Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks*

Size: px
Start display at page:

Download "Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks*"

Transcription

1 Wreless Sensor Network, 2010, 2, do: /wsn Publshed Onlne July 2010 ( Contenton-Based Beaconless Real-Tme Routng Protocol for Wreless Sensor Networks* Abstract Chao Huang, Guol Wang School of Informaton Scence & Technology, Sun Yat-Sen Unversty, Guangzhou, Chna E-mal: Receved Aprl 12, 2010; revsed May 4, 2010; accepted May 17, 2010 Ths paper presents a novel real-tme routng protocol, called CBRR, wth less energy consumpton for wreless sensor networks (s). End-to-End real-tme requrements are fulflled wth speed or delay constrant at each hop through ntegratng the contenton and neghbor table mechansms. More precsely, CBRR mantans a neghbor table va the contenton mechansm beng dependent on wreless broadcast nstead of beacons. Comprehensve smulatons show that CBRR can not only acheve hgher performance n statc networks, but also work well for dynamc networks. Keywords: Wreless Sensor Network, Real-Tme Routng Protocol, Contenton-Based Scheme, Beaconless 1. Introducton s are comprsed of tny, low power sensor nodes, whch are densely deployed n a montored area and collaborate to forward the sensed data to a base staton through multple hops. s can be wdely used n many applcatons, such as envronmental montorng, mltary survellance, dsaster recovery, and healthcare related applcatons [1]. However, many msson-crtcal applcatons requre that s can guarantee the satsfed qualty of servce (QoS), especally wth real-tme constrants. e.g., n forest fre detecton, the abnormal temperature nformaton should be delvered to a base staton as soon as possble. Otherwse, the outdated data wll be rrelevant and even have negatve effects on the applcatons. s have partcular features dfferent from other wreless networks [2-4]. Frstly, each sensor node has severe resource constrants on bandwdth, memory, processng capablty, and especally energy. Secondly, the number of sensor nodes s very large and the nodes are always densely deployed. Thrdly, t has been recognzed that the network topologes of s may change constantly due to sleep polcy, node moblty, node falure, and so on. The features mentoned above wll pose challenges to fulfll the real-tme requrements. *Ths work s supported by Nature Scence Foundaton of Chna under Grant and Guangdong Nature Scence Foundaton of Chna under Grant ue to the hgh routng overhead and the poor scalablty of global routng decsons, several real-tme routng protocols [5-7] utlze the localzed geographc nformaton to heurstcally fnd a satsfed path to a target. These protocols are mostly governed by the conventonal geographc routng schemes, n whch each node has to perodcally broadcast beacons for obtanng the accurate nformaton of ts neghbors and to store the nformaton n ts neghbor table for routng decsons. Although the neghbors nformaton can be collected by broadcastng beacons, some drawbacks nevtably arse. Frstly, redundant beacons can lead to more energy consumpton and hgher communcaton cost. Secondly, only one neghbor or very small subset of neghbors can take part n routng decsons, but each node should store all of neghbors nformaton n a neghbor table. Therefore, the utlzaton of a neghbor table s much neffcent, and the unused neghbors nformaton stll occupes some of the lmted memory. Thrdly, when a network topology changes constantly, the collected neghbor nformaton wll be outdated quckly, whch n turn leads to hgher packet mss rato, and nodes should broadcast beacons more frequently to update the neghbor tables. It nevtably ncurs not only longer delay, but also consumes sgnfcant energy. Furthermore, frequently broadcastng beacons can result n more serous collsons thus hgher packet mss rato. Contenton-based beaconless scheme [8-12] has been proposed to handle wth the ssues abovementoned. The man dea s that when a node has a ATA packet to be Copyrght 2010 ScRes.

2 C. HUANG ET AL. 529 transmtted, t frst broadcasts a contenton request, and one neghbor wth the shortest wat delay s selected as the most sutable next-hop forwarder. The contentonbased scheme s completely stateless and reactve because each node can on-lne select an avalable next-hop forwarder wthout any pror knowledge of ts neghbors. Ths results n less energy consumpton. Furthermore, t can be found that the current forwarder can obtan the nformaton of the selected next-hop forwarder durng a contenton procedure. Although the nformaton of the selected neghbor s not utlzed n the scheme, t can beneft to future routng decsons. The character ndcates that the approach for selectng the nformaton of neghborhoods s energy effcent. Ths paper presents a Contenton-based Beaconless Real-tme Routng protocol for s, called CBRR. CBRR ams at fulfllng end-to-end real-tme requrements wth less energy consumpton through ntegratng the contenton and neghbor table mechansms. The advantage of our approach s to remove the lmtatons of the beacon-based routng schemes, especally, n dynamc networks. Three remarkable aspects of CBRR are emphaszed as follows. Frstly, the key to CBRR s that the nformaton n a neghbor table s obtaned through a contenton mechansm wthout beacons, and CBRR employs the contenton mechansm to select a new forwardder only when there s no an avalable neghbor, whch meets the real-tme requrements, n the neghbor table. Secondly, the neghbor table allows CBRR to select a next-hop forwarder by drect uncast or contenton-based forwardng. As a consequence, the end-to-end real-tme requrements can be fulflled wth speed or delay constrant at each hop. Thrdly, CBRR can collect the nformaton from the two-hop neghbors durng the wreless broadcastng, and the two-hop neghbor table can be helpful for further meetng the real-tme requrements n the two-hop range. The rest of the paper s organzed as follows. Secton 2 outlnes the related works. Secton 3 presents the proposed real-tme routng protocol. Secton 4 reports the expermental results. 2. Related Works Recently, real-tme routng protocol has aroused much research nterests n s. SAR [13] was the frst QoS protocol for s. It could fnd multple paths between a source and a target wth dfferent prorty n terms of energy effcency and fault tolerance. EQR [14] tred to fnd a least-cost yet energy effcent path for real-tme data, and to maxmze the throughput for non-real-tme data wth a class-based queue model, smultaneously. However, both SAR and EQR were based on global routng decsons, whch result n much hgher routng overheads. Therefore, localzed geographc routng decsons have been popular employed n a varety of realtme routng protocols. SPEE [5] was desgned to provde soft end-to-end real-tme guaranty wth a desred delvery speed, S setpont, whch could support the real-tme communcaton between a source and a snk, through a combnaton of feedback control and non-determnstc geographc forwardng. Only the node, whose progress speed was hgher than S setpont, could be selected as the next-hop forwarder. MMSPEE [6] was an extenson to SPEE wth addtonal servce dfferentatons both n the tmelness and relablty domans. RPAR [7] fulflled the end-to-end real-tme requrements wth low energy consumpton by dynamcally adaptng transmsson power and assgnng one-hop velocty. Unfortunately, these localzed routng protocols had to broadcast beacons to collect the neghbors nformaton and were nevtably suffered from the aforementoned drawbacks. Contenton-based beaconless scheme has been developed to address the ssues aforementoned. IGF [8] only allowed the nodes wthn the 60-degree sector towards the snk to partcpate n the contenton. The wat delay of each avalable node was determned by the combnaton of the progress dstance to a snk, the remanng energy of the node and a random delay. GeRaF [9,10] used the busy tone to avod collsons and replaced the wat delay functon by tme slots, whch were assgned to dfferent regons of forwardng areas. SGF [11] ntroduced a forwardng scheme through ntegratng the contenton mechansm and gradent for unexpected node/lnk falures n hghly dynamc networks. OGF [12] combned the contenton mechansm wth a neghbor table to forward packets n slowly dynamc networks. OGF was smlar to our approach, but t dd not consder the real-tme constrants. 3. Man Results Our desgn goal s to fulfll the end-to-end real-tme requrements wth less energy consumpton for s. Two versons of CBRR protocol are proposed, such as CBRR-OneHop and CBRR-TwoHop, whch are based on one-hop neghbor table and two-hop neghbor table, respectvely. CBRR-OneHop protocol s the foundaton of CBRR, and CBRR-TwoHop protocol s an extenson to CBRR-OneHop. Before descrbng CBRR protocol, we frst ntroduce the relevant defntons and assumptons efntons and Assumptons enote source node and snk node as S and. Let d(, j) j and elay be the Eucldean dstance and the delay between node and node j, respectvely. eadlne() s the requred deadlne of a ATA packet for and s Copyrght 2010 ScRes.

3 530 C. HUANG ET AL. carred n the header of the ATA packet. R c s the rado range. Neghbor Set of Node : NS s the set of nodes wthn the rado range of node. Formally, NS { j d(, j) R c }. Contenton Canddate Set of Node : CCS s the set of nodes whch are n NS and closer to than node. Formally, CCS { j d(, ) d( j, ), j NS }. j Relay Speed: Speed s the velocty between node and j, whch s the rato of the dstance to the delay between node and j. Formally, Speed d(, j)/ elay j j. Requred Speed: Speed s the velocty, whch meets the real-tme requrements. It s the rato of the dstance between node and to the remanng tme of a ATA packet s deadlne. Formally, Speed d(, )/ ( eadlne( ) T now ), where T now s the current tme. Estmated Hop: Hop s the estmated hop number between node and, whch s the rato of the dstance between node and to R c. Formally, Hop d(, )/ R c. Requred elay: elay s the one-hop delay, whch meets the real-tme requrements. It s the rato of the remanng tme of the packet s deadlne to the estmated hop. Formally, elay ( eadlne( ) T )/ Hop. Speed Constrant: Speed constrant s used for each node to fnd an avalable neghbor, whose relay speed s no less than the requred speed, n ts neghbor table. If havng an avalable neghbor, the node can send the ATA packet to the neghbor by drect uncast. Otherwse, the node has to nvoke a contenton procedure to select a new next-hop forwarder. elay Constrant: elay constrant s used for each node to determne whether ts contenton canddates can take part n the contenton or not. If there s an avalable neghbor, whose one-hop delay s no less than the requred delay, n the neghbor table of the contenton canddate, ths canddate can be admtted to partcpate n the contenton. Otherwse, the canddate s forbdden to do that. Assume that each node s aware of ts poston, and t has the same rado range and ntal energy wth a unque I and an out-of-band busy tone. now cton wth wat delay, delay estmaton and one-hop neghbor table, whch s created or updated only durng a contenton procedure. When a source ntends to send ts frst ATA packet, the node has to employ the contenton forwardng polcy to select a next-hop forwarder because the neghbor table of each node has not been created. After the frst ATA packet s successfully forwarded to the snk, each node, whch s on the prevous forwardng path, has at least one neghbor n ts one-hop neghbor table. Therefore, the frst ATA packet can be regarded as a specal packet for the path dscovery. In the future forwardng, the one-hop neghbor table can play an mportant role to help wth selectng an avalable next-hop forwarder, whch meets the speed constrant or delay constrant, by the uncast forwardng polcy or the contenton forwardng polcy. Uncast Forwardng Polcy As shown n Fgure 1, the uncast forwardng polcy can utlze the speed constrant to determne that a ATA packet s forwarded by drect uncast or nvokng the contenton forwardng polcy. If the neghbor table has an avalable neghbor, whch meets the speed constrant, the current forwarder selects the neghbor as the next-hop forwarder and uncasts the ATA packet to the neghbor drectly. Otherwse, the current forwarder has to nvoke the contenton forwardng polcy to select a new next-hop forwarder. Contenton Forwardng Polcy If the uncast forwardng polcy fals to uncast a A- TA packet, the contenton forwardng polcy can employ ERTS-ECTS-ATA-ACK handshake to select a new next-hop forwarder. The delay constrant s used to determne whether a contenton canddate can take part n the contenton or not. ERTS s an extenson to RTS wth addtonal nformaton ncludng the postons of the current forwarder and the snk, and the requred delay CBRR-OneHop Protocol CBRR-OneHop protocol s the foundaton of CBRR, and t conssts of fve components, such as uncast forwardng polcy, contenton forwardng polcy, contenton fun- Fgure 1. Uncast forwardng procedure. Copyrght 2010 ScRes.

4 C. HUANG ET AL. 531 ECTS s also an extenson to CTS wth addtonal poston of CTS s sender. Busy tone s an out-of-band sgnal whch s used to avod multple canddates takng part n the contenton, smultaneously. The current forwarder and ts contenton canddates work as follows. As shown n Fgure 2, the current forwarder frst broadcasts an ERTS packet to start a contenton, and then wats for recevng an ECTS packet. If overhearng the ECTS packet, the current forwarder should send a busy tone mmedately, and contnues recevng the ECTS packet. After fnshng recevng the ECTS, the current forwarder can uncast the ATA packet to the selected next-hop forwarder drectly. When the current forwarder fnshes recevng the ACK packet sent by the next-hop forwarder, t nserts the nformaton of the new forwarder ncludng the I, poston and one-hop delay, or updates the one-hop delay, n ts neghbor table. If the current forwarder fals to select a next-hop forwarder, t just dscards the ATA packet. The contenton canddate s contenton procedure s shown n Fgure 3. After recevng the ERTS packet, each contenton canddate has to determne whether to partcpate n the contenton or not accordng to ts one-hop neghbor table. If ts neghbor table has an avalable neghbor, whch meets the speed constrant, the canddate can be assgned hgher contenton prorty wth short wat delay, T short. If none of the neghbors n ts one-hop neghbor table can meet the speed constrant, the canddate s forbdden to take part n the contenton. Otherwse, f the neghbor table s empty, whch means that the canddate has never been the forwarder, the canddate s also admtted to take part n the contenton but wth long wat delay, T long. The canddate wth the shortest wat delay can frst respond an ECTS packet thus to wn the qualfcaton of the new forwarder. Other canddates, whch receve the busy tone durng ther wat delay, must qut the contenton mmedately. When fnshng recevng the ATA packet, the new forwarder should respond an ACK packet to the current forwarder. Fgure 2. Current forwarder s workng procedure. Fgure 3. Contenton canddate s contenton procedure. It needs to be ponted out that although the delay constrant never takes the wat delay nto account, t does not affect the real-tme performance because the selected neghbor s the most sutable forwarder, whch has the shortest wat delay. Contenton Functon and Wat elay Contenton functon s the key factor to the contenton-based beaconless scheme because t determnes the wat delay of each contenton canddate. ue to real-tme constrant and energy effcency, our contenton functon takes nto account the combnaton of the progress dstance toward a snk, the remanng energy of the node and the number of packets watng n the output queue. For node, ts contenton prorty s computed as follows. P ( q ( d / Rc E / Et q / Qt r) (1) where P s the contenton prorty; d s the progress dstance towards a snk; E s the remanng energy and E t s the ntal total energy; q s the number of packets watng n the queue and Q t s the total queue sze; r s a random value between 0 and 1; α, β, γ and η are weghts assgned to dstance, energy, queue and random value, respectvely, and meet α + β + γ + η = 1. Usng the contenton functon, we can calculate the wat delay of T short and T long as follows. T SIFS 0.5 SIFS(1 P ) (2) short T SIFS SIFS(1 P ) (3) short where SIFS s Short Inter Frame Spacng and s defned as 10 μs n IEEE standard [15]. From (2) and (3), t can be guaranteed that T short s smaller than T long. elay Estmaton elay estmaton s responsble to calculate the one- Copyrght 2010 ScRes.

5 532 C. HUANG ET AL. hop delay between two neghborhoods. The current onehop delay s evaluated based on two tmestamps. One s the tme T arrvng when the receved ATA packet enters the tal of the output queue. Another s the tme T ACK when the node receves the ACK packet responded by the next-hop forwarder. The tme nterval between these two tmestamps s employed to characterze the one-hope delay here. The new one-hop delay can be calculated by the combnaton of the currently measured delay and the prevous one-hop delay as follows. onehop onehop elay new ( TACK Tarrvng ) (1 ) elay prevous (4) One-Hop Neghbor Table As shown as n Table 1, NeghborI and Neghbor- Poston are obtaned through an ECTS packet; One- Hopelay can be computed from (4). Counter s used to record how many tmes a neghbor has been a next-hop forwarder. One-hop Neghbor table s managed as follows. 1) If the newly selected forwarder s not n the neghbor table, the current forwarder has to add the nformaton of the new forwarder n ts neghbor table after recevng the ACK packet sent by the new forwarder. Otherwse, the current forwarder needs to update the One- Hopelay of the neghbor n ts neghbor table. 2) If the Counter n the entry of a neghbor s up to MaxCount, the neghbor s forbdden to take part n the current forwardng, and ts Counter should be cleared to zero. MaxCount s the maxmal tmes that a node can be a next-hop forwarder. If the network topology s stable, a neghbor n the neghbor table can always be vald so as to be the next-hop forwarder contnuously. In ths case, the node not only consumes away ts energy quckly, but also deprves other neghbors of beng a next-hop forwarder. Therefore, MaxCount s used to balance the network load thus to prolong the lfetme of s CBRR-TwoHop Protocol CBRR-TwoHop protocol s an extenson to CBRR-One- Hop protocol. It can depend on wreless broadcast to collect the nformaton of the two-hop neghborhoods for buldng two-hop neghbor table. Wth the help of twohop neghbor table, CBRR-TwoHop s able to further meet the real-tme requrements n the two-hop range. Two-Hop elay Estmaton As shown n Fgure 4, node A, B and C are regarded as the last-hop forwarder, the current forwarder and the next-hop forwarder, respectvely. Whle node B uncastng a ATA packet to node C, node A can also overhear the ATA packet, whch carres the poston nformaton of node C. In order to obtan the two-hop delay, each node needs to create a Sent_ATA table for recordng the ATA packets, whch have been sent by the node successfully. As shown n Table 2, the record of a ATA packet ncludes the tems of source s I, sequence number and Receved_Tme, whch s the tmestamp that the ATA packet enters the tal of the output queue. Wth the help of the Sent_ATA table, the two-hop delay estmaton between node A and C can be obtaned as follows. 1) After recevng the ACK packet sent by node B, node A needs to add the relevant nformaton of the ATA packet, whch has been sent to node B prevously, n ts Sent_ATA table. 2) Whle node B uncastng a ATA packet to node C, node A can overhear the packet so as to look up ts Sent_ATA table to see f A has sent ths ATA packet prevously. If true, the current two-hop delay between node A and C s approxmated by the nterval between the Receved_Tme n A s Sent_ATA table and the tme T now when node B fnshes transmttng the ATA packet to node C. After estmatng, node A needs to delete the entry of ths ATA packet from ts Sent_ATA table for reducng the storage overhead. However, f the ATA packet s not n the Sent_ATA table, node A has to gnore the packet and to do nothng. We also compute the new two-hop delay by the combnaton of the currently measured delay and the prevous two-hop delay as follows. elay ( T T ) (1 ) elay twohop twohop new now Re ceved _ Tme prevous (5) Two-Hop elay Estmaton The two-hop neghbor table extends the one-hop neghbor table wth addtonal nformaton of the two-hop neghbor ncludng I, poston and two-hop delay, as Table 1. Structure of one-hop neghbor table. NeghborI NeghborPoston OneHopelay Counter Table 2. Structure of Sent_ATA table. SourceI SequenceNo. Receved_Tme A ATA B ATA Fgure 4. An example of wreless broadcast. C Copyrght 2010 ScRes.

6 C. HUANG ET AL. 533 shown n Table 3. The I and poston of the two-hop neghbor are obtaned through a ATA packet, and Two- Hop elay can be computed from (5). Other tems are the same as those n one-hop neghbor table. It should be noted that f a node fals to select a nexthop forwarder, the node maybe encounters a vod around t. In ths case, the node wll not uncast the receved ATA packet, and ts last-hop forwarder can never overhear the packet. As a result, the nformaton of the two-hop neghbor should be null n the two-hop neghbor table of the last-hop forwarder. For avodng more nvald contentons, f the two-hop table has more than two records, whch have null nformaton of the two-hop neghbor, the node maybe has a serous vod problem n ts two-hop range thus to be forbdden to take part n the latter contentons. Forwardng polcy The forwardng polcy of CBRR-TwoHop s smlar to that of CBRR-OneHop. The dfference s that CBRR- TwoHop needs to employ the speed constrant between the two-hop neghborhoods. If there s a one-hop neghbor, whch the two-hop relay speed between the current forwarder and the two-hop neghbor s no less than the requred two-hop speed, n the two-hop neghbor table, the current forwarder can uncast the ATA packet to the one-hop neghbor drectly. Otherwse, the current forwarder has to nvoke the contenton forwardng polcy wth the two-hop delay constrant to select a next-hop forwarder. 4. Expermental Studes To valdate the CBRR protocol proposed n the paper, CBRR-OneHop and CBRR-TwoHop are compared wth SPEE. Expermental studes are conducted by means of J-Sm smulator [16], whch s an open-source, component-based network smulaton envronment and s developed entrely n Java. OneHop I Table 3. Structure of two-hop neghbor table. OneHop Poston OneHop elay TwoHop I TwoHop Poston TwoHop elay Table 4. Parameters for experments. Counter Parameter Values Parameter Values Network Sze 200m 200m MAC Layer Node Number 200 Intal Energy 100 J Rado Range 40 m Bandwdth 2 Mbps Packet Sze 512 bytes Send/Receve/Idle power(mw) 660/395/ Smulaton Settng We randomly choose four source nodes n the left of network, and two snk nodes n the rght of network. We test the above protocols n two network topologes: Statc network, where the topology s nvarable ncludng packet generaton rate and node densty scenaros. ynamc network, where the topology s changeable due to node moblty or sleep polcy. We choose constant bt rate (CBR) traffc and set CBR at 2 packets/s n all experments except n the packet generaton rate scenaro. Unless specally noted, all parameters for experments are set as shown n Table Performance n Statc Networks In statc networks, the poston of each node s not changeable. Therefore, we set the nterval of beacon broadcast at 10 s n SPEE. Two scenaros are evaluated n the statc networks ncludng packet generaton rate and packet sze. Impact of packet generaton rate The comparatve results between CBRR and SPEE are plotted n Fgure 5. It can be seen that the both CBRR protocols acheve nearly 100% delvery rato (Fgure 5(a)) and stable end-to-end delay around 0.05s (Fgure 5(b)). All these n CBRR contrbute to the Routng/MAC cross-layer desgn, whch can tmely collect the state nformaton of wreless channel thus to avod more collsons durng the forwardng procedures. In contrast, hgher packet generate rate may brng forth more packet collsons thus lead to hgher packet mss rato (Fgure 5(a)) and longer delay (Fgure 5(b)) n SPEE. In Fgure 5(c), SPEE consumes the average energy about two tmes more than those of the two CBRR protocols due to ts beacon broadcastng. It s worth notng that the average energy consumpton of each protocol decreases slowly as the packet generaton rate ncreasng. The reason s that when the packet generaton rate s small, most nodes are always kept n dle state, whose energy consumpton s the man part of the total consumed energy. However, more and more packets have been forwarded thus can lead to lower average energy consumpton as the generate rate ncreasng. Furthermore, Fgure 5 llustrates that the overall performance of CBRR-TwoHop s lttle better than that of CBRR-OneHop because the two-hop neghbor table can be helpful for further meetng the real-tme requrements n the two-hop range. Impact of packet sze Larger ATA packets may lead to hgher probablty of the collsons between a ATA packet and other packets, such as RTS/ERTS, CTS/ECTS, ACK or beacon. Fgure 6 llustrates the comparatve results between Copyrght 2010 ScRes.

7 534 C. HUANG ET AL. CBRR and SPEE n the packet sze scenaro. It can be observed n Fgure 6(a) that the delvery rato of SPEE elvery Rato SPEE CBRR-OneHop CBRR-TwoHop CBR (packets/s) (a) Packet elvery Rato (a) Packet elvery Rato (b) Average End-to-End elay (b) Average End-to-End elay (c) Average Energy Consumpton Fgure 6. Impact of packet sze. (c) Average Energy Consumpton Fgure 5. Impact of packet generaton rate. drops quckly as the packet sze ncreasng, but the packet sze has very lttle mpact on the two CBRR pro- Copyrght 2010 ScRes.

8 C. HUANG ET AL. 535 tocols for ther nearly 100% delvery rato. The results may ndcate that the collsons between ATA packets and beacons are much more severe than others between ATA and RTS/ERTS, CTS/ECTS or ACK packets. As a result, wth larger packet sze, more serous packet collsons can lead to longer end-to-end delay (Fgure 6(b)) and more energy consumpton (Fgure 6(c)) than those of the two CBRR protocols. It can be vewed from above expermental results that the two CBRR protocols have much better performance than SPEE n the statc networks. Furthermore, CBRR- TwoHop can outperform than other two protocols due to the help of the two-hop neghbor table, whch can be helpful for further meetng the real-tme requrements n the two-hop range. In addton, t can also be suggested that broadcastng beacons can aggravate the packet collsons thus to degrade the performance of the beaconbased routng protocols Performance n ynamc Networks s are hghly dynamc networks and ther topologes can change constantly due to node moblty, sleep polcy, node falure, and so on. In the followng experments, we compare CBRR wth SPEE n node moblty and sleep polcy scenaros. In addton, we set the frequency of broadcastng beacons at 1 s and 10 s, respectvely, for SPEE to tmely collect fresh nformaton of the neghborhoods. Impact of node moblty We adopt the Random Waypont moblty model wth zero pause tme n the experment. Fgure 7 plots the comparatve results between the two CBRR protocols and SPEE n the node moblty scenaro. Fgure 7(a) llustrates that the delvery rato of SPEE drops much more quckly, whch shows that SPEE can hardly work when the moble speed s hgher than 10 m/s. Ths s because the nformaton of the neghbor table s totally outdated thus to be useless for the forwardng. In contrast, although the two CBRR protocols drop more packets at hgher moble speed, they can stll acheve about 60% delvery rato at 20 m/s n contrbuton to the contenton forwardng polcy, whch can on-lne select a favorte next-hop forwarder. It can be observed n Fgure 7(b) that the average end-to-end delay of SPEE becomes much nstable for ts extremely hgh packet mss rato. However, at hgher node moblty, the both CBRR protocols have lttle longer delay due to the falure of drect uncast. Fgure 7(c) shows that the two CBRR protocols have very close performance, whch consume far less energy than SPEE. It needs to pont out that we set 100 as the maxmum n Fgure 7(c), and the values of SPEE, whch s plotted as 100, are actually more than 100. Furthermore, t can be observed n Fgure 7 that the performance of SPEE-1 s no better than that of SPEE-10, whch suggests that hgher frequency of beacon broadcastng can not mprove the performance of SPEE n the node moblty scenaro. (a) Packet elvery Rato (b) Average End-to-End elay (c) Average Energy Consumpton Fgure 7. Impact of node moblty. Copyrght 2010 ScRes.

9 536 C. HUANG ET AL. Impact of sleep polcy In order to support energy conservaton n s, the most practcal way s to use node sleep polcy. Our sleep polcy s desgned as that the lfetme of each node s dvded nto several same perods, and each perod ncludes an actve sub-perod and a sleep sub-perod. Fgure 8 plots the comparatve results between the two CBRR protocols and SPEE n the dynamc sleep polcy scenaro. Smlar to the node moblty scenaro, the sleep polcy has far more negatve mpact on SPEE than those on the two CBRR protocols. The mpact can be observed n Fgure 8(a) that f the sleep percentage s larger than 50%, the delvery rato of SPEE s approxmate 0. The reason s that the next-hop forwarder, whch s selected by SPEE n the neghbor table, would be usually n sleep state, and SPEE needs to retransmt more packets. However, the both CBRR protocols acheve more than 90% n delvery rato at 50% sleep percentage. Although droppng more packets after 50%, the two CBRR protocols stll outperforms SPEE very much. Other results are smlar to those n the node moblty scenaro as shown n Fgure 8(b) and Fgure 8(c). (c) Average Energy Consumpton Fgure 8. Impact of sleep polcy. It can be concluded from the above expermental results that CBRR s not only partcularly sutable for the dynamc networks, but also has far well performance than SPEE n the statc scenaros wth much less energy consumpton. Furthermore, t can be observed that CBRR-TwoHop outperforms the other two protocols due to the help of the two-hop neghbor table. It also suggests that SPEE s totally not sutable for the dynamc networks, and ncreasng the frequency of beacon broadcastng can not mprove but degrade the performance of the beacon-based routng protocols. 5. Conclusons (a) Packet elvery Rato Ths paper presents a novel real-tme routng protocol, CBRR, for s. The pont dstngushng our approach from the exstng schemes s that CBRR collects the nformaton of neghborhoods by the contenton mechansm nstead of beacons. Ths contrbuton can lead to more energy effcency. In addton, t s notable that the end-to-end real-tme requrements are well fulflled wth speed or delay constrant at each hop, whch attrbutes to the combnaton of the contenton and neghbor table mechansms. The valdty of CBRR s llustrated by means of expermental studes. It has been shown that CBRR can outperform SPEE n terms of delvery rato, end-toend delay and energy consumpton, especally n dynamc networks. Our future work s to conduct the theoretcal analyss on the energy consumpton of CBRR. It s also nterested to nvestgate how to provde relablty n CBRR. 6. References (b) Average End-to-End elay [1] I. F. Akyldz, W. Su, Y. Sankarasubramanam and E. Cayrc, Wreless Sensor Networks: A Survey, Computer Networks, Vol. 38, No. 4, March 2002, pp Copyrght 2010 ScRes.

10 C. HUANG ET AL. 537 [2]. Z. Cheng and P. K. Varshney, QoS Support n Wreless Sensor Networks: A Survey, Internatonal Conference on Wreless Networks (ICWN 04), LasVegas, Vol. 1, June 2004, pp [3] Y. J. L, C. S. Chen, Y. Q. Song and Z. Wang, Realtme QoS Support In Wreless Sensor Networks: A Survey, Proceedngs of Seventh IFAC Internatonal Conference on Feldbuses and Networks n Industral and Embedded Systems, Toulouse, November 2007, pp [4] M. Youns, K. Akayya and A. Wadaa, On Handlng QoS Traffc n Wreless Sensor Networks, Proceedngs of the 37th Annual Hawa Internatonal Conference on System Scences, Hawa, January 2004, pp [5] T. He, J. A. Stankovc, C. Y. Lu and T. F. Abdelzaher, A Spatotemporal Communcaton Protocol for Wreless Sensor Networks, IEEE Transacton on Parallel strbuted Systems, Vol. 16, No. 10, October 2005, pp ,. [6] E. Felemban, C. G. Lee and E. Ekc, MMSPEE: Multpath Mult-SPEE Protocol for QoS Guarantee of Relablty and Tmelness n Wreless Sensor Networks, IEEE Transactons on Moble Computng, Vol. 5, No. 6, June 2006, pp [7] O. Z. Chpara, Z. M. He, G. L. Xng, Q. Chen and X. R. Wang, Real-Tme Power-Aware Routng n Sensor Networks, Proceedngs of 14th IEEE Internatonal Workshop on Qualty of Servce (IWQoS 2006), New Haven, June 2006, pp [8] T. He, B. M. Blum, Q. Cao, J. A. Stankovc, S. H. Son and T. F. Abdelzaher, Robust and Tmely Communcaton over Hghly ynamc Sensor Networks, Real-Tme Systems, Vol. 37, No. 3, ecember 2007, pp [9] M. Zorz and R. R. Rao, Geographc Random Forwardng (GeRaF) for Ad Hoc and Sensor Networks: Energy and elay Performance, IEEE Transactons on Moble Computng, Vol. 2, No. 4, October-ecember 2003, pp [10] M. Zorz and R. R. Rao, Geographc Random Forwardng (GeRaF) for Ad Hoc and Sensor Networks: Multhop Performance, IEEE Transactons on Moble Computng, Vol. 2, No. 4, October-ecember 2003, pp [11] P. Huang, H. Y. Chen, G. L. Xng and Y.. Tan, SGF: A State-Free Gradent-Based Forwardng Protocol for Wreless Sensor Networks, ACM Transacton on Sensor Networks, Vol. 5, No. 2, March 2009, pp [12]. Z. Chen and P. K. Varshney, On-emand Geographc forwardng for ata elvery n Wreless Sensor Networks, Computer Communcatons, Vol. 30, No , October 2007, pp [13] K. Sohrab, J. Gao, V. Alawadh and G. J. Potte, Protocols for Self-Organzaton of a Wreless Sensor Network, IEEE Personal Communcatons, Vol. 7, No. 5, October 2000, pp [14] K. Akkaya and M. Youns, Energy-Aware QoS Routng n Wreless Sensor Networks, Cluster Computng, Vol. 8, No. 2-3, July 2005, pp [15] IEEE Standard for Wreless LAN Medum Access Control (MAC) and Physcal Layer (PHY) Specfcatons, ISO/IEC : 1999(E), IEEE, August [16] RCL J-Sm, Copyrght 2010 ScRes.

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks Internatonal Conference on Dstrbuted Computng Systems ICDCS 2003 : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A Spatiotemporal Communication Protocol for Wireless Sensor Networks

A Spatiotemporal Communication Protocol for Wireless Sensor Networks IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-0195-1003.R2 1 A Spatotemporal Communcaton Protocol for Wreless Sensor Networks Tan He, Member, IEEE, John A. Stankovc, Fellow, IEEE, Chenyang

More information

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Energy and QoS aware Routing in Wireless Sensor Networks

Energy and QoS aware Routing in Wireless Sensor Networks Energy and QoS aware Routng n Wreless Sensor Networks Kemal Akkaya and Mohamed Youns Department of Computer Scence and Electrcal Engneerng Unversty of Maryland, Baltmore County Baltmore, MD 225 kemal youns@cs.umbc.edu

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments

More information

The Hybrid Mobile Wireless Sensor Networks for Data Gathering

The Hybrid Mobile Wireless Sensor Networks for Data Gathering The Hybrd Moble Wreless Sensor Networks for Data Gatherng Bao Ren Bejng Unv. of Posts & Telecommuncatons, Bejng 876, Chna +86--62287 renb@bupt.edu.cn Jan Ma Noka Research Center, Bejng 3, Chna +86--65392828-2883

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

QoS Aware Inter-Cluster Routing Protocol for IEEE Networks

QoS Aware Inter-Cluster Routing Protocol for IEEE Networks 215 17th UKSIM-AMSS Internatonal Conference on Modellng and Smulaton QoS Aware Inter-Cluster outng Protocol for IEEE 82.15.4 Networks Ahmed Ben Saleh Dept. Computer Scence &IT Unversty of Bsha Bsha K.

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Solutions for Real-Time Communication over Best-Effort Networks

Solutions for Real-Time Communication over Best-Effort Networks Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e

More information

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

A Reliable and Real-Time AggregationAaware Data Dissemination in a Chain- Based Wireless Sensor Network

A Reliable and Real-Time AggregationAaware Data Dissemination in a Chain- Based Wireless Sensor Network SENSORCOMM 2012 : The Sxth Internatonal Conference on Sensor Technologes and Applcatons A Relable and Real-Tme AggregatonAaware Data Dssemnaton n a Chan- Based Wreless Sensor Network Zahra Taghkhak, Nrvana

More information

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

Applied Mathematics. Elixir Appl. Math. 84 (2015)

Applied Mathematics. Elixir Appl. Math. 84 (2015) 3341 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) 3341-3349 Avalable onlne at www.elxrpublshers.com (Elxr Internatonal Journal) Appled Mathematcs Elxr Appl. Math. 84 (015) 3341-3349 Bayesan Inference

More information

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMC.25.2388476, IEEE Transactons

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Research Article QPRD: QoS-Aware Peering Routing Protocol for Delay-Sensitive Data in Hospital Body Area Network

Research Article QPRD: QoS-Aware Peering Routing Protocol for Delay-Sensitive Data in Hospital Body Area Network Moble Informaton Systems Volume 15, Artcle ID 153232, 16 pages http://dx.do.org/1.1155/15/153232 Research Artcle : QoS-Aware Peerng Routng Protocol for Delay-Senstve Data n Hosptal Body Area Network Zahoor

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

Adaptive Power-Aware Prefetch in Wireless Networks

Adaptive Power-Aware Prefetch in Wireless Networks Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks www.hurray.sep.pp.pt Techncal Report -GAME: An Implct GTS Allocaton Mechansm n IEEE 802.15.4 for Tme- Senstve Wreless Sensor etworks Ans Koubaa Máro Alves Eduardo Tovar TR-060706 Verson: 1.0 Date: Jul

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

A Fair MAC Algorithm with Dynamic Priority for e WLANs

A Fair MAC Algorithm with Dynamic Priority for e WLANs 29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong

More information

A Thesis Submitted by R.SUMATHI. for the award of the degree of. DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE AND ENGINEERING

A Thesis Submitted by R.SUMATHI. for the award of the degree of. DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE AND ENGINEERING DEVELOPMENT AND ANALYSIS OF DISTINCT ENERGY-EFFICIENT ROUTING PROTOCOLS FOR LOAD BALANCING, SERVICE DIFFERENTIATION, QoS ASSURANCE AND LOCALIZATION IN WIRELESS SENSOR NETWORKS A Thess Submtted by R.SUMATHI

More information

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks 414 The Internatonal Arab Journal of Informaton Technology, Vol. 8, No. 4, October 011 Dstrbuted Grd based Robust Clusterng Protocol for Moble Sensor Networks Shahzad Al and Sajjad Madan Department of

More information

On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks Sensors 2015, 15, 14016-14044; do:10.3390/s150614016 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journal/sensors Artcle On Desgnng Thermal-Aware Localzed QoS Routng Protocol for n-vvo Sensor Nodes n

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Impact of the Parameterization of IEEE Medium Access Layer on the Consumption of ZigBee Sensor Motes

Impact of the Parameterization of IEEE Medium Access Layer on the Consumption of ZigBee Sensor Motes UBICOMM 21 : The Fourth Internatonal Conference on Moble Ubqutous Computng, Systems, Servces and Technologes Impact of the Parameterzaton of IEEE 82.15.4 Medum Access Layer on the Consumpton of ZgBee Sensor

More information

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks Dynamc Bandwdth Allocaton Schemes n Hybrd TDM/WDM Passve Optcal Networks Ahmad R. Dhan, Chad M. Ass, and Abdallah Sham Concorda Insttue for Informaton Systems Engneerng Concorda Unversty, Montreal, Quebec,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

IEEE n Aggregation Performance Study for the Multicast

IEEE n Aggregation Performance Study for the Multicast IEEE 802.11n Aggregaton Performance Study for the Multcast Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour To cte ths verson: Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour. IEEE 802.11n Aggregaton

More information

FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks

FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks Int l J. of Communcatons, etwork and System Scences, 2011, 4, 403-415 do:10.4236/jcns.2011.46048 Publshed Onlne June 2011 (http://www.scrp.org/journal/jcns) FEAR: Fuzzy-Based Energy Aware Routng Protocol

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks Abstract: nergy effcent predcton clusterng algorthm for multlevel heterogeneous wreless sensor networks Tang Lu a,b,c,* Jan Peng b,c Jn Yang d Chunl Wang e a College of Fundamental ducaton, Schuan Normal

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives Wreless Sensor Network, 2009, 1, 358-364 do:10.4236/wsn.2009.14044 Publshed Onlne November 2009 (http://www.scrp.org/ournal/wsn). An Energy-Effcent MAC Protocol for s: Game-Theoretc Constrant Optmzaton

More information

Priority Enabled Transport Layer Protocol for Wireless Sensor Network

Priority Enabled Transport Layer Protocol for Wireless Sensor Network 2010 IEEE 24th Internatonal Conference on Advanced Informaton Networkng and Applcatons Workshops Prorty Enabled Transport Layer Protocol for Wreless Sensor Network 1 Atf Sharf, 2 Vdyasagar Potdar Dgtal

More information

Delay Analysis and Time-Critical Protocol Design for In-Vehicle Power Line Communication Systems

Delay Analysis and Time-Critical Protocol Design for In-Vehicle Power Line Communication Systems Delay Analyss and Tme-Crtcal Protocol Desgn for In-Vehcle Power Lne Communcaton Systems Zhengguo Sheng, Daxn Tan, Vctor C.M. Leung and Gaurav Bansal Abstract Wth the emergng automated tasks n vehcle doman,

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information