A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks

Size: px
Start display at page:

Download "A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks"

Transcription

1 International Journal of Automation and Computing 6(3), August 2009, DOI: /s A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks Jin-Zhao Lin 1, 2, Xian Zhou 3 Yun Li 1 1 Research Center for Wireless Sensor Networks, Chongqing University of Posts and Telecommunications, Chongqing , PRC 2 Institute of Communication and TT & C, Chongqing University, Chongqing , PRC 3 Key Laboratory of Optical Communication and Lightwave Technologies, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing , PRC Abstract: The topology control strategies of wireless sensor networks are very important for reducing the energy consumption of sensor nodes and prolonging the life-span of networks. In this paper, we put forward a minimum-energy path-preserving topology control (MPTC) algorithm based on a concept of none k-redundant edges. MPTC not only resolves the problem of excessive energy consumption because of the unclosed region in small minimum-energy communication network (SMECN), but also preserves at least one minimum-energy path between every pair of nodes in a wireless sensor network. We also propose an energy-efficient reconfiguration protocol that maintains the minimum-energy path property in the case where the network topology changes dynamically. Finally, we demonstrate the performance improvements of our algorithm through simulation. Keywords: Wireless sensor networks, topology control, power-efficient, minimum energy property, k-redundant edges. 1 Introduction A wireless sensor network is composed of a great deal of low-cost sensor nodes in the monitored area, where communication between two nodes may go through multiple consecutive wireless links. It has wide civil and military applications. Because the power of sensor nodes is limited, network protocols that minimize energy consumption is a major goal in the design of wireless sensor networks. By virtue of topology control, power-efficient algorithms for maintaining network connectivity and optimizing performance metrics such as network life and throughput can be designed [1 5] Li et al. [1] considered a cone-based topologycontrol algorithm, where a node u tries to find the minimum transmission power P u,a to ensure that there are some nodes that u can reach with power P u,a in every cone of degree α around u. Yin et al. [2] proposed a two-level topology control strategy that integrates active subnetwork [3] and short hops [4] methods to achieve further energy saving. Busse et al. [5] described a new topology and energy control algorithm (TECA) that uses a very simple clustering approach and connects these clusters in a very energy-efficient way. Li and Halpem [6] proposed an effective topology control algorithm, called small minimum-energy communication network (SMECN). But SMECN has a flaw around the unclosed region which could result in excessive energy consumption. We put forward a new topology control algorithm, minimum-energy path-preserving topology control (MPTC), which not only resolves the problem but also ensures that the network has a minimum-energy path prop- Manuscript received Nobember 10, 2008; revised February 4, 2009 This work was supported by by National Natural Science Foundation of China (No ), Program for New Century Excellent Talents in University (NCET ), the Science and Technology Research Project of Chongqing Municipal Education Commission of China (KJ070521). *Corresponding author. address: linjz@cqupt.edu.cn erty. The rest of the paper is organized as follows. Section 2 gives the network model. Section 3 simply introduces and analyzes the SMECN algorithm, and then discusses the problems of this algorithm. Section 4 puts forward a new algorithm, MPTC. Section 5 shows how to use MPTC to deal with topology changes using only local message exchanges. Section 6 gives the results of simulations, showing that using the network constructed by MPTC, energy can be saved. Section 7 concludes our paper. Notations. F (u, p): A region around u which can be reached with power p. Loc(v): Physical location of node v. N F (u,p) : A set of nodes in F (u, p) and N F (u,p) = {v V : Loc(v) F (u, p)}. A: A set of all the nodes that u has found so far. M: New nodes found by u in the current iteration. R u v: Relay region {(x, y) : C(u, v, (x, y)) C(u, (x, y))}. η: The direct-transmission region of node u induced by the currently known nodes. R F (u) : The final direct-transmission region of u induced by all nodes. N(u): A set of the final neighbors of node u. P (u): The final transmitted power of node u computed by MPTC. 2 Model We assume that all nodes in a wireless sensor network are deployed in a two-dimensional area, where no two nodes are in the same physical location. Each node knows its own location, and has a unique identification code. A transmission between nodes u and v takes power p(u, v) = α d(u, v) n for some appropriate constant α, where n 2 is the path-loss exponent of outdoor radio propaga-

2 296 International Journal of Automation and Computing 6(3), August 2009 tion models [7], and d(u, v) is the distance between u and v. Due to the very short transmission distance of the nodes in the wireless sensor network, we set n at 4. When each node of the wireless sensor network uses its biggest power in working, this topology is called the biggest power topology, expressed as a graph G max = (V max, E max) in which V max is the nodes congregation of the network and E max = {(u, v), α d(u, v) 2 p max}. In a graph G max = (V max, E max), if there is a path P AT H(u, v) = (u = u 0, u 1,, u n 1, u n = v), with length P AT H(u, v) = n, the consumed energy, when messages are delivered through this path, is n 1 C(P AT H(u, v)) = nc + p(u i, u i+1) (1) where c is the consumed energy when a node receives messages, usually smaller than the transmission power of the sensor node. Transmitting at the maximum power requires a great deal of energy. To reduce energy consumption, we invoke a subgraph G of G max such that [6] 1) G consists of all the nodes in G max but has less edges; 2) if u and v are connected in G max, they are still connected in G; and 3) a node u can transmit to all its neighbors in G using less power than is required to transmit to all its neighbors in G max. Indeed, what we need is a subnetwork G of G max with these properties where the power for a node to transmit to its neighbors in G max (possibly over several hops) is minimal. A subnetwork G is said to have the minimum-energy property [6] if the following holds: for every pair (u, v) of nodes that are connected in G max, the subgraph G has only a path between u and v, which is the minimum-energy path among all the paths between u and v in G max. i=0 3 Key definitions and the shortcoming of SMECN 3.1 Some key definitions Definition 1. There exist an edge (u, w) E max and a path P AT H(u, w) in G max, P AT H(u, w) = k, k > 1. If C(P AT H(u, w)) < C(u, w), then the edge (u, w) is a k- redundant edge. Fig. 1 gives an example of a two-redundant edge. Fig. 1 Two-redundant edge (u, w) Definition 2. Given a node v, the relay region of the transmit-relay node pair (u, v) is the physical region R u v such that relaying from v to any point in R u v takes less power than direct transmission [6]. R u v = {γ : C(u, v, γ) C(u, γ)}. Definition 3. Let F = F (u, p) be a region where the node u can reach and cover with transmission power p and let N F be a set of nodes located in F, i.e., N F = {v V : Loc(v) F }. Define R F (u) as the direct-transmission region of node u [6] R F (u) = (F (u, p) R u v). (2) v N F According to Definition 2, R F (u) denotes a region in which transmitting directly to any point consumes less power than relaying through any node in F. Fig. 2 shows R F (u) of node u for a given N F = {u, v, m, t}. Fig. 2 R F (u) for a circular region F (u, p) 3.2 The shortcoming of SMECN Based on the above definitions, Li and Halpem [6] proposed an effective topology control algorithm, called a small minimum-energy communication network (SMECN). For the details of SMECN, please refer to [6]. Here, we analyze the shortcomings of SMECN. The purpose of the SMECN is to find the minimal transmission power p of a random node u, which ensures that the region F (u, p) encloses the final direct-transmission region R F (u). The SMECN makes transmission power of the node u increase gradually until F (u, p) η or p increases to the maximal power of u. The final transmitted power of u is set at min{p : F (u, p) η}. After all of the nodes in the wireless sensor network compute their transmission power in this way, the wireless networks are thought to contain their subnetworks that do not include two-redundant edges and have minimum-energy property [6]. The careful implementations of the SMECN is shown in Algorithm 1. According to the SMECN, the direct-transmission regions R F (u) can be divided into two different types, closed region (see Fig. 3 (a)) and unclosed region (see Fig. 3 (b)). If direct-transmission region R F (u) of the node u is a closed region, then SMECN can find a transmitted power p (0 < p < p max) of u that satisfies F (u, p) R F (u). However, if R F (u) is an unclosed region, then SMECN cannot find a transmitted power p (0 < p < p max) of u that satisfies F (u, p) R F (u) unless it has increased to the maximal transmitted power p max of u and then SMECN will use p max as the transmitted power of u. Therefore, the existence of the unclosed region must result in bigger transmitted power set by SMECN. As a result, the nodes will consume more energy. When a network exits from the situation of the nodes locations maldistribution, the disadvantage of SMECN is especially obvious. Herein, after we give a new topology control algorithm MPTC to avoid the excessive consumption of energy.

3 J. Z. Lin et al. / A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks 297 Algorithm 1. SMECN running at node u. 1. p = p 0; 2. A = ; 3. NonNbrs = ; 4. η = F (u, p max); 5. while F (u, p) η do { 6. p=increase(p); 7. Broadcast Hello message with power p 8. and gather ACK; 9. M = {v Loc(v) F (u, p), v / A, v u }; 10. A = A M; 11. for each v M do 12. for each w A do 13. if Loc(v) R u w then 14. NonNbrs = NonNbrs {v}; 15. else if Loc(w) R u v then 16. NonNbrs = NonNbrs {w}; 17. η = η v M (F (u, p max) R u v); } 18. R F (u) = η; 19. N(u) = A NonNbrs; 20. p(u) = min{p : F (u, p) η}. Fig. 3 (a) Closed region (b) Unclosed region Closed region and unclosed region 4 The MPTC algorithm Different from SMECN, MPTC sets the transmitted power of nodes without judging whether the nodes transmission region covers its direct transmission region. The detailed MPTC algorithm is shown in Algorithm 2, which proceeds in the following main steps. Step 1. For a given node u, u starts the process by broadcasting a Hello message at maximum power p max, stating its own position. If the other nodes receive this message, the responding u with the ACK message states their location. Let NBR(u) be the set of nodes that respond to u. Step 2. Node u broadcasts a Hello message from an initial power p = p 0, gets ACK from all nodes in F (u, p), and establishes a set M that registers all nodes in F (u, p). Step 3. Let NBR(u) = NBR(u) M. For every node w NBR(u) and v N, MPTC checks whether edge (u, w) is a two-redundant edge or not, which means that MPTC checks whether C(u, v, w) < C(u, w). If the edge (u, w) is a two-redundant edge, then NBR(u) = NBR(u) {w}. Step 4. MPTC checks whether the set NBR(u) =. If not, node u will transmit with more power p and turn to step Step 2 until NBR(u) =. After NBR(u) =, MPTC sets its final transmitted power as transmitted power of u. Algorithm 2. MPTC running at node u. 1 p = p 0; 2 M = ; N = ; 3 Broadcast Hello message with power P max 4 and gather ACK; 5 NBR(u) = {v p(u, v) P max}; 6 while NBR(u) do 7 p = Increase (p); 8 Broadcast Hello message with power p 9 and gather ACK; 10 N = {v Loc(v) F (u, p), v / M, v u}; 11 M = M N; 12 NBR(u) = NBR(u) M; 13 for each w NBR(u) do 14 for each v N do 15 if C(u, w) > C(u, v, w) then 16 NBR(u) = NBR(u) {w}; 17 NBR = {v Loc(v) F (u, p), v u}; 18 P (u) = p. When all nodes in a wireless sensor network run the MPTC algorithm to determine their transmission power, we can obtain a subgraph G = (V, E) of G max, in which V denotes a set of all nodes in the network, E denotes a set of edges satisfying E E max. The subgraph G of G max constructed by MPTC has the following feature. Theorem 1. If the G max can ensure the connectivity of the wireless sensor network, then the subgraph G = (V, E) can also ensure the connectivity of the network and has the minimum-energy property. Proof. 1) Connectivity We assume that there is a P AT H(u, v) = (u = u 0, u 1,, u n 1, u n = v) in G max. We firstly prove that nodes u i and u i+1 (i = (0,, n 1)) are connected in graph G. According to the MPTC algorithm shown in Algorithm 2 if edge(u i, u i+1) is not a two-redundant edge, we reserve the this edge in graph G. Otherwise, if the edge(u i, u i+1) is a two-redundant edge, there are paths P AT H (u i, u i+1) = (u i, wi 1, wi 2,, wi m, u i+1) in G, and C(P AT H (u i, u i+1)) < C(edge(u i, u i+1)). (3) So, if u i and u i+1 are connected in G max, they are also

4 298 International Journal of Automation and Computing 6(3), August 2009 connected in G. We can find a path between u and v in G like P AT H (u, v)=(u = u 0, w0, 1 w0, 2, w m 0 0, u 1, w1, 1 w1, 2, w m 1 1,, u n 1, wn 1, 1 wn 1, 2, w m n 1 n 1,un = v). (4) The above process proves that for a given pair of nodes u and v, if there is a path between them in G max, there is also a path between u and v in subgraph G. Therefore, if G max is connected, then so is G. 2) minimum-energy property We assume that there is a minimum-energy path between u and v in G max, P AT H(u, v) = (u = u 0, u 1,, u n 1, u n = v), which is not in G. There is at least an edge(u i, u i+1) (i = (0, 1,, n 1)) in P AT H(u, v) which is not included in G. Due to the connectivity of G, there is another path P AT H (u i, u i+1)=(u i, wi 1, wi 2,, wi m, u i+1) in G to connect node u i and node u i+1. According to MPTC algorithm, it is not hard to show C(P AT H (u i, u i+1)) < C(edge(u i, u i+1)), so there is another path between u and v in G max, P AT H (u, v)=(u = u 0, u 1,, u i, wi 1, wi 2,, wi m, u i+1,, u n 1, u n = v), and C(P AT H (u, v)) < C(P AT H(u, v)), which means that P AT H(u, v) = (u = u 0, u 1,, u n 1, u n = v) is not a minimum-energy path between u and v in G max. It is contrary to the foregoing assumption. Hence we can conclude that G has the minimum-energy path property. 5 Reconfiguration of the minimumenergy subgraph In a multihop wireless sensor network, the topology is dynamic because nodes are mobile, i.e., some nodes will die and new nodes will join in the network. In this section, we propose a reconfiguration process of a minimum-energy subgraph when the network topology is changed. We assume that each node uses a neighbor discovery protocol (NDP) [6], a periodic message that provides all its neighbors with its current position in order to detect changes in the topology of the wireless sensor network. A node u sends out the message with P max to reach all the nodes, and collects all the location-information of its neighbors. Once a node detects a change, it may need to update its set of neighbors by a reconfiguration protocol of minimum-energy subgraph. There are three types of events triggering the reconfiguration protocol: 1) A dead event D u(v): The node v, a neighbor of node u, cannot be detected by node u. 2) A joining event J u(v): Node u detects a new neighbor v. 3) A moving event M u(v): Node u detects its neighbor v moving to a new location. When the node detects these three types of events, it runs the process of the reconfiguration protocol of MPTC as follows. If a single dead event D u(v) or joining event J u(v) is detected, let NBR(u) = NBR(u) {v} or NBR(u) = NBR(u) + {v} where NBR(u) is a set of neighbors searched by u lastly. Then, they both run the MPTC algorithm from the 4th line to the 18th line in Algorithm 2. If a moving event M u(v) is detected, the protocol updates the information of the location of node v firstly, and then let NBR(u) = NBR(u). Similarly, run the MPTC algorithm from the 4th line to the 18th line in Algorithm 2. The reconfiguration protocol of the minimum-energy subgraph avoids the excessive energy-consumption that results from a whole network rerunning MPTC when it detects only a small portion of the nodes changes. 6 Evaluations In this section, we evaluate the performance of MPTC through simulation. 6.1 Simulation environment The simulation is conducted on simulator NS-2 [8]. We suppose that there are nodes placed uniformly at random in a rectangular region of 1000 m 1000 m. Each node has an omni-directional antenna with 0 gain, 1.5 m above the node. According to the needs of simulation, we set ten levels between the minimum transmitted power ( dbw) and the maximum transmitted power ( dbw), corresponding to the transmission radii of nodes from 25 m to 250 m. The detailed simulation parameters are listed in Table 1, in which AODV denotes Ad hoc on-demand distance vector routing. Table 1 Simulation parameters Parameters Description Value prop Radio-propagation model TwoRayGround CPThresh Capture threshold 10 db CSThresh The carrier sense threshold 108 dbw RXThresh Receive threshold 94 dbw freq Carrier frequency 914 MHz Rb Transmission raw bandwidth 2 MHz Rp Wireless routing AODV [9] ifqlen Max packet in interface queue Simulation results Let us see the topology structure of the network. Fig. 4 depicts a network s topology structure with 100 nodes controlled by MaxPower (every node transmits messages using its maximum power), SMECN, and MPTC. We can see from Fig. 4 that the topology structure constructed by MPTC is sparser, which helps to reduce potential collisions and increases the power effectiveness of nodes. (a) MaxPower

5 J. Z. Lin et al. / A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks 299 (b) SMECN packets. We have used the following application scenario. The application traffic is assumed to have constant bit rate (CBR), and the application packets are all 512 bytes. The packet sending interval decreases from 100 ms to 9 ms; that is, packet arrival rate increases from kb/s to kb/s. The change of average end-to-end delay of packets based on different traffic loads is shown in Fig. 6. At the beginning, the packet arrival rate is relatively low and the traffic load of the network is at the low level. Because the MaxPower lets every node transmit messages using its maximum power, which makes the retransmission times of a packet less than MPTC and SMECN from the source node to the destination node, the delay time of MaxPower is shorter than SMECN and MPTC. However, along with the increase of the network s traffic load, the delay time of MPTC becomes gradually shorter than the other two algorithms. Because the increasing traffic load will intensify the competition for channels between different packets, MPTC can effectively control the number of each node s neighbors, thus decreasing the mutual interference between nodes and the probability of packet collisions. (c) MPTC Fig. 4 The topology structure of network controlled by Max- Power, MPTC, and SMECN The node degree is an important factor for the performance of a network. Low node degree is favorable for improving the network capability and reducing the probability of packet collision. Fig. 5 presents the average number of neighbors of a network that consumes receiver power c with 0 or 2 mw in the above different algorithms. It can be seen that the node degree rapidly increases with increasing network density in MaxPower. However, the average number of neighbors controlled by MPTC almost remains stable and smeller than those formed by MaxPower and SMECN in all cases. Fig. 6 Average end to end delay Fig. 5 Average degree of nodes Then, we would like to see how the different traffic loads in the network affect the average end-to-end delay of Reducing power consumption and prolonging the network lifetime are two very important targets of wireless sensor networks. Therefore, we consider the change in network lifetime (the time from beginning of simulation to death of the node). The application scenario is as follows. We assume that each node in our simulation has an initial energy of 1 J. The packet sending interval is decreasing from 1 s to 0.1 s, that is to say, packet arrival rate is increasing from kb/s to kb/s. The effect of a network s lifetime on the different network s traffic load is shown in Fig. 7. We can see the all network lifetimes obtained using the above three algorithms are reducing with the traffic load added. However, MPTC s outperforms MaxPower and SMECN in the aspects of prolonged network lifetime. The above simulation results show that MPTC significantly outperforms SMECN. Moreover, in [6], SMECN has been proven to have better performance than MECN and cone-based distributed topology-control with optimization (OPT-CBTC) in such aspects as network lifetime, and average number of neighbors. So MPTC also outperforms MECN and OPT-CBTC.

6 300 International Journal of Automation and Computing 6(3), August 2009 Fig. 7 7 Conclusions The lifetime of network The most important purpose in the design of wireless sensor networks is to save the energy of the nodes. Topology control can reduce the consumption of sensor nodes, optimize the performance of networks and prolong the life span of the networks through adjusting the transmission power of sensor nodes. This paper puts forward a new topology control algorithm MPTC of wireless sensor networks, based on the concept of k-redundant edge. It not only avoids excess energy consumption resulting from the unclosed region in SMECN, but also ensures the connectivity of the network with the minimum-energy path property. In addition, we have proposed an energy-efficient reconfiguration protocol that maintains the above minimum-energy path property even if the network topology changes dynamically. Finally, we have shown the performance improvements of MPTC over SMECN and MaxPower through simulation. References [1] L. Li, J. Y. Halpern, P. Bahl, Y. M. Wang, R. Wattenhofer. A Cone-based Distributed Topology-control Algorithm for Wireless Multi-hop Networks. IEEE/ACM Transactions on Networking, vol. 13, no. 1, pp , [2] B. Yin, H. Shi, Y. Shang. A Two-level Strategy for Topology Control in Wireless Sensor Networks. In Proceedings of the 11th International Conference on Parallel and Distributed Systems, IEEE Press, vol. 2, pp , [3] B. Chen, K. Jamieson, H. Balakrishnan, R. Morris. Span: An Energy-efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks. Mobile Computing and Networking, vol. 8, no. 5, pp , [4] J. Liu, B. Li. Distributed Topology Control in Wireless Sensor Networks with Asymmetric Links. In Proceedings of IEEE (GLOBECOM) Global Telecommunications Conference, vol. 3, pp , [5] M. Busse, T. Haenselmann, W. Effelsberg. TECA: A Topology and Energy Control Algorithm for Wireless Sensor Networks. In Proceedings of the 9th ACM International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, Terromolinos, Spain, pp , [6] L. Li, J. Y. Halpern. A Minimum-energy Preserving Topology-control Algorithm. IEEE Transactions on Wireless Communications, vol. 3, no. 3, pp , [7] T. S. Rappaport. Wireless Communications: Principles and Practice, Englewood Cliffs, Prentice-Hall, NJ, USA, [8] VINT Project. The Network Simulator ns 2, [Online], Available: [9] C. E. Perkins, E. M. Royer. Ad-hoc On-demand Distance Vector Routing. In Proceedings of the 2nd IEEE Workshop Mobile Computing Systems Application, pp , Jin-Zhao Lin received the B. A. degree in wireless engineering from Xi an Jiaotong University, PRC in 1991, and the M. A. and Ph. D. degrees of circuit and system from Chongqing University, PRC in 1995 and 2001, respectively. He had also a 3 year post-doctor experience in automation science and engineering. He is now a full professor in Chongqing University of Posts and Telecommunications, and a part-time professor in Chongqing University. His research interests include signal processing, wireless communication, and mobile network. networks. Xian Zhou received the M. A. degree in communication and information system from Chongqing University of Posts and Telecommunications, PRC in She is currently a Ph. D. candidate in Beijing University of Posts and Telecommunications, PRC. Her research interests include sensor networks and fiber communication. Yun Li received the B. A. and M. A. degrees from Southwest University and Chongqing University of Posts and Telecommunications, PRC in 1997 and 2000, respectively, and the Ph. D. degree from University of Electronic Science and Technology, PRC in He is currently a full professor in Chongqing University of Posts and Telecommunications. His research interests include wireless

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 147 A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop Networks Li (Erran) Li, Member, IEEE, Joseph Y. Halpern,

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Roger Wattenhofer Li Li Paramvir Bahl Yi-Min Wang Microsoft Research CS Dept. Cornell University Microsoft

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network

Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network Hui Cheng, Zhongyang Sun, * Xiaobing Zhang,

More information

ZigBee Routing Algorithm Based on Energy Optimization

ZigBee Routing Algorithm Based on Energy Optimization Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng

More information

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

Balanced Load Sharing Protocol for Wireless Sensor Networks

Balanced Load Sharing Protocol for Wireless Sensor Networks Balanced Load Sharing Protocol for Wireless Sensor Networks Maytham Safarª, Rabie Al-Mejbas b ªCollege of Engineering and Petroleum Kuwait University, Kuwait State ªE-mail: maytham@me.com, b mejbas@hotmail.com

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

Efficient Clustering Routing Algorithm Based on Opportunistic Routing

Efficient Clustering Routing Algorithm Based on Opportunistic Routing Int. J. Communications, Network and System Sciences, 2016, 9, 198-208 Published Online May 2016 in SciRes. http://www.scirp.org/journal/ijcns http://dx.doi.org/10.4236/ijcns.2016.95019 Efficient Clustering

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET MPBCA: Mobility Prediction Based Clustering Algorithm for MANET Rani.V.G Associate Professor Research and Development Center Bharathiar University Coimbatore, India ranikhans@gmail.com Dr.M.Punithavalli

More information

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2 International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 INC-BEAT 2016 An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M.

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Sabareesan M, Srinivasan S*,John Deva Prasanna D S

Sabareesan M, Srinivasan S*,John Deva Prasanna D S Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks Sabareesan M, Srinivasan S*,John Deva Prasanna D S Department of Computer Science and Technology, Hindustan University, Chennai,

More information

Topology Control in Wireless Networks 4/24/06

Topology Control in Wireless Networks 4/24/06 Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Binary Tree Routing for Parallel Data Gathering in Sensor Networks of Smart Home

Binary Tree Routing for Parallel Data Gathering in Sensor Networks of Smart Home Binary Tree Routing for Parallel Data Gathering in Sensor etworks of Smart Home Guangyan Huang and Xiaowei Li Jing He Advanced Test Technology Lab. Chinese Academy of Sciences Research Center on Data Institute

More information

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding GTAR-2014, Vol. 1, 463--469 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-30-5 GTAR-14 The Impact

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University

More information

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs R. Madhanmohan Assistant Professor, Department of Computer Science and Engineering, Annamalai University, Annamalai nagar, Tamilnadu, India ABSTRACT A MANET

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

Reconfigure ZigBee Network Based on System Design

Reconfigure ZigBee Network Based on System Design Wireless Sensor Network, 2009, 3, 206-211 doi:10.4236/wsn.2009.13027 Published Online October 2009 (http://www.scirp.org/journal/wsn/). Reconfigure ZigBee Network Based on System Design Yuan XU, Shubo

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,

More information

Journal of Wireless Sensor Networks. Topology control in Heterogeneous Wireless Sensor Network

Journal of Wireless Sensor Networks. Topology control in Heterogeneous Wireless Sensor Network JWSN 216, 3, 1-18 Journal of Wireless Sensor Networks ISSN: 21-6417 www.wsn-journal.com Article Topology control in Heterogeneous Wireless Sensor Network Deepak Dandekar 1, *, Prashant Deshmukh 2 1 Electronics

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Energy Efficiency Maximization for Wireless Sensor Networks

Energy Efficiency Maximization for Wireless Sensor Networks Energy Efficiency Maximization for Wireless Sensor Networks Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. Because of the remote nature

More information

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

Local Recovery of Routes for Reliability using Backup Nodes in MANETs Local Recovery of Routes for Reliability using Backup Nodes in MANETs Madhura Krishna R K 1, Megha T 2, Meghana M S 3, Dr. K Raghuveer (Professor and Head) 4 1,2,3,4 Dept. of Information Science and Engineering,The

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs Vijaya Lekshmi. S.V, E.P.Prakash PG Scholar, Assistant Professor Department of CSE SNS College of Engineering

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian Evaluation of Power Aware Routing Protocols Mohammad Mahmud Wireless Networks Professor: Dr. Lijun Qian Power Aware Routing In a typical network, the route of a packet will be determined by calculating

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Ms. Nutan Julka 1, Prof. Dr. J.W Bakal 2 1 Dept. of Computer Science, Pillais Institute of Information Technology,

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Selfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets

Selfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets Journal of Computer Science, 9 (1): 37-42, 2013 ISSN 1549-3636 2013 Lakshmi and Radha, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/jcssp.2013.37.42

More information

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes 1,* Chengpei Tang, 1 Jiao Yin, 1 Yu Dong 1

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Interference Minimization in Topology Control for Ad Hoc Networks

Interference Minimization in Topology Control for Ad Hoc Networks Minimization in Topology Control for Ad Hoc Networks Srinath.K, Venkataramanan.P, Mary Anita Rajam Department of Computer Science and Engineering, College of Engineering, Guindy, Anna University, Chennai,

More information

A Review on 3-Dimention in Wireless Networks

A Review on 3-Dimention in Wireless Networks A Review on 3-Dimention in Wireless Networks Eiman Alotaibi Department of Computer Science University of California, Davis Introduction 7/31/2009 2 Introduction 7/31/2009 3 Introduction 7/31/2009 4 Introduction

More information

An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks

An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks Youn-Sik Hong 1 and Ki-Young Lee 2 1 Department of Computer Science and Eng. 2 Department of Information and Telecommunication Eng.,

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

QoS Routing and Traffic Scheduling in Long-Distance Wireless Mesh Networks

QoS Routing and Traffic Scheduling in Long-Distance Wireless Mesh Networks Chinese Journal of Electronics Vol.21, No.2, Apr. 2012 QoS Routing and Traffic Scheduling in Long-Distance 802.11 Wireless Mesh Networks ZHAO Zenghua 1,HEMing 1, ZHANG Jie 2 and ZHANG Lianfang 1 (1.School

More information

Efficient Routing Algorithm for MANET using Grid FSR

Efficient Routing Algorithm for MANET using Grid FSR 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore Efficient Routing Algorithm for MANET using Grid

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

An Energy Efficient Routing Protocol for extending Lifetime of Wireless Sensor Networks by Transmission Radius Adjustment

An Energy Efficient Routing Protocol for extending Lifetime of Wireless Sensor Networks by Transmission Radius Adjustment An Energy Efficient Routing Protocol for extending Lifetime of Wireless Sensor Networks by Transmission Radius Adjustment Dr. K. Mohaideen Pitchai Department of Computer Science and Engineering, National

More information

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

arxiv: v1 [cs.ni] 26 Sep 2016

arxiv: v1 [cs.ni] 26 Sep 2016 On-Demand Routing Algorithm with Mobility Prediction in the Mobile Ad-hoc Networks Trung Kien Vu, Sungoh Kwon School of Electrical Engineering University of Ulsan Ulsan, Korea, 680-749 arxiv:1609.08141v1

More information

A Rank Table Based Routing Method for Multi-Sink Zigbee Wireless Sensor Network

A Rank Table Based Routing Method for Multi-Sink Zigbee Wireless Sensor Network Journal of Communications Vol. 8, No. 8, August 2013 A Rank Table Based Routing Method for Multi-Sink Zigbee Wireless Sensor Network Qianrong Gu1, Hongying Zuo2, Ruidan Su3, Jihui Xu1, and Huaiyu Xu1 1

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need

More information

WIRELESS ad-hoc networks are emerging day by day

WIRELESS ad-hoc networks are emerging day by day Load and Energy Aware Topology Control in Wireless Ad-hoc Networks Tandra Chakraborty, Fazlay Rabbi, Aungon Nag Radon, Student Member, IEEE and Ashikur Rahman Department of Computer Science, University

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network

Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network Vol.3, Issue.4, Jul - Aug. 2013 pp-1942-1946 ISSN: 2249-6645 Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network Uma Narayanan 1, Arun Soman 2 *(Information Technology, Rajagiri

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, and Jianzhong Li Harbin Institute of Technology, China Quan Chen@ Harbin Institute

More information