it is desired that the data can be collected as early as possible so that a fast response can be initiated if anything abnormal is observed. This in-network aggregation technique has been investigated by Madden et al. in TAG [22]. On the other hand, certain control messages are needed to adjust the epoch or query predicates. In quality-ware data Figure 1. False Block: Packets from s 3 to r 3 are falsely blocked although they can be delivered concurrently with packets from s 1 to r 1 collection [6, 24], error tolerance needs to be dynamically adjusted as well. These information needs to be disseminated from the root to all the nodes in a network to facilitate query processing. Intuitively, a node transmits its data only after it receives data from its parent node in the dissemination process. Although this type of top-down data flow happens much less often, a deterministic schedule can still be helpful as described next. 2.3 Message Contention The data aggregation techniques proposed so far work well if the networks are sparse. However, sensor networks are often relatively dense and contention issues on the shared media have to be resolved. In wireless networks based on MAC protocols, CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is deployed to handle message contention. We examine the problems inherent with these protocols. The first issue lies on the exponential backoff scheme deployed in the protocol to resolve contention. Consider a node waiting for all its child nodes to send their messages. In these protocols, a sender can back-off exponentially when a collision is detected. Theoretically, this collision avoidance technique can not completely eliminate collision in any given time duration. This implies no matter how long the receiving time interval is, there is always a possibility a node can not receive data from all its child nodes. On the other hand, for collisions to be practically avoided, the receiver has to keep listening for a likely very long time (usually also referred to as idle listening) before the transmissions can be completed successfully, especially when the number of child nodes is not small. Another issue lies on the fact that in the MAC protocol two types of control packets, RTS (request to send) and CTS (clear to send), are used to reserve medium to resolve the so called hidden terminal problem [25]. A CTS message is required from a receiver for a sender to transmit. On the other hand, if a node is receiving, all nodes in its vicinity must avoid transmission and are thus blocked. However, when a node can not issue a CTS message for this reason while it is requested and it can actually receive without collision, a false blocking problem [25, 19] occurs. As illustrated in figure 1 where the circles represent radio coverage range 3

4 of the nodes, r 2 is blocked when s 1 is sending packets to r 1. Hence when s 2 sends a RTS packet to r 2, r 2 can not respond. But the RTS packet also blocked r 3. As a result, if s 3 requests to send packets to r 3, r 3 will not be able to respond. A possible parallel communication is falsely blocked. This problem exaggerates the issues of energy inefficiency and large makespan by requiring longer listening time. Note that since the sensor states are classified by radio circuit operation mode, idle listening and receiving are considered to be the same sate as both require receiver to be turned on, although a sensor node may actually consume more energy receiving packets due to the operation of other components. The above discussion shows that while CSMA/CA is a general solution to message contention, it is also an expensive solution in terms of both energy efficiency and timeliness. In this work, we exploit the well-defined traffic characteristics in the aggregate monitoring applications and explore TDMA (Time Division Multiple Access) scheduling to address these issues. 2.4 Problem Statement We consider data collection with in-network aggregation in a wireless sensor network through an aggregation tree. This implies that every node knows its parent node and its child nodes in its neighborhood. The aggregation epoch is T. We consider two types of data flow, bottom-up in which data is sent from all nodes to the AP, and top-down in which control messages are disseminated from the root to all sensor nodes. We have the following precedence constraint as a direct result of observation 1. Definition 1 (PRECEDENCE CONSTRAINT). In the aggregate monitoring applications with in-network aggregation, a node has to transmit its data before its ancestors for data collection. Correspondingly, a node has to transmit its data before its descendants for control message dissemination. The goal of this work is to design a scheduling algorithm to schedule the radio operations for each node in order to 1) enable the two types of data flow with the precedence constraint; 2) collect data to the AP within a known time; 3) achieve energy-efficiency by eliminating message contention. The aggregation period T can be segmented into time slots from the beginning of the period in order to schedule node operations. The length of the slots is determined by the transmission rate of the sensor radio and the size of the data packet to be transmitted. To simplify discussion, we assume all time slots are of same duration. The presented algorithm can be easily extended to handle varying time slots. With time slots introduced, the goal of the proposed scheduling algorithms is to decide specific mode each node should operate on for each time slot. Note the proposed algorithms are designated to develop TDMA schedules for aggregate monitoring. The schedules are on application layer and are not intended to serve as the fundamental MAC protocol for general communication in the network. CSMA/CA may still present to serve as the general MAC protocol. In fact, the initial topology discovery and scheduling phase of our algorithm need such a protocol to deliver messages. 3 Scheduling for Data Aggregation Minimal makespan scheduling problem for general data collection problem has been shown to be NP-complete in [4]. We propose heuristic scheduling algorithms to achieve small deterministic makespans for aggregate monitoring. In this section, we first present PAS, a Postorder Aggregation Scheduling algorithm, which produces schedules that can guarantee the data aggregation process to be completed within a certain time while maximizing node sleeping time. The sleeping time is maximized due to the fact that nodes are in transmitting or receiving states only when they need to be. Idle listening is eliminated by the scheduling algorithm. The proposed algorithm is a distributed algorithm in which the computation for schedules is pushed to sensor nodes. However, the algorithm can also be executed centrally if the access point obtains the topology information of the network. The algorithm is performed only at the network configuration phase following topology discovery or when a change in network topology is detected. The scheduling process can be viewed as a traversal of the aggregation tree rooted at AP. The postorder scheduling in the algorithm is determined by the precedence constraint in data collection. Transmission priority is given to lower level nodes with leaves at the lowest levels. For control messages, we describe at the end of this section a similar algorithm, Preorder Scheduling, that schedules parent nodes before child nodes. 3.1 Design Considerations and PAS Overview The key to implementing collision avoidance on sensor nodes and maximizing spatial reuse of the shared media is to identify collisions. We have identified two types of collisions in the context of data aggregation using a tree structure. The following two definitions are presented from the standpoint of a node which concerns about the consequences when it decides to transmit. Definition 2 (INTERFERENCE COLLISION). An interference collision occurs when some nodes in its neighbor- 4

5 hood, besides the expected recipient, are scheduled to receive messages at the same time slot. Definition 3 (DESTINATION COLLISION). A destination collision occurs when the parent node, the expected recipient of the transmission, is able to hear from other nodes in its neighborhood at the same time. What distinguishes the two types of collisions is whether the collisions happen at a random neighbor of a node or at its parent node which should be the expected recipient. It is important to avoid interference collision to make sure the transmission to be scheduled does not interfere with other nodes which may already have established their own receiving schedules. Avoiding the destination collision ensures that the message can reach the destination without being corrupted by other messages. Indeed, we have the following lemma. Lemma 1 Avoiding both interference collisions and destination collisions is necessary and sufficient to ensure successful transmissions for all sensor nodes. We next identify sensor scheduling states to better understand the effects of the collisions on scheduling. There are three scheduling states for any node during the scheduling process as listed below. ffl SCHEDULED. The schedule of the node is completed and fixed. In PAS, completed schedules are always protected. Later schedules should not conflict with them. ffl PENDING. The schedule is partially fixed. This applies to the nodes serving as parent nodes. When part of their child nodes have scheduled their transmissions, its receiving time slots are fixed accordingly. The node is still waiting for its other descendants to complete their scheduling. However, the fixed partial schedule, should be protected as well. ffl UNSCHEDULED. No communication state has been determined for any of its time slots. To avoid collisions and hence protect fixed schedules, sensor nodes need to be aware of these schedules before it schedules itself. Similar to collisions defined above, we define two types of potential conflicts as follows. The separation will facilitate further discussion. Definition 4 (INTERFERENCE CONFLICT). A complete or partial schedule of a node is an interference conflict to an unscheduled (or partially scheduled) neighboring node, when at least one of them is an aggregation node. Figure 2. Interference Conflicts and Destination Conflicts The interference conflict captures the possibility of interference collisions. Note that two leaf nodes schedules are not interference conflict to each other, since neither will receive in the data aggregation process. This observation can help reduce the information to be stored during scheduling. However, they may constitute the another type of conflicts. As shown in figure 2, the schedule of node C can be interference conflicts to both node B and D. Definition 5 (DESTINATION CONFLICT). A complete or partial schedule of a node is a destination conflict to an unscheduled (or partially scheduled) two-hop neighboring node, when they share a common neighboring node which is the parent node of either the unscheduled (or partially scheduled) node or both of them. The destination conflict captures the potential destination collisions. In figure 2, the schedule of node C is destination conflict for node A. Note that the dotted line illustrates that nodes B and C are within each other s radio range, while the link is not used in the aggregation tree as a tree link. We emphasize again that the two types of conflicts are defined from the point of view of a specific sensor node. A closer examination shows that the destination conflict as observed by a node is actually the interference conflict of its parent node. The distinction is made in order to facilitate the scheduling of the current node. For a node to make scheduling decisions, the awareness of the two types of conflicts is critical in order to avoid collisions. The awareness is implemented by a conflict collecting and a conflict passing scheme in PAS. To enable conflict collecting, nodes always broadcast their schedules right after they finalize the schedules or updates their partial schedules. An unscheduled or partially scheduled node puts together all the conflict schedules it received from neighbors into a table. We denote this table a Conflict Table (CT ) (see the 3-column tables in figure 5). The conflict table only captures interference conflicts. Destination conflicts are acquired by a node through conflict passing; A parent node always passes its conflict table to a child along with a scheduling request, as discussed later. The PAS algorithm schedules child nodes before parent nodes, with leaf nodes scheduled first. It concentrates on 5

6 PROCEDURE: Postorder Aggregation Scheduling (1) while(receive a message msg) (2) if(msg = schedule and this.scheduled = false) (3) if(this.notleaf() or schedule.sender.notleaf()) (4) insert msg into this:ct ; (5) endif; (6) endif; (7) if(msg = SR from parent and C i.notempty()) (8) n c = C i.getnode(); (9) send (SR, CT )ton c; (10) endif; (11) if(msg = SR from a child c) (12) set radio to S r for the S x slot in c s schedule; (13) broadcast(this:schedule); (14) C i = C i c; (15) if(c i.notempty()) (16) n c = C i.getnode(); (17) send (SR, CT )ton c; (18) endif; (19) endif; (20) if(c i.empty()) (21) pick the earliest free slot as S x slot; (22) broadcast(this:schedule); (23) send SR back to parent; (24) endif; (25) endwhile; Figure 3. Postorder Aggregation Scheduling PROCEDURE: Preorder Scheduling (1) while(receive a msg) (2) if(msg = schedule and this.scheduled = false) (3) if(this.notleaf() or schedule.sender.notleaf()) (4) insert msg into this:ct ; (5) endif; (6) endif; (7) if(msg = SR from parent and C i.notempty()) (8) pick the earliest free slot as S x slot; (9) broadcast(this:schedule); (10) n c = C i.getnode(); (11) send (SR, CT )ton c; (12) endif; (13) if(msg = SR from a child c) (14) set radio to S r for the S x slot in c s schedule; (15) broadcast(this:schedule); (16) C i = C i c; (17) if(c i.notempty()) (18) n c = C i.getnode(); (19) send (SR, CT )ton c; (20) endif; (21) endif; (22) If(C i.empty()) (23) send SR back to parent; (24) endif; (25) endwhile; Figure 4. Preorder Scheduling transmission states of sensor nodes. Receiving states are determined accordingly at the parent nodes. Note that each node transmits only once in aggregate monitoring applications. The success of receiving is guaranteed by avoiding destination collisions and interference collisions. The receiving time slots of a parent node are determined one by one, since they correspond to children nodes transmission schedules. Conflict collecting and conflict passing schemes are exploited to collect all conflict information for scheduling. When computing a transmission state, a node takes a greedy approach: it selects the first available free time slot which allows it avoid both interference collisions and destination collisions. 3.2 Details of the PAS Scheduling Algorithm The focus of the algorithm is for a node to find its transmission time slot. In postorder scheduling, the root of the aggregation tree generates a scheduling request (SR)message and injects it into the tree. The SR traverses the tree in postorder with each node passing the message to its children first. A sensor node starts scheduling its transmission after it receives the SR message back from the last child node, if it has child nodes, or after it receives the message from its parent node, if it is a leaf node. SR constrains parameters such as the duration of time slots, as decided by the root node of the tree. The node sequentially examines time slots from the very first time slot if it is a leaf node, or otherwise after its latest receiving time slot (i.e., the transmission time slot of its last child node). To test if a slot is free for a node to transmit, the following two criteria have to be enforced to avoid both interference collisions and destination collisions: ffl CRITERION 1: None of its scheduled neighbors has marked the slot as an S r slot. This is used to avoid interference conflicts between immediate neighbors. To implement this criteria, a node scans its conflict table ensuring that none of the schedules in the table has marked the slot as S r. ffl CRITERION 2: None of its parent s neighbors was scheduled to transmit in the slot. This criterion helps avoid destination conflicts between two-hop neighbors. When a slot is reserved for a child to transmit, it guarantees that the intended parent node can receive the message without collision. To implement it, a parent node always passes its own current CT to its children along with scheduling request(sr). A node scans this table to ensure that none of the schedules mark the slot as S x. Although the CT may be always changing, it is not necessary for a node to request its parent s CT right before it makes its scheduling decision. We observe that it suffices for a parent node to pass the present version of CT at the time of passing SR. In fact, we have the following lemma. 6

7 Figure 5. An Aggregation Tree Figure 6. Node Schedules Lemma 2 The schedules inserted into a parent node s CT after it passes SR to a child node will not violate criterion 2. Proof sketch. The lemma is based on the precedence constraint which requires the child node to schedule its transmission time slot after the child node receives data from all its descendants. On the other hand, the schedules inserted into the CT can only come from these descendant nodes. Hence, the transmission time slot to be scheduled for the child node has to be later than these schedules which implies they will not collide at the parent node. We describe the algorithm with node operations during the scheduling phase. Figure 3 shows the pseudo-code for the procedure. A node listens for any scheduling-related messages. If the message is a potential conflict schedule, it saves it into its own conflict table (lines 2-6). If the message is the very first SR (schedule request) destined for it, it passes the SR to a child, together with its own current CT (lines 7-10). When SR is sent back by the child, it updates and broadcasts its partial schedule. The updated schedule contains a new S r slot which has to be inserted into the CT s of its unscheduled and partially scheduled neighbors. SR is then passed to another child, with its updated CT (lines 11-17). The CT can be different from what was passed to the previous child due to the fact that more conflict schedules might have been inserted when the previous child node and its descendants perform their scheduling. When the node gets back SR from the last child, it schedules its own transmission based on its own CT and the CT from its parent node, following the two criteria. Upon completing the scheduling, the node passes SR to its parent node and broadcasts its schedule (lines 20-23). The algorithm stops when the root node of the tree receives the SR from its last child node. The procedure is shown as a pseudo-code in figure 3. In figure 3, function notleaf() returns true if a node is not a leaf node and notempty() returns true if a set is not empty. C i is the set of chilled nodes. C i is the set of child nodes; CT is a conflict table; T his denotes current node n i. 3.3 An Example We go through the PAS algorithm with the tree in figure 5. In the figure, a 3-column table presents a conflict table for each node, as seen when its own schedule is computed. A two-column table presents the complete schedule of the node. The solid lines represent links in the aggregation tree. While the dotted lines represent the communication links not included in the tree. A schedule request SR is initiated at n 1 and passed to n 2. n 2 then sends it to n 4, which marks the very first time slot ts 1 as its transmission slot by setting its sensor state to S x in that slot and broadcasts this schedule. Upon receiving the SR from n 4, n 2 updates its partial schedule and broadcasts it. Nodes n 1, n 3, n 6,andn 5 all store the partial schedule in their conflict tables. The SR is then passed to n 5 which picks ts 2 as its S x slot. Note that the conflict tables of n 1 and n 2 are empty when SR is passed from n 1 to n 2 and from n 2 to n 4. We omit discussions on other nodes. As an example of free slot identification, when n 6 computes its own transmitting slot, it traverses the S r column of its conflict table and the S x column of n 3 s conflict table which has been passed to it with SR. Based on the two criteria discussed earlier in this section, ts 4 turns out to be the earliest available time for it to transmit. The final schedules are shown in figure 6. As can be observed from the schedules, parallel transmissions are achieved at time slot ts 1 when both nodes n 4 and n 7 can transmit data. On the other hand, if we ignore the dotted links in the tree graph, the algorithm will produce ideal schedules for all the nodes in a pure aggregation tree. The complete time would be 4 time slots. The existence of interference represented 7

8 by the dotted lines causes the aggregation to take one more time slot to finish. 3.4 Scheduling Control Messages Since control messages flow top-down from the root, priority has to be given to parent nodes. The algorithm, Preorder Scheduling, is very similar to PAS. We show the algorithm in figure 4 and ignore detailed discussion. 4 Performance Evaluation We performed a preliminary experimental study to evaluate the proposed PAS algorithm. We simulate sensor network aggregation application scenarios with ns2 [1]. The radio coverage distance of each sensor node is set at 40m, which is consistent with other well-known works, e.g. [13]. To test the performance of the proposed algorithm over different densities of sensor node placement, we vary the number of nodes and the network dimension. The nodes are placed randomly on the chosen space. We simulate aggregate monitoring queries initiated at a randomly chosen node in the entire query region. All our results are averages over multiple runs. Since network topology is the most important factor in our algorithm performance evaluation, we only work with synthetic data while simulating various topologies. 4.1 Energy Efficiency With deterministic schedules, which allow each sensor node to listen only when its child nodes are transmitting, energy efficiency is guaranteed. This listening time is the minimum time required to collect all data in the network. On the other hand, resorting to a CSMA/CA based MAC protocol can result in much longer listening time. Note that to compare the two approaches, we only consider listening time, which is the time a sensor node spends in active receiving mode S r. For CSMA/CA protocols, without knowing exactly when a packet is coming, a node has to stay in the receiving mode for an extended period of time. On the other hand, despite the existence of RTS/CTS packets in CSMA/CA, we consider transmission time to be roughly consistent irregardless of the availability of a schedule, since the size of RTS/CTS packets are relatively small and a sensor node can go back to sleeping state S s during backoff. The observation is confirmed with a preliminary experiment with ns2. For example, using a CSMA/CA based MAC protocol with TwoRayGround signal propagation model in ns2, when wireless data rate is 50kbps and packet size is 30 bytes (both parameters are commonly used in wireless sensor network simulations), the approximate transmission time for one packet is around 25ms. In a network with one root node and five child nodes, A TDMA schedule requires only a little more than 125 ms for the aggregation to complete. However, when five nodes try to send data packets to one common parent node at the same time via CSMA/CA, it takes more than 145ms to completely transmit all data successfully. Generally, it has been reported [4] that the RTS/CTS handshake results in 15% overhead. The experiment demonstrates significant potential savings with a deterministic schedule. Due to the fact that only a general framework is proposed in [22], it is impossible to perform a full comparison study. Hence we focus on evaluating the performance of the scheduling algorithms in the following sections. 4.2 Makespan As mentioned earlier, although there are usually no deadlines in the aggregate monitoring applications, early makespan is still a very important property that is desired for the application to initiate necessary response as soon as possible. In this section, we examine the performance of PAS in terms of makespan. Specifically, we investigate the makespan of the aggregation process under various network setups. Makespan as used in this section refers to the last time slot in which the AP receives data from its last child Impact of Network Density We first examine the impact of network density on makespan. In a dense network, the number of child nodes of a parent node is usually large. Hence the degree of interference is higher among sensor nodes. The opportunity for parallel transmission is relatively small, which can result in longer makespan. This is confirmed with our experimental results as listed in table 2. This set of experiments use 20 nodes placed randomly in a 2D space. The density variation is achieved by varying the size (dimension in meters) of the simulation space as shown in the table. As a systematic way to measure density, we use the average number of nodes per cell in the table. Cell is defined as a circle with radius of the sensor radio range (40m). As we can see, the makespan for high density setup (17.2) is much longer than the low density setup (7.8). Note that parallel transmissions are still achieved even in high density setup. A naive sequential schedule will give the longest makespan (20) Impact of Network Size The next set of experiments target at evaluating the scalability of the scheduling algorithm. When the number of nodes increases with node density remaining constant, the 8

9 Node Density Network Dimension makespan Table 2. Impact of Network Density with 20 Nodes aggregate process makespan becomes longer. our experiments confirms this observation. Another interesting fact is that when the network size is large the makespan increases much slower. Our explanation is, due to the fact that in networks covering larger space, there exist more opportunities for parallel transmissions. In fact, the makespan will be mostly determined by the section of network where interference is high. In the table, constant node density is maintained while the space of sensor node deployment is enlarged and the number of nodes is correspondingly adjusted. Network Dimension Nodes makespan Table 3. Impact of Network Size with Fixed Node Density Impact of Deployment Strategies When deploying a sensor network, the physical phenomina being monitored are usually spatially constrained in one specific region. The application users face a question as to how many sensor nodes should be placed to cover the region. While there can be many factors playing roles in the decision-making process, such as spatial coverage, hardware cost, and the monitoring resolution, data collection latency should also be considered. This set of experiments are designed to evaluate performance on makespan when various number of sensor nodes are deployed in a fixed region. We specifically vary the deployed nodes from 10 to 50 on a space of dimension 120m 120m. The network density also increases, as shown in the second column. The result is similar to what was obtained for the density test. But it focuses on fixed space instead of fixed number of nodes. As a result, the makespan, shown in table 4, increases faster as compared with the results in table 3. 5 Related Work Research areas related to this work include sensor databases, network aggregation, and quality-aware data col- Nodes Equivalent Density makespan Table 4. Deployment Strategies with Fixed Network Dimension lection. Previous works in sensor databases, such as the TinyDB project [21] and COUGAR project [27] investigate a variety of issues in developing a sensor database, such as query dissemination, data sampling, and in-network data processing. Madden et al. at UC Berkeley investigated data aggregation through a hierarchical tree structure[22], which is the same scheme we follow in this work. Our work on quality aware sensor data management in our QUASAR project [17, 10] tries to trade data quality for network performance in an efficient way. Sensor network data gathering has been explored in the network community. LEACH [11] and PEGASIS [20] explore cluster-based data gathering protocols that rotate the cluster-head randomly to evenly distribute workload among sensor nodes. Directed Diffusion [14] provides a data dissemination approach in which a node requests data by propagating interests, and aggregation is implemented through path sharing. Several approximate network clustering algorithms using weakly-connected dominating sets were presented in [3]. [16] and [5] target at uniform energy dissipation in order to achieve maximum lifetime for a sensor network. Any of these technique can be used to produce the hierarchical tree structure we used in this work. There have been a few recent works on incorporating sensor state management in the design of MAC protocols. S-MAC [29] is a CSMA/CA based approach that enables energy savings by exploiting periodic sleeping. In [18], authors propose centralized link coloring schemes to solve the parallel communication scheduling problem. The result is a TDMA schedule for collision-free communication. These approaches are general MAC protocols and is not tailored to suit the data aggregation problem we address with PAS. A couple of approaches [4, 9, 8] have been recently proposed to address the data collection problem. However, the problem differs from aggregate monitoring in that no in-network aggregations, hence precedence constraints, are considered. In addition, all these works simplify the wireless communication by considering linear networks or treelike networks and focus on developing a theoretical upper bound for makespan for the simplified network model. Interference in a general network setting is said to be handled with CSMA as in TAG [22], although it is not clear how this extension will affect the pre-achieved TDMA schedules. Contrary to theses approaches, our scheduling algorithms focus on resolving general interference to achieve 9

10 practical collision-free schedules for aggregate monitoring. In addition, research in quality-aware data collection [24, 6] addresses the relation between quality requirements of query answers and quality of the raw data, with the ultimate goal of satisfying query requirements while minimizing certain cost. Control messages are usually required to adjust the quality settings. This set of work motivates us to schedule control messages in our paper. 6 Concluding Remarks In this paper, we propose a scheduling algorithm to schedule sensor node operations to achieve contention-free communication in aggregate monitoring applications. We show that a deterministic transmission schedule can be computed for each sensor node which in turn guarantees the successful completion of data aggregation within a known time. The algorithm helps achieve significant amount of savings on power consumption over CSMA based alternative approaches. The aggregation process can also be completed in a much shorter time. The work presented here is an early step in our effort on studying energy-efficient query processing over wireless sensor networks. An immediate task is to explore optimal scheduling with deadlines and techniques for other classes of queries. With the unknown nature of data generation, probabilistic techniques could be devised to design a more flexible aggregation protocol. Our eventual goal is to bring together data management protocols and mechanisms so as to ensure cost-efficient, reliable querying service for sensornetwork applications. References [1] The network simulator - ns-2. [2] P. Bonnet, J. Gehrke, and P. Seshadri. Towards sensor database systems. In 2nd International Conference on Mobile Data Management, [3] Y. Chen and A. Liestman. Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks. In MobiHoc, [4] H. Choi, J. Wang, and E. Hughes. Scheduling on sensor hybrid network. In ICCCN, [5] K. Dasgupta, K. Kalpakis, and P. Namjoshi. An efficient clustering-based heuristic for data gathering and aggregation in sensor networks. In WCNC, [6] A. Deligiannakis, Y. Kotidis, and N. Roussopoulos. Hierarchical in-network data aggregation with quality guarantees. In EDBT, [7] J. Elson and D. Estrin. Time synchronization for wireless sensor networks. In IPDPS Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, [8] C. Florens and R. McEliece. Dpackets distribution algorithms for sensor networks. In INFOCOM, [9] S. Gandham, Y. Zhang, and Q. Huang. Minimal time convergecast scheduling in wireless sensor networks. In ICDCS, [10] Q. Han, S. Mehrotra, and N. Venkatasubramanian. Energy efficient data collection in distributed sensor environments. In ICDCS, [11] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In HICSS, [12] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for network sensors. In ASPLOS, [13] C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In MobiCOM, [14] C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In MobiCOM, [15] J. Kahn, R. Katz, and K. Pister. Next century challenges: Mobile networking for smart dust. In MOBICOM, [16] K. Kalpakis, K. Dasgupta, and P. Namjoshi. Maximum lifetime data gathering and aggregation in wireless sensor networks. In NETWORKS, [17] I. Lazaridis, Q. Han, X. Yu, S. Mehrotra, N. Venkatasubramanian, D. V. Kalashnikov, and W. Yang. Quasar: Qualityaware sensing architecture. SIGMOD Record, 33, [18] H. Li, P. Shenoy, and K. Ramamritham. Scheduling communication in real-time sensor applications. In RTAS, [19] H. Li, P. Shenoy, and K. Ramamritham. Scheduling messages with deadlines in multi-hop real-time sensor networks. In RTAS, [20] S. Lindsey and C. S. Raghavendra. Pegasis: Power efficient gathering in sensor information systems. In Proceedings of IEEE Aerospace Conference, [21] S. Madden, M. Franklin, J. Hellerstein, and W. Hong. The design of an acquisitional query processor for sensor networks. In SIGMOD, [22] S. Madden, M. F. J. Hellerstein, and W. Hong. Tag: a tiny aggregation service for ad-hoc sensor networks. In OSDI, [23] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson. Wireless sensor networks for habitat monitoring. In WSNA, [24] C. Olston, J. Jiang, and J. Widom. Adaptive filters for continuous queries over distributed data streams. In SIGMOD, [25] S. Ray, J. B. Carruthers, and D. Starobinski. Rts/cts-induced congestion in ad hoc wireless lans. In WCNC, [26] L. Schwiebert, S. K. Gupta, and J. Weinmann. Research challenges in wireless networks of biomedical sensors. In The seventh annual international conference on Mobile computing and networking, [27] Y. Yao and J. Gehrke. Query processing in sensor networks. In CIDR, [28] F. Ye, G. Zhong, S. Lu, and L. Zhang. Gradient broadcast: A robust data delivery protocol for large scale sensor networks. WINET, 11(2), March [29] W. Ye, J. Heidemann, and D. Estrin. An energy-efficient mac protocol for wireless sensor networks. In INFOCOM,

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Integrated Routing and Query Processing in Wireless Sensor Networks

Integrated Routing and Query Processing in Wireless Sensor Networks Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks

Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks Hüseyin Özgür Tan and İbrahim Körpeoǧlu Department of Computer Engineering, Bilkent University 68 Ankara, Turkey E-mail:{hozgur,korpe}@cs.bilkent.edu.tr

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS

TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS SAMUEL MADDEN, MICHAEL J. FRANKLIN, JOSEPH HELLERSTEIN, AND WEI HONG Proceedings of the Fifth Symposium on Operating Systems Design and implementation

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Aggregation Tree Construction in Sensor Networks

Aggregation Tree Construction in Sensor Networks Aggregation Tree Construction in Sensor Networks Min Ding Xiuzhen Cheng Guoliang Xue Abstract Large-scale wireless sensor networks are expected to play an increasingly important role in future civilian

More information

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks Turkmen Canli, Zhihui Chen, Ashfaq Khokhar University of Illinois at Chicago Ajay Gupta Western Michigan University Abstract-This

More information

Data Gathering in Sensor Networks using the Energy*Delay Metric. Stephanie Lindsey Cauligi Raghavendra Krishna Sivalingam

Data Gathering in Sensor Networks using the Energy*Delay Metric. Stephanie Lindsey Cauligi Raghavendra Krishna Sivalingam Data Gathering in Sensor Networks using the Energy*Delay Metric Stephanie Lindsey Cauligi Raghavendra Krishna Sivalingam Corresponding Author: Cauligi Raghavendra Computer Systems Research Department The

More information

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Node activity scheduling in wireless sensor networks

Node activity scheduling in wireless sensor networks 1 Node activity scheduling in wireless sensor networks Saoucene Mahfoudh, Pascale Minet 1 Outline 2 1. Introduction: Maximize network lifetime 2. The node coloring problem Constraints Complexity 3. Three-hop

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information

Application Aware Data Aggregation in Wireless Sensor Networks

Application Aware Data Aggregation in Wireless Sensor Networks Application Aware Data Aggregation in Wireless Sensor Networks Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul,

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Distributed Data Aggregation Scheduling in Wireless Sensor Networks

Distributed Data Aggregation Scheduling in Wireless Sensor Networks Distributed Data Aggregation Scheduling in Wireless Sensor Networks Bo Yu, Jianzhong Li, School of Computer Science and Technology, Harbin Institute of Technology, China Email: bo yu@hit.edu.cn, lijzh@hit.edu.cn

More information

Data Gathering in Sensor Networks using the Energy*Delay Metric

Data Gathering in Sensor Networks using the Energy*Delay Metric Data Gathering in Sensor Networks using the Energy*Delay Metric Stephanie Lindsey*+, Cauligi Raghavendra*, and Krishna Sivalingam+ *Computer Systems Research Department The Aerospace Corporation P. O.

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

A More Realistic Energy Dissipation Model for Sensor Nodes

A More Realistic Energy Dissipation Model for Sensor Nodes A More Realistic Energy Dissipation Model for Sensor Nodes Raquel A.F. Mini 2, Antonio A.F. Loureiro, Badri Nath 3 Department of Computer Science Federal University of Minas Gerais Belo Horizonte, MG,

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

Hybrid Push-Pull Query Processing for Sensor Networks. Niki Trigoni, Yong Yao, Alan Demers, Johannes Gehrke

Hybrid Push-Pull Query Processing for Sensor Networks. Niki Trigoni, Yong Yao, Alan Demers, Johannes Gehrke Hybrid - Query Processing for Sensor Networks Niki Trigoni, Yong Yao, Alan Demers, Johannes Gehrke Cornell University fniki,yao,ademers,johannesg.cs.cornell.edu Rajmohan Rajaraman Northeastern University

More information

Tag a Tiny Aggregation Service for Ad-Hoc Sensor Networks. Samuel Madden, Michael Franklin, Joseph Hellerstein,Wei Hong UC Berkeley Usinex OSDI 02

Tag a Tiny Aggregation Service for Ad-Hoc Sensor Networks. Samuel Madden, Michael Franklin, Joseph Hellerstein,Wei Hong UC Berkeley Usinex OSDI 02 Tag a Tiny Aggregation Service for Ad-Hoc Sensor Networks Samuel Madden, Michael Franklin, Joseph Hellerstein,Wei Hong UC Berkeley Usinex OSDI 02 Outline Introduction The Tiny AGgregation Approach Aggregate

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks

APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks Arati Manjeshwar and Dharma P. Agrawal Center for Distributed and Mobile Computing, ECECS

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations Sang Hoon Lee, Joon Ho Park, and Lynn Choi Department of Electronics and Computer Engineering Korea University

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management

A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management Abstract-In this paper we describe a topology discovery algorithm () for wireless sensor networks with its applications

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Etiquette protocol for Ultra Low Power Operation in Sensor Networks

Etiquette protocol for Ultra Low Power Operation in Sensor Networks Etiquette protocol for Ultra Low Power Operation in Sensor Networks Samir Goel and Tomasz Imielinski {gsamir, imielins}@cs.rutgers.edu DataMan Lab, Department of Computer Science Acknowledgement: Prof.

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

References. Introduction. Publish/Subscribe paradigm. In a wireless sensor network, a node is often interested in some information, but

References. Introduction. Publish/Subscribe paradigm. In a wireless sensor network, a node is often interested in some information, but References Content-based Networking H. Karl and A. Willing. Protocols and Architectures t for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 12) P. Th. Eugster, P. A. Felber, R. Guerraoui,

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

CS 410/510 Sensor Networks Portland State University

CS 410/510 Sensor Networks Portland State University CS 410/510 Sensor Networks Portland State University Lecture 7 Energy Conservation and Harvesting 2/9/2009 Nirupama Bulusu 1 Source Acknowledgements Wei Ye and John Heidemann USC Information Sciences Institute

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Abstract. 1. Introduction. 2. Theory DOSA Motivation and Overview

Abstract. 1. Introduction. 2. Theory DOSA Motivation and Overview Experiences with Implementing a Distributed and Self-Organizing Scheduling Algorithm for Energy-Efficient Data Gathering on a Real-Life Sensor Network Platform Yang Zhang, Supriyo Chatterjea, Paul Havinga

More information

e3d: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks

e3d: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks e3d: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks - Ioan Raicu, Loren Schwiebert, Scott Fowler, Sandeep K.S. Gupta Department of Computer Science, University of Chicago, iraicu@cs.uchicago.edu

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks Zehua Zhou Xiaojing Xiang State University of New York at Buffalo Buffalo, NY, USA {zzhou5, xxiang}@cse.buffalo.edu Xin Wang

More information

A NOVEL DISTRIBUTED PROTOCOL FOR RANDOMLY DEPLOYED CLUSTERED BASED WIRELESS SENSOR NETWORK:

A NOVEL DISTRIBUTED PROTOCOL FOR RANDOMLY DEPLOYED CLUSTERED BASED WIRELESS SENSOR NETWORK: A NOVEL DISTRIBUTED PROTOCOL FOR RANDOMLY DEPLOYED CLUSTERED BASED WIRELESS SENSOR NETWORK: 1 SANJAYA KUMAR PADHI, 2 PRASANT KUMAR PATTNAIK 1 Asstt Prof., Department of ComputerSciene and Engineering,

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Dalimir Orfanus (IFI UiO + ABB CRC), 27.10.2011, Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples Clustering in Wireless Sensor Networks Agenda LEACH Energy efficient

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

TiNA: A Scheme for Temporal Coherency-Aware in-network Aggregation

TiNA: A Scheme for Temporal Coherency-Aware in-network Aggregation TiNA: A Scheme for Temporal Coherency-Aware in-network Aggregation Mohamed A. Sharaf, Jonathan Beaver, Alexandros Labrinidis, Panos K. Chrysanthis Department of Computer Science University of Pittsburgh

More information

Wireless Sensor Networks CS742

Wireless Sensor Networks CS742 Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture

More information

Ferry Route Design with MAC Protocol in Delay Tolerant Networks

Ferry Route Design with MAC Protocol in Delay Tolerant Networks Ferry Route Design with MAC Protocol in Delay Tolerant Networks Chaitra T K 1, Dr A S Poornima Ph.D 2 1 Student, Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur

More information

Pervasive and Mobile Computing

Pervasive and Mobile Computing Pervasive and Mobile Computing 5 (29) 369 384 Contents lists available at ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc A data collection protocol for real-time

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

WP-PD Wirepas Mesh Overview

WP-PD Wirepas Mesh Overview WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level Ali Abdi Seyedkolaei 1 and Ali Zakerolhosseini 2 1 Department of Computer, Shahid Beheshti University, Tehran,

More information

Adaptive Middleware for Distributed Sensor Environments

Adaptive Middleware for Distributed Sensor Environments Adaptive Middleware for Distributed Sensor Environments Xingbo Yu, Koushik Niyogi, Sharad Mehrotra, Nalini Venkatasubramanian University of California, Irvine {xyu, kniyogi, sharad, nalini}@ics.uci.edu

More information

Delay Efficient Data Gathering in Sensor Networks

Delay Efficient Data Gathering in Sensor Networks Delay Efficient Data Gathering in Sensor Networks Xianjin Zhu, Bin Tang, and Himanshu Gupta Department of Computer Science, State University of New York at Stony Brook, Stony Brook, NY 11794 {xjzhu, bintang,

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

A Review on Routing Protocols For Wireless Sensor Network

A Review on Routing Protocols For Wireless Sensor Network A Review on Routing Protocols For Wireless Sensor Network Archana Chauhan 1 Praveen Sharma 2 M-Tech Student 1, Assit. Prof. 2 & Department of CSE & NGF College of Engineering &Technology Palwal, Haryana,

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks

Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks Abstract Tao Wu and Subir Biswas 1 Dept. of Electrical and Computer Engineering, Michigan State University wutao2@egr.msu.edu,

More information

Spatial Correlation-Based Collaborative Medium Access Control in Wireless Sensor Networks

Spatial Correlation-Based Collaborative Medium Access Control in Wireless Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2006 Spatial Correlation-Based Collaborative Medium

More information

High Speed Data Collection in Wireless Sensor Network

High Speed Data Collection in Wireless Sensor Network High Speed Data Collection in Wireless Sensor Network Kamal Kr. Gola a, *, Bhumika Gupta b, Zubair Iqbal c a Department of Computer Science & Engineering, Uttarakhand Technical University, Uttarakhand,

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

Sensor Network Protocol Design and Implementation. Philip Levis UC Berkeley

Sensor Network Protocol Design and Implementation. Philip Levis UC Berkeley Sensor Network Protocol Design and Implementation Philip Levis UC Berkeley Sensor Network Constraints Distibuted, wireless networks with limited resources Energy, energy, energy. Communication is expensive.

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Energy-Efficient, Application-Aware Medium Access for Sensor Networks

Energy-Efficient, Application-Aware Medium Access for Sensor Networks Energy-Efficient, Application-Aware Medium Access for Sensor Networks Venkatesh Rajendran Email: venkat@soe.ucsc.edu Computer Engineering Department University of California at Santa Cruz Santa Cruz, CA

More information

Energy-efficient routing algorithms for Wireless Sensor Networks

Energy-efficient routing algorithms for Wireless Sensor Networks Energy-efficient routing algorithms for Wireless Sensor Networks Chao Peng Graduate School of Information Science Japan Advanced Institute of Science and Technology March 8, 2007 Presentation Flow Introduction

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks Juhana Yrjölä, Tik 58673B, jayrjola@cc.hut.fi 13th March 2005 Abstract Conventional routing protocols may not be optimal

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information