A scalable code dissemination protocol in heterogeneous wireless sensor networks

Size: px
Start display at page:

Download "A scalable code dissemination protocol in heterogeneous wireless sensor networks"

Transcription

1 . RESEARCH PAPER. SCIENCE CHINA Information Sciences June 2012 Vol. 55 No. 6: doi: /s A scalable code dissemination protocol in heterogeneous wireless sensor networks PENG ShaoLiang, LI ShanShan, LIAO XiangKe, PENG YuXing & XIAO Nong Department of Computer Science, National University of Defense Technology, Changsha , China Received April 26, 2010; accepted April 15, 2011; published online December 21, 2011 Abstract Code dissemination is currently a major research issue in wireless sensor networks (WSNs). Many studies focus on code dissemination in homogeneous WSNs, mainly using a broadcast approach to solve this problem; few studies on code dissemination in heterogeneous WSNs. Furthermore, broadcasting cannot readily be used to solve the heterogenous WSN code dissemination problem directly, which is where we have focused our attention. We transformed this problem into a minimum non-leaf nodes (MNN) Steiner tree problem. We designed a scalable multicast protocol, named Heterogeneous Sensor Networks Scalable Reprogramming Protocol (HSR) to solve the MNN problem. HSR can build different multicast trees according to different nodes or code modules to disseminate different codes to them. HSR is able to approximate the MNN tree problem to a ratio of ln R (R is the set of all destinations) best known lowest bound. Therefore, the communication cost is significantly decreased and the total energy required by WSNs is reduced. We further designed two scalable schemes, special routing log and hops-restricted local broadcast, which compress the multicast tree information and deliver the multicast messages without loss. We also designed a 3-stage pipeline to speed up the transmission of packets, which alleviated interference and hidden terminal issues. We evaluated our design through comprehensive simulations and prototype implementations on Mica2 motes. Experimental results demonstrate that HSR outperforms previous protocols including the most recent studies on Sprinkler and ucast. Keywords wireless sensor networks, reprogramming, code dissemination, multicast, scalable Citation Peng S L, Li S S, Liao X K, et al. A scalable code dissemination protocol in heterogeneous wireless sensor networks. Sci China Inf Sci, 2012, 55: , doi: /s Introduction Wireless sensor networks (WSN) are composed of many source constrained sensor nodes. These nodes are self-organized into a wireless communication network, which senses the physical environment and transmits data to the sink. In most WSN applications, it is not easy to update the codes of nodes because of adverse environments and the large scale of the networks. Often, many nodes are randomly distributed into unfrequented areas, such as forests and Mars (the planet). Thus, it is virtually impossible to gather all the nodes to reprogram them. Therefore, reprogramming sensor nodes, i.e., changing the software running on sensor nodes after deployment, is necessary in sensor networks. Reprogramming can also be helpful for reutilizing the resources of WSNs [1]. Corresponding author ( pengshaoliang@nudt.edu.cn) c Science China Press and Springer-Verlag Berlin Heidelberg 2011 info.scichina.com

2 1324 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No. 6 WSNs usually operate for extended periods of time unattended, where evolving analysis and environments can change application requirements, creating the need to alter the network s behavior by introducing new code. Unlike the traditional method of programming a node over a dedicated link, the embedded nature of these systems requires the propagation of new code over the network. As WSN research matures, growing test bed environments consisting of tens of thousands of nodes are now becoming a reality, making code propagation over the network a necessity in the debugging and testing cycle. These factors suggest that network programming (the programming of nodes by disseminating code over the network) is required for successful WSNs. In particular, we consider the propagation of complete binary images. Most of these studies [2 9] assume the WSN is homogeneous and a broadcast approach is a straightforward and efficient method. Much research has focused on transmission costs real time dissemination and reliability in homogeneous WSNs. To the best of our knowledge, research on network reprogramming in heterogeneous WSNs is less evident. Obviously, the broadcast approach cannot be used directly for reprogramming in heterogeneous WSNs. The key issue is that different codes need be burned into different nodes in heterogeneous WSNs. Network reprogramming in heterogeneous WSNs poses several new challenges: 1. Heterogeneity: Different nodes need different code images; thus broadcasting cannot solve this problem. In this paper, we consider using a multicast approach for reprogramming. 2. Transmission cost: Transmission is the main source of energy consumption, especially for sending packets as shown in Table Reliability: Network reprogramming requires 100% delivery, with two requirements: every node in the network must receive the program code, and the code image must be received in its entirety (Figure 1 illustrates the structure of codes data). This is very different from traditional sensor network applications in which occasional loss of data is tolerable. 4. Real time dissemination: The transmission cost of code dissemination is large because a code module is composed of over 40 packets [1]. All codes need to be disseminated to the right nodes as soon as possible. 5. Scalability: The scale of WSNs increases to cover more objects and areas. Consequently the scalability problem of code dissemination needs to be solved. Many other problems exist in code dissemination in heterogeneous WSNs, such as hidden terminals and storage problems. These problems and challenges must also be dealt with when we design our code dissemination protocol. We propose a Heterogeneous sensor networks scalable reprogramming protocol (HSR) in this paper. The main concept behind HSR is to construct different multicast trees for different types of nodes, and then compress and transmit the tree information to help the dissemination of the codes. First, global topology information needs to be collected in the base station. Then we must construct and approximate many minimum multicast trees for different type nodes to reduce transmission costs. It is well known that this problem is an NP-complete problem [10, 11]. Second, the information on the multicast trees needs to be compressed without loss. Finally, we must consider how to maintain these multicast trees and how to design a scalable, reliable, and real-time code dissemination protocol. A minimizing energy for code dissemination (MECD) problem is formed according to the assumptions above. More importantly, the MECD problem can be transformed into a minimum non-leaf nodes (MNN) Steiner tree problem. We designed the scalable multicast protocol HSR to solve the MNN problem. HSR can build different multicast trees according to different nodes or code modules to disseminate different codes to them. The key points of our contribution are as follows: 1. We formulated the problem of code dissemination in heterogeneous WSNs as an MNN problem, and designed a code dissemination protocol named HSR. The protocol included: a. The design of a scalable and energy-efficient multicast protocol named HSR, which is a centralized algorithm. By introducing an MNN problem, HSR builds an MNN multicast tree, and in theory achieves a best known lowest bound, ln R (R is the set of all destinations). Consequently, the multicast traffic can be decreased significantly. b. The design of two scalable schemes, the special routing log (SRL) and the hops-restricted local

3 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No Figure 1 Codes data in heterogeneous WSNs. Table 1 Mica2 node energy consumption Operation Energy consumption (nah) Sending a packet Receiving a packet Idle broadcast (HLB), which compress the multicast tree information and deliver the multicast messages without loss. They work well particularly when the scale of the WSN is large or with a huge number of destination nodes. 2. The HSR protocol was further extended including: a. Proposing a 3-stage pipeline TDMA scheme to speed up the transmission of packets and alleviate interference and the hidden terminal problem. The code dissemination time was decreased from O(m n) to O(3(m 1) + n)(wheren is the number of destinations, and m is the number of sending packets). b. Using HSR to build MNN multicast trees for heterogeneous sensor nodes and different code modules. Therefore, HSR can successfully solve the code dissemination problem in heterogeneous WSNs. 3. We conducted comprehensive simulations and prototype implementations on Glomosim [12] and Berkeley Mica2 motes to evaluate our HSR design. Moreover, we compared HSR with existing protocols such as unicast, Sprinkler [7] and ucast [10] The rest of the paper is organized as follows. We outline the related studies in Section 2. Problem statements and modeling are described in Section 3. Section 4 presents the details of the HSR protocol including proof of the bound of our algorithm in approximating the MNN problem, a real-time scheduling scheme, and scalability of HSR. In Section 5, we report on simulations based on prototype implementations. Our conclusions are presented in Section 6. 2 Related studies Several reprogramming systems have been designed and studied in the past few years, as summarized in Table 2. With the exception of Sprinkler, all are designed for the Berkeley TinyOS/Mote platform. Most reprogramming systems disseminate the compiled program image across the network. The overhead is usually large in cases when only minor changes occur between the new and old versions. Incremental update approaches compare the differences between the old and new programs, and only transmit the delta patch, script or module. Incremental network programming uses a differing algorithm optimized for sensors and assumes no prior knowledge of the program code structure (hardware independent). XNP [2] provides a single-hop, in-network programming facility for TinyOS. A special Boot Loader must be resident in a reserved section of program memory, and the XNP protocol module must be wired into an application to allow for subsequent XNP updates. A host PC application XNP loads the image via a base station mote running TOSBase (this acts as a serial-to-wireless bridge) to one (mote-id specific) or many (group-id specific) nodes within direct radio range of the base. The image is sent in capsules, one per packet, and there is a fixed time delay between packet transmissions. In unicast mode, XNP checks delivery for each capsule and in broadcast mode, missing packets are handled, after the full image download has been completed, using a follow-up query request (nodes respond with a list of missing capsules). The program is loaded into external (nonprogram) memory. Applications are halted during

4 1326 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No. 6 Figure 2 Code dissemination in heterogeneous WSNs. Table 2 Related studies [1] Protocol name Reprogrammin pattern MAC Hop Pipeline XNP [2] Complete program CSMA Single-hop No Trickle [3] Script CSMA Multihop No MOAP [4] Complete program CSMA Multihop No Deluge [5] Complete program CSMA Multihop Yes MNP [6] Complete program CSMA Multihop Yes Sprinkler [7] Complete program TDMA Multihop No Firecracker [8] Complete program CSMA Multihop No TinyCubus [9] Modular update CSMA Multihop No the program download. When a reboot command is issued (via the XNP host program), the boot loader is called which copies the program from the external to program memory, and then jumps to the start of the new program. MOAP [4] is a multi-hop, over-the-air code distribution mechanism specifically targeted at Mica2 motes running TinyOS. It uses store-and-forward, providing a ripple pattern of updates. Lost segments are identified by the receiver using a sliding window, and are re-requested using a unicast message to prevent duplication. A keepalive timer is used to recover from unanswered unicast retransmission requests which sends a broadcast request when it expires. The base station broadcasts published messages advertising the version number of the new code. There is no support for rate control or suppression of multiple senders apart from link statistics. Deluge [5] is a data dissemination protocol and algorithm for propagating large amounts of data throughout a WSN using incremental upgrades for enhanced performance. It is aimed in particular at disseminating software image updates identified by incremental version numbers for network reprogramming. There is no support for heterogeneity because the same image is disseminated to all nodes in the network. The program image is split into fixed size pages that can be reasonably buffered in RAM, and each page is split into fixed size packets so that a packet can be sent without fragmentation by the TinyOS network stack. MNP [6] is targeted at MICA2 motes running TinyOS and uses the XNP boot loader along with a dedicated network protocol to provide multi-hop, in-network programming. The MNP protocol operates in four phases. MNP supports pipelining to accelerate reprogramming in multihop networks, while MOAP uses a sliding window concept. MNP uses negotiation to suppress hidden terminals. The source node sends out the ADV twice. In Table 2, the reprogramming pattern type, MAC, hop type, and whether a pipeline is used are shown. Most of them are homogeneous WSNs, and broadcast is the main method to disseminate codes. These methods cannot work well in heterogeneous WSNs. As is shown in Figure 2, heterogeneous sensor nodes need different code modules. For example, cluster header and nodes intra cluster need to be burned with different programs in hierarchical WSNs. We propose a code dissemination protocol for heterogeneous WSNs, named HSR, and analyze the bound of the approximate algorithm. We also presents the details of HSR protocol, and evaluate our design through comprehensive simulations and prototype implementations on Mica2 motes.

5 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No Figure 3 Two kinds of multicast tree. 3 Problem statements 3.1 Assumptions To simplify the problem model and analysis we make some assumptions as shown below: V = n nodes are randomly distributed in a two-dimensional area and the number of destinations is R(R <n). The communication radius of node is R = 10 log n/n [13] to connect the WSN. There are m-type different nodes in the WSN, so m-type different codes need to be disseminated to them as shown in Figure 2. Considering the local broadcast in WSNs, we assume all one-hop neighbors of the node can overhear the packet if a node sends one (Figure 3 illustrates the local broadcast). There are two typical traffic patterns in sensor networks: base station and peer-to-peer [14]. The peer-to-peer pattern is usually used for data aggregation and consensus in a small area where a set of nearby motes interact with each other. Furthermore, each node is resource-constrained, and only knows the local topology. The base station pattern usually issues multiple queries, thresholds or commands from the base station (sink) to a large number of destinations and pursuers. The base station pattern is the most representative traffic pattern inside sensor networks [14]. Therefore, we assume the traffic pattern is a base station pattern. In a period of t, most nodes in a heterogeneous WSN are static and the topology of the WSN is less changeable. All nodes can sleep and awake periodically, but the total energy consumption is proportional to the transmission cost in the WSN. 3.2 Problem statements The m-type different nodes need m-type different codes in heterogeneous WSNs. We model the MECD problem to minimize the transmission cost. We build one MECD multicast tree for every type of node. The problem of finding the multiple optimal multicast trees in the networks can be treated as searching for multiple edge weighted Steiner trees [14]. Specifically, the problem can be formally defined as follows: Given: A graph G =(V,R,E,d), where V is a set of vertices, containing a subset R i V of m-type destinations (R = m i=1 R i, also called terminals), E = V V is the set of edges, and d is a weight function d: E R. Find: A set of edges T i E that connect together the elements of R i (and possibly some of V R i ) into a tree, such that the cost of T, m i=1 e T i d(e) is minimized. Note: The elements of V R i will be referred to as optional vertices, which are also called Steiner nodes [10]. Thus the MECD problem is turned into a problem of minimizing the total cost of multiple multicast trees. It is well known that the edge weighted Steiner tree problem in an undirected graph is NPcomplete [10]. Many efficient heuristics [10] have been proposed in the literature to approximate a minimum Steiner tree in graph theory. Therefore, the problem of code dissemination in heterogeneous

6 1328 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No. 6 WSNs is NP-complete. The code dissemination for m-type nodes is independent, so the m multicast trees are constructed independently. Therefore, our goal can be transformed by constructing an optimal Steiner multicast tree. Even though we can well approximate the Steiner tree problem [11], these approximation solutions may not apply to a WSN because of the unique characteristics of WSN communications. Given the example in Figure 3, the lengths of the two trees in both the figures are 6, while the WSN context traffic for the left-hand tree is 6 and that for the right-hand tree is only 4. The traditional solution to the Steiner tree only pursues minimizing the total length of tree, which is not enough to achieve our goal of minimizing the multicast traffic in WSNs. We formulated this new problem into an MNN problem. Given a WSN graph and a multicast request consisting of a sink and a destination set, the MNN problem is to construct a multicast tree rooted at the sink spanning all destinations such that the sum of the number of transmissions at non-leaf nodes is minimized. The problem involves the choice of non-leaf and leaf nodes. Note that the leaf nodes do not contribute to any transmission power consumption because they do not transmit any messages. The problem is at least as hard as the set-cover problem [10], for which the best known lower bound on the approximation ratio is ln R. In the next section, we will present a heuristic algorithm with the lowest theoretical approximation ratio of ln R. Moreover, we focus not only on minimizing transmission cost but on real-time and reliable transmission. We will design a code dissemination protocol, named HSR, to solve these problems as shown below. 4 HSR HSR includes five major components: Initialization; Tree Computing; Message Broadcasting; and Maintenance. The sink gathers network topology to first compute the multicast tree, and then send out the routing and multicast message. Next, HSR needs to maintain the multicast procedure. Finally, a pipeline based TDMA scheme is proposed. Figure 4 describes the major components of HSR. 4.1 Initialization The sink collects the neighborhood information on each sensor. The WSN is different from ad-hoc because most of the nodes are static. The sink can also implement an intelligent restricted flooding [11] toward the destinations to reduce the flooding cost. The topology information may include node location, ID, or the relationship of neighboring connections. The global topology and real wireless link graph G can be formed at the sink. Flooding will only be used again to recollect the information when the whole topology changes significantly. 4.2 Computing the multicast tree In this section we present a global approximation algorithm with an approximation ratio of ln R i (R i :the ith-type destination nodes) when we compute the multicast tree, T i.wehave R i terminals in a graph G, which we want to connect using the least number of non-leaf nodes. We assume that the non-leaf nodes have weight 1, and the leaf nodes have weight 0. Some adjacent destination nodes can be formed into a component as shown in Figure 5. Where each non-leaf node has the same cost, and we count the number of non-leaf nodes in our final solution, we can show that an approximation guarantee of ln( R i + θ(1)) is possible. We can also show that if the value of the optimal solution is at least a fixed constant then we can achieve an approximation factor of ln R i, the lowest theoretical bound [10]. We first note that connected components induced by terminals can always be shrunk to a single terminal. Our algorithm runs in two phases. In the first phase, the algorithm greedily picks high degree stars(a star is a vertex that has at least two required vertices as neighbors) and merges them, until very few components are left. In the second phase, the algorithm runs a Steiner tree (edge) approximation algorithm with each edge having unit weight.

7 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No Figure 4 HSR protocol. Figure 5 Using component to compute the MNN multicast tree. We pick λ =2C S +1 where C S is the best approximation ratio for the unweighted Steiner tree problem [10]. Algorithm A Step 1. In each iteration we choose a vertex that merges the largest number of required vertices until iteration count we reach the stage where the number of components left to merge is less than the ln R λ + e λ or no merging is possible. Step 2. We apply an (edge weighted) Steiner tree approximation algorithm, with each edge having unit weight. Theorem 1. The above Algorithm A finds a solution to the MNN multicast tree problem with an approximation factor of ln R i (which is the best possible), when the optimal solution is greater than C s e λ. Proof. Assume that the set of components remaining after the first phase is A. We claim that there is a Steiner tree with at most A + OPT edges. Thus when we apply an (edge weighted) Steiner tree approximation, we get a tree with at most C s ( A + OPT ) edges. If the number of iterations in the first phase is r, the final solution has a cost r + C s ( A + OPT ). We now proceed to give a bound on r. Let a i components be left after the ith iteration. Since OPT nodes are capable of merging these components, for each i, intheith iteration, there must be a node that merges ai 1 OPT components. This gives a bound on a i, ( ) ai 1 1 a i a i 1 +1 a i OPT OPT 1 We can easily verify that a i a 0 (1 OPT )i + i 1 j=0 (1 1 OPT )j. The second term is a geometric series that sums to at most OPT. Thus when i=(ln R λ) OPT the first term is a geometric series that sums to at most e λ, and the number of components a i OPT +e λ i ln R λ + eλ. This guarantees that the number of iterations, r (ln R λ) OPT. If we stop because merging by stars is not possible, then the components have disjoint neighborhoods, and OPT has to pick at least one vertex from each neighborhood. Thus A OPT. If we stop because the number of components is small, then A OPT + e λ. In any case, A OPT + e λ and this yields a solution of cost at most ln R OPT + C s e λ +(2C s λ) OPT. Putting λ =2C s +1 gives at most ln R OPT vertices in our solution when OPT C s e 2Cs+1. We can modify the above algorithm, to run until no further merging is possible. Algorithm B Step 1. In each iteration choose a vertex that merges the largest number of required vertices (at least two). Step 2. Apply an (edge weighted) Steiner tree approximation algorithm, with each edge having unit weight.

8 1330 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No. 6 Theorem 2. The above Algorithm B finds a solution to the MNN multicast tree problem with an approximation factor of lnδ + 2Cs +1, where Δ is the maximum degree. Proof. As before, let a i denote the number of be vertices left after the ith iteration and a 0 = R. Then after OPT ln a0 OPT, there are at most 2 OPT components to connect. Hence we will continue to merge by stars for OPT more iterations until the number of components is definitely less than OPT. Because each Steiner vertex can be adjacent to at most Δ required vertices, OPT a 0 /Δ. If at this stage we use a f more iterations before invoking the edge weighted Steiner tree algorithm, there is a tree with OPT a f + OPT edges. Thus we can find a solution of cost at most C s (OPT a f + OPT ). The final solution has at most OPT ln a0 OPT + OPT + a f + c s ( OPT a f + OPT ) nodes. Because OPT a 0 /Δ, we get a performance guarantee of lnδ + 2C s + 1 for the algorithm. Algorithms A and B are two approximation algorithms for the MNN multicast tree problem. Theorems 1 and 2 show that the HSR can achieve a best known performance ratio of about ln R [5]. Consequently, the multicast traffic can be decreased significantly. We will further test our algorithms through simulations and experiments in the next section. 4.3 Sending routing and multicast messages When the sink computes a minimal cost multicast tree T i for the ith nodes, it compresses, encodes the tree and sends the routing messages out. HSR adopts two techniques, the SRL and the HLB to save cost when the multicast tree is deep and wide. They can also make HSR more scalable, especially in large scale WSNs and where there are destination nodes SRL When the ith destinations nodes are far from the sink, the routing path is long, and the routing information cannot be included in the packet header. Generally in HSR, a remote node is connected to the sink along the shortest path, obtained through a local routing protocol like GPSR. Therefore, it is not necessary to encode all routing nodes into packet headers. If some routing nodes calculated by the sink are not in accordance with those based on GPSR, the nodes are indicated as special nodes. All special next-hop nodes form a SRL. Obviously, the length of SRL is much shorter HLB As mentioned before, HSR uses the ARG algorithm to partition the adjacent nodes into a k-component (cluster) to maximize the local broadcast. In this case only the cluster header and the hops of local broadcast need to be encoded into the packet header to compress the multicast tree. As shown in Figure 6, all destinations and forking nodes are divided into four different components, A, B, C and D. We need only to encode the information of A, B, C and D into the packet header, so all destination nodes can receive the code. The HLB scheme works well when the multicast tree is wide. SRL and HLB are both helpful for the scalable problem of code dissemination in heterogeneous WSNs. 4.4 Maintaining the multicast tree We focus on two types of dissemination protocol problems in heterogeneous WSNs: node failure and packet loss Node failure For node failure, we mainly deal with the nodes on the multicast tree whose failure will influence the routing and local broadcast. A new reinforced path should be established in a timely manner in case of node failure and the sink should be notified to reconstruct the optimal multicast tree. In HSR, different measures are taken to deal with the failure of different kinds of nodes. When a cluster header fails, a new cluster header needs to be selected to carry on the local broadcast. A secondary cluster header can be selected from other nodes in the cluster when we partition nodes into

9 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No Figure 6 HLB scheme. k-components (clusters). The secondary cluster header always has more neighbors than other nodes in the cluster, but fewer than the first cluster header When a node in the routing path fails, its upstream node will choose another next-hop neighbor like GPSR and continue to transmit the packet because all routing information is encoded into the packet header using the SRL scheme. This path may not be the shortestormostenergy-efficient. Therefore, this failure information needs to be notified to the sink to recalculate the optimal multicast tree. When a node finds its downstream neighbor in the tree cannot work, it adds the neighbor node ID into its data packet. The failure information can then be piggybacked on the back-channel to deliver this failure information to the sink. The creation of the back-channel is free of charge in that no additional transmissions or control data traffic are needed to create it. We only need a few additional bytes in the data packet to hold the ID of the failure nodes Packet loss In sensor networks, data that flows from sources to the sink generally tolerate loss. However, data that flow from the sink to multiple sources similar to multicast are usually for the purpose of control or management (e.g. retasking sensors [1]) and are sensitive to message losses. In this case, a negative acknowledgment (NACK) can be used to support reliable data transmission in HSR because this kind of application always needs to transmit continuous queries, value thresholds and instructions. When a node detects a missing fragment after a TTL period, a repair request is sent downstream on the reverse path toward the sink. If the requested fragment is in the local cache, a response is sent; otherwise the NACK is forwarded to the next hop toward the sink. We can also use the method of three times handshake to improve the reliability of packet transmission, as done in Stream [15]; however, the control overhead and delay in the negotiation method are significantly large 4.5 Real-time scheduling Our HSR protocol takes advantage of pipelining [6] to allow parallel transfers of data in networks. Pipelining is done through segmentation: a program is divided into several segments, each of which contains a fixed number of packets. Instead of completely receiving a whole program before forwarding it, a node becomes a source node after it receives only one complete segment. For transmission of a large program, pipelining can significantly increase overall throughput. Other than pipelining, there is another major benefit of segmentation: without segmentation, a large program has thousands of packets. As a consequence, each node needs a large number of states to record the packet information (received or not). We propose a 3-stage pipeline real-time scheduling method based on TDMA. In Figure 7, corresponding to a simple channel model, a dashed line represents the interference range, and a solid arrow represents the reliable communication range. Due to the hidden terminal problem, the simultaneous data transfer from A to B will collide with the transfer from C to D. The parallel transfers should take place with at least three-hop spacing. As is shown in Figures 7 and 8, we can build a 3-stage TDMA pipeline if the hidden terminal problem can be avoided within three hops in the WSN. In stage 3, nodes A and D can

10 1332 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No. 6 Figure 7 A 3-stage pipeline. Figure 8 Real-time scheduling of a 3-stage pipeline. (a) Routing trace; (b) 3-stage pipeline. Figure 9 MNN multicast trees for different types of destination nodes. Figure 10 MNN multicast trees for different types of code modules. send packets simultaneously. Node A can send packet 2 after packet 1. Figure 8 combined with Figure 7 gives an example in which node D sends packet 1 to node E, and node A can send packet 2 to node B at the same time. We draw a conclusion from Figures 7 and 8 that in a network of n nodes, without pipelining, transferring m packets needs a total time of O(m n). With pipelining, the total time is reduced to O(3(m 1)+ n). HSR adopts an adaptive sleeping scheme. It reduces idle listening time by putting a node into the sleep state when its neighbors are transmitting its unneeded data. The sleep duration is carefully calculated according to the transmission time. HSR supports pipelining to accelerate reprogramming in multi-hop networks. As shown in Figure 1, m-type different codes need to be disseminated to the m-type different destination nodes. Thus m-type different MNN multicast trees need to be built for m-type different destination nodes. In Figure 9, we can build the MNN multicast tree T i for the ith destination node and i MNN multicast trees for all the destination nodes (i: the total number of destination node types). In Figure 10, we can apply the same method for code modules and build the MNN multicast tree T i for the ith destination nodes and i MNN multicast trees for all the destination nodes (i: the total number of code module types). Therefore, the HSR protocol can build different multicast trees according to different nodes or code modules to disseminate different codes to them. The problem of code dissemination in homogeneous WSNs can be solved successfully using the HSR protocol. We will evaluate our design through comprehensive simulations and prototype implementations on Mica2 motes in the next section. 5 Performance evaluation of HSR In this section, we present the performance evaluation results of HSR using GloMoSim [12] and Matlab 2007 with respect to three main aspects: energy consumption, multicast traffic delay, and reliability. To demonstrate the superiority of HSR, we compare it with the other four representative protocols, Sprinkler [1], MNP [1], the most recent release of the ucast multicast protocol [10], and the plain unicast protocol [11].

11 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No Table 3 Simulation parameter settings MAC layer TDMA Radio layer RADIO-ACCNOISE Model of transmission TWO-RAY Bandwidth 256 Kb/s Payload 32 bytes Area of deployment ( m) Number of nodes 636 Number of packets 100 Radius of transmission 50 m Simulation time 3600 s Nodes deployment Uniform random Number of destinations 3 15 We assume m-type different codes need to be disseminated to the m-type different destination nodes in Figure 10 and m-type different code modules need to be disseminated to the m-type different destination nodes in Figure 11. Therefore, our simulations will show that the HSR protocol can build different approximate optimal MNN multicast trees according to different nodes or code modules. Thus the total energy consumption and delay is shown to be approximately optimal. All the nodes in our simulation can be homogeneous or heterogeneous. We will show that our HSR can work well whether the WSN is homogeneous or heterogeneous. Unless otherwise stated, the default parameters are those in Table 3. The radius of the pie shape area is 250 m. We selected different time lengths for evaluation. The sink node and destination nodes are randomly selected. We assume that each node has the same transmission power level. The simulations were conducted in the GloMoSim [12] environment as MNP [6] and ucast [10]. The simulations were repeated five times every 5 minutes and the average values were saved. 5.1 Transmission cost Figure 11 shows the transmission cost of five protocols when the number of destinations differ. We assume the transmission cost of one packet sent from one node to its neighbor is 1 [10]. The total traffic is related to the number of packets and the hops from the sink to the destination. We note that the HSR protocol refines the idea of the MNN multicast tree theory, which can build approximately optimal multicast trees for different types of destination nodes and code modules as shown in Figures 9 and 10. We can clearly see that HSR performs best among the five protocols. As the theoretical analysis and result of Section 4 indicate, the transmission cost of HSR is the least. HSR achieves 40% performance improvement compared with that of Sprinkler [1] in traffic conditions. 5.2 Energy consumption To accurately estimate energy consumption, we use realistic parameters of MicaZ [2] nodes in energy consumption simulations. More specifically, energy consumption comes from both sending and receiving packets. According to the data sheet of the CC2420 radio on MicaZ, sending and receiving have current levels of 17.4 and 18.8 ma. The voltage supply is assumed to be 3 V, and the data rate is 250 Kbps. Packets are assumed to have a payload of 32 bytes, and each destination requires 4 bytes in the header. The important metric we use is the total energy consumption, in joules, for sending 100 packets to all destinations from the sink. In the following simulations, ucast and unicast are integrated with GPSR. Figures 11 and 12 show the transmission overhead of HSR compared with those of the other four protocols. We make several observations. HSR outperforms the other existing protocols in traffic and energy consumption. Wherever the destinations are placed, HSR is more energy-efficient, and is less affected by the positions of the destination nodes than any other protocols. As emphasized earlier, ucast is designed primarily for small group multicast, and is a local approximately optimal multicast protocol. As expected, HSR performs better than Sprinkler and MNP [1]. We note that the HSR protocol refines

12 1334 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No. 6 Figure 11 Traffic comparison. Figure 12 Energy consumption comparison. Figure 13 Delay comparison. Figure 14 Reliability comparison. the idea of the MNN multicast tree theory, which can further enhance wireless link sharing and maximize local broadcasts among the neighboring destinations. On the contrary, Sprinkler only tries to find the shortest path in each step, which may not consider the effect of link sharing and local broadcasting. The preliminary results also indicate that the HSR has many advantages over unicast which demonstrates that multicast in WSN deserves further study. The cost of sink flooding and gathering the global topology information may not be small if only a few data packets are sent to destinations. In this case, ucast can perform well because ucast is connectionless and local, and does not need to maintain the global topology information. This is the great merit of ucast. In practice, in many applications of WSNs, a large number of packets need to be sent to different destinations. HSR is mainly designed for long-term and large-scale multicast. The number of packets and destinations is huge in HSR. Thus in Figures 11 and 12, HSR is more energy-efficient than ucast when the 100 packets are sent to different destinations in 100 multicast sessions. The more packets sent to different destinations, the more energy-efficient SenCast becomes. Therefore, the cost of flooding and initialization in HSR can be ignored when a large number of data packets are sent to different destinations. 5.3 Delay Figure 13 shows the comparison results of the delay. Due to the effect of path aggregation, we observe that HSR, MNP, ucast, and Sprinkler deliver packets along longer routes compared with unicast. This is intuitive, because unicast typically finds near-optimal paths. The increase in the path length means that HSR, MNP, ucast, and Sprinkler may have a slightly higher end-to-end delay. However, the average path length of HSR is shorter than that of ucast and unicast because HSR considers the link share and path aggregation and uses the idea of the shortest path. HSR tries to find a good tradeoff point between path length and link sharing to minimize multicast traffic.

13 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No A 3-stage pipeline real-time scheduling method is designed in Subsection 4.5 (Figure 8). The method can successfully solve the problems of the hidden terminal and interference. Thus HSR performs the best of the five protocols for delay. With the 3-stage pipelining, the total delay of HSR is reduced from O(m n)too(3(m 1) + n). The results are shown in Figure Reliability Network reprogramming requires high percentage delivery, which includes two parts: every node in the network must receive the program code, and the code image must be received in its entirety. This is very different from traditional sensor network applications in which occasional loss of data is tolerable [16]. The energy conservation model we use is random sleep scheduling to prolong the lifetime of the whole WSN. For example, in Figure 14, 10% or 20% sleep scheduling with a 10 s toggle period means those 10% or 20% nodes in the whole WSN sleep for 10 s in every 10 s. Each node has the same toggle period. Figure 14 shows the performance evaluation results. These two experiments are carried out using a data rate of 6 packets per minute. The comparison results demonstrate the superiority of HSR in the presence of node state transitions. The HSR performs nearly as well as the stateless ucast owing to Piggyback and Hop-by-Hop NACK-based Repair schemes (see Subsection 4.4). We observe that HSR achieves a delivery ratio of around 90%, which is good enough for common multicast purposes. 6 Conclusions and future studies This study focuses on code dissemination in heterogeneous WSNs, proposing HSR based on multicast. HSR can build different optimal multicast trees according to different nodes or code modules and encode the tree using SRL and HLB schemes. A 3-stage pipeline method is added into the HSR protocol to speed up the transmission of packets, which alleviates the interference and hidden terminal problems. We also introduce novel schemes to reinforce and complement HSR, which are helpful to address reliability and scalability on code dissemination in heterogeneous WSNs. We prove theoretically that the performance ratio of our design is ln R, which is the best among the existing code dissemination schemes. Our simulations on Glomosim and Matlab 2007 demonstrate HSR s performance compared with those of MNP, Sprinkler, unicast and ucast. Our future studies will continue the integration of energy consideration into HSR, i.e., we will consider different energy management goals and adjust HSR to further reduce the energy costs. In addition, HSR is based on the concept of reactive routing; our future work will consider other cases and problems such as multiple sinks, proactive, interference, and opportunistic routing as well as geographical routing. Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos , ), Hunan Natural Science Foundation (Grant No. 11jj4053), National Basic Research Program of China (Grant No. 2011CB302601), and China 973 WSNs Joint Lab at Shanghai. The authors would like to thank Professor Tian He and Dr. Qing Cao for providing the source code and valuable data on ucast. We are also grateful to Professor Weijia Jia, Guoliang Xing, Yunhao Liu and the anonymous reviewers for their comments and suggestions. References 1 Wang Q, Zhu Y, Cheng L. Reprogramming wireless sensor networks: challenges and approaches. IEEE Network, 2006, 20: Crossbow Technology Inc. Mote In-Network Programming User Reference. Version , Levis P, Patel S, Shenker S, et al. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Technical Report, UCB/CDS , Computer Science Dept. 2003

14 1336 Peng S L, et al. Sci China Inf Sci June 2012 Vol. 55 No. 6 4 Stathopoulos T, Heidemann J, Estrin D. A remote code update mechanism for wireless sensor networks. Tech rep CENS-TR-30 UCLA Center for Embedded Networked Computing, Hui J W, Culler D. The dynamic behavior of a data dissemination protocol for network programming at scale. In: Stankovic J A, Arora A, Govindan R, eds. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004). Baltimore, MD: ACM Press, Kulkarni S S, Wang L. MNP: multihop network reprogramming service for sensor networks. In: Martin D C, ed. The 25th IEEE International Conference on Distributed Computing Systems. Columbus, Ohio: IEEE Computer Society, Naik V, Arora A, Sinha P, et al. Sprinkler: A reliable and energy efficient data dissemination service for extreme scale wireless networks of embedded devices. IEEE Trans Mobile Comput, 2007, 6: Levis P, Culler D. The firecracker protocol. In: 11th ACM SIGOPS European Workshop (EW11). New York: The Association for Computing Machinery, Inc, Marron P J. Management and configuration issues for sensor networks. Int J Network Manag, 2005, 15: Cao Q, He T, Abdelzaher T. ucast: Unified connectionless multicast for energy efficient content distribution in sensor networks. IEEE Trans Parall Distrib Syst, 2007, 18: Peng S, Li S, Chen L, et al. SenCast: Scalable multicast in wireless sensor networks. J Comput Sci Tech, 2008, 23: Gao Z, Wang C, Li X. Construction of simulation framework for service discovery protocols in GloMoSim. Comput Eng, 2008, 34: Dimakis A G, Wainwright M J, Sarwate A D. Geographic gossip: efficient aggregation for sensor networks. In: Stankovic J A, Gibbons P B, Wicker S B, et al., eds. Proceeding of the Fifth International Conference on Information Processing in Sensor Networks, IPSN Nashville, Tennessee, USA: ACM, He T, Stankovic J A, Lu C, et al. Speed: A stateless protocol for real-time communication in ad hoc sensor networks. In: Titsworth F M, ed. 23rd International Conference on Distributed Computing Systems (ICDCS 2003). RI, USA: IEEE Computer Society, Panta R K, Khalil I, Bagchi S. Stream: Low overhead wireless reprogramming for sensor networks. In: Francois P, Shand M, Bonaventure O, eds. 26th Annual IEEE Conference on Computer Communications. Anchorage, Alaska, USA: IEEE Communications Society, Liu Y H, Liu K B, Li M. Passive diagnosis for wireless sensor networks. IEEE/ACM Trans Netw, 2010, 18:

PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1

PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

MNP: Multihop Network Reprogramming Service for Sensor Networks 1

MNP: Multihop Network Reprogramming Service for Sensor Networks 1 MNP: Multihop Network Reprogramming Service for Sensor Networks Sandeep S. Kulkarni Limin Wang Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

Integrated Routing and Query Processing in Wireless Sensor Networks

Integrated Routing and Query Processing in Wireless Sensor Networks Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered

More information

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set Available online at www.sciencedirect.com Procedia Computer Science 6 (2011) 408 412 Complex Adaptive Systems, Volume 1 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Reprogramming Wireless Sensor Networks: Challenges and Approaches

Reprogramming Wireless Sensor Networks: Challenges and Approaches Reprogramming Wireless Sensor Networks: Challenges and Approaches Qiang Wang, Yaoyao Zhu, and Liang Cheng, Lehigh University Abstract Wireless sensor networks need an efficient and reliable reprogramming

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Reliable Bulk Data Dissemination in Sensor Networks

Reliable Bulk Data Dissemination in Sensor Networks Reliable Bulk Data Dissemination in Sensor Networks A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Leijun Huang

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

On minimum m-connected k-dominating set problem in unit disc graphs

On minimum m-connected k-dominating set problem in unit disc graphs J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Fast distribution of Data in Wireless Sensor Network using Concurrency Operation

Fast distribution of Data in Wireless Sensor Network using Concurrency Operation Fast distribution of Data in Wireless Sensor Network using Concurrency Operation Geetha N, Janani V Abstract Wireless Sensor Network can be applied in verity of applications in real time. Efficient data

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

CORD: Energy-efficient Reliable Bulk Data Dissemination in Sensor Networks

CORD: Energy-efficient Reliable Bulk Data Dissemination in Sensor Networks : Energy-efficient Reliable Bulk Data Dissemination in Sensor Networks Leijun Huang Sanjeev Setia Computer Science Department George Mason University Fairfax VA 223 Abstract This paper presents, a reliable

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Outline. Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler. Motivation. Applications. Mate.

Outline. Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler. Motivation. Applications. Mate. Outline Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler Presented by Mark Tamola CSE 521 Fall 2004 Motivation Mate Code Propagation Conclusions & Critiques 1 2 Motivation

More information

Event Driven Routing Protocols For Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks Receiver Based Multicasting Protocol for Wireless Sensor Networks Madesha M Assistant Professor, Department of CSE Sahyadri College of Engineering and Management Chaya D Lecturer, Department of CSE H.M.S

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Algorithms for Minimum m-connected k-dominating Set Problem

Algorithms for Minimum m-connected k-dominating Set Problem Algorithms for Minimum m-connected k-dominating Set Problem Weiping Shang 1,2, Frances Yao 2,PengjunWan 3, and Xiaodong Hu 1 1 Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing, China

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

Energy-efficient routing algorithms for Wireless Sensor Networks

Energy-efficient routing algorithms for Wireless Sensor Networks Energy-efficient routing algorithms for Wireless Sensor Networks Chao Peng Graduate School of Information Science Japan Advanced Institute of Science and Technology March 8, 2007 Presentation Flow Introduction

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

Distributed Data Aggregation Scheduling in Wireless Sensor Networks

Distributed Data Aggregation Scheduling in Wireless Sensor Networks Distributed Data Aggregation Scheduling in Wireless Sensor Networks Bo Yu, Jianzhong Li, School of Computer Science and Technology, Harbin Institute of Technology, China Email: bo yu@hit.edu.cn, lijzh@hit.edu.cn

More information

New Data Clustering Algorithm (NDCA)

New Data Clustering Algorithm (NDCA) Vol. 7, No. 5, 216 New Data Clustering Algorithm () Abdullah Abdulkarem Mohammed Al-Matari Information Technology Department, Faculty of Computers and Information, Cairo University, Cairo, Egypt Prof.

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University

More information

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Dual Power Management for Network Connectivity in Wireless Sensor Networks Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless Sensor Network System

Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless Sensor Network System 6th WSEAS International Conference on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, Dec 29-31, 2007 489 Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

Wireless Sensor Networks, energy efficiency and path recovery

Wireless Sensor Networks, energy efficiency and path recovery Wireless Sensor Networks, energy efficiency and path recovery PhD dissertation Anne-Lena Kampen Trondheim 18 th of May 2017 Outline Introduction to Wireless Sensor Networks WSN Challenges investigated

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.934

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

The Firecracker Protocol

The Firecracker Protocol The Firecracker Protocol Philip Levis and David Culler {pal,culler}@eecs.berkeley.edu EECS Department University of California, Berkeley Berkeley, CA 94720 ABSTRACT We propose the Firecracker protocol

More information

The Emergence of Networking Abstractions and Techniques in TinyOS

The Emergence of Networking Abstractions and Techniques in TinyOS The Emergence of Networking Abstractions and Techniques in TinyOS CS295-1 Paper Presentation Mert Akdere 10.12.2005 Outline Problem Statement & Motivation Background Information TinyOS HW Platforms Sample

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Deluge: Data Dissemination for Network Reprogramming at Scale

Deluge: Data Dissemination for Network Reprogramming at Scale Deluge: Data Dissemination for Network Reprogramming at Scale Adam Chlipala, Jonathan Hui, Gilman Tolle University of California at Berkeley Computer Science Division Berkeley, CA 9472 {adamc,jwhui,get}@cs.berkeley.edu

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE 802.15.4 FOR WIRELESS SENSOR NETWORK Kamaljit Singh 1, Dr. Sukhvinder Singh Bamber 2, Aman Kaushik 3 1 M.Tech,CSE Department, Baddi University of Emerging

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation

Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation Rajesh Krishna Panta Saurabh Bagchi Samuel P. Midkiff Dependable Computing Systems

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information