Energy Consumption Model and Measurement Results for Network Coding-enabled IEEE Meshed Wireless Networks

Size: px
Start display at page:

Download "Energy Consumption Model and Measurement Results for Network Coding-enabled IEEE Meshed Wireless Networks"

Transcription

1 202 IEEE 7th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) Energy Consumption Model and Measurement Results for Network Coding-enabled IEEE 802. Meshed Wireless Networks Achuthan Paramanathan, Ulrik W. Rasmussen, Martin HundeblZlll, Stephan A. Rein, Frank H.P. Fitzek Aalborg University, Department of Electronic Systems Gerg6 Ertli acticom GmbH, Germany Abstract-This paper presents an energy model and energy measurements for network coding enabled wireless meshed networks based on IEEE 802. technology. The energy model and the energy measurement testbed is limited to a simple Alice and Bob scenario. For this toy scenario we compare the energy usages for a system with and without network coding support. While network coding reduces the number of radio transmissions, the operational activity on the devices due to coding will be increased. We derive an analytical model for the energy consumption and compare it to real measurements for which we build a flexible, low cost tool to be able to measure at any given node in a meshed network. We verify the precision of our tool by comparing it to a sophisticated device. Our main results in this paper are the derivation of an analytical energy model, the implementation of a distributed energy measurement testbed conducting a series of measurements, and finally a comparison of the analytical energy model and the data achieved by our testbed. I. INTRODUCTION Lately a large number of research projects and publications have aimed their focus on investigating the so-called green wireless communication [], [2], [3], [4]. Green communication deals with the tasks to reduce the overall energy consumption in order to reduce the C02 emission caused by information and communication technology (ICT). A more simple explanation for the interest in this research area are the huge electricity bills of network and service operators. Reducing the energy consumption, sometimes referred as power saving, is a fairly old research area that started after the first wireless devices came to the market e.g. [5]. With the new trends in the mobile handheld sector, the problem of energy saving becomes more evident: As the computational power is following Moore's law of doubling every two years, the users benefit from more and more applications and services. The battery capacity, however, is just doubling every ten years. Nevertheless, the overall goal is to reduce the energy consumption wherever possible. In order to design energy efficient protocols, we need models and measurement tools to validate our protocols. Models help us to quickly understand the behavior of simple network topologies, but they might be harder to derive for larger arbitrary networks. Measurement setups are always time consuming, but can be applied to any topology. The majonty of energy measurements were simply focused on single devices [6]. To support large arbitrary networks energy consumption has to be measured at any node in the network. First attempts to support distributed energy measurements are currently in preparation [7]. In this paper we compare an analytical model with a fullyfletched distributed energy measurement testbed. However, in order to model larger networks it is necessary to understand the elementary topologies. Therefore we compare the results from the analytical model and the measurements for the Alice and Bob scenario, see Figure. Furthermore we are interested to quantify the impact caused by the usage of network coding. Recently, there has been a lot of research effort and interest in applying network coding to wireless meshed networks [8], [9]. Katti et al. introduced a practical method named COPE [0] in which packets from different unicast sessions are XOR' ed together and forwarded in a single transmission. A similar technique named CATWOMAN (Coding Applied To Wireless On Mobile Ad-hoc Network) was introduced by Hundeb0 et al. [] focusing on commercial of-the-shelf WiFi products. This approach was applied on top of an existing routing scheme called BATMAN (Better Approach To Mobile Adhoc Networking). The source code for CATWOMAN implementation in BATMAN can be found at [2]. After our extensive investigation on the throughput of the CATWOMAN approach for Alice and Bob, we are interested in this paper in the energy consumption with and without network coding. Therefore we derive an analytical model and we build our own testbed. Finally the analytical model is compared and verified with the measured data. The paper is structured as follows. In Section II we present our activity model and methodology used throughout the paper. Our measurement tool and the testbed is presented in Section III. Analytical and the experimental results are reported and discussed in Section IV. Finally, in Section V we conclude our work on the behalf of our results. II. ACTIVITY MODEL FOR ALICE AND BOB In this section, we describe the simple Alice and Bob scenario to familiarize the reader with our setup. Then we will /2/$ IEEE 286

2 analyze and present an activity model which later allows us to derive the system power and the system energy consumption. A. The Alice and Bob scenario Figure shows the Alice and Bob scenario. It is assumed that Alice and Bob cannot directly exchange data hence need the help of a relay. Each packet received by the relay needs to be forwarded to the other node. As given in the figure (left side of Figure ), four time slots are needed to exchange two packets between Alice and Bob. Using network coding, two incoming packets are coded together and broadcasted in one time slot to both nodes resulting in a usage of only three time slots [3], [0]. In the most simple case the coding is a bit-wise XOR operation. More sophisticated approaches use random linear network coding [4]. The main difference between the state-of-the-art approach in network coding is the change in paradigm from store-and-forward to compute-andforward. We assume symmetric traffic in this paper, resulting in the fact that Alice and Bob send with the same data rate. For this we induce a range of different loads into Alice and Bob. The induced load is expressed as L(l) = l. C[Mbit/ s], where l is the unitless load factor ranging from 0 to and C the link capacity. Fig. I. Basic scenario which consists of three nodes. Alice (A). Bob (B). and the relay (R), where two packets are exchanged among Alice and Bob with help of the relay. The labels on the packets S, R, and B stand for send, receive, and broadcast, respectively. On the left side we see the store-andforward approach and on the right side the use of network coding leading to compute-and-forward. that the sending activity of Alice or Bob increasing linearly with the offered load. The activity of the relay increases twice as fast until a given load of 0.5. At this given point, Alice as well as Bob are contributing with a load of 0.5 resulting in an additional load contribution for the relay of 0.5. Therefore, for the approach without network coding, the system capacity is fully used for an offered load of 0.5. If we increase the load further, Alice and Bob will keep increasing their sending activity at the expense of the sending activity of the relay. This behaviour results from the MAC fairness introduced by the IEEE All three nodes have the same sending activity for a given load of 2/3. Even if we increase the load further, the activity of each load is limited to /3. In 2(c) we see the receive activity without network coding. Until a load of /2 for Alice and Bob and 2/3 for relay, the nodes increase their receiving activity linearly, whereas the receiving activity of the relay is twice as high as for Alice or Bob. After a load of 2/3 the receiving activity of the relay stabilize around 2/3. However, after the congestion relay only gets /3 for sending, this leads to a receiving activity of /6 for Alice and Bob. As given by Equation, Figure 2(e) gives the activity for being idle for the approach without network coding. In Figure 2(b), 2( d), and 2(f), we are showing the activity levels for the network coding approach. In 2(b), the send activity for all three nodes are given. Due to the coding of two packets with the resulting output of a single packet, the sending activity of Alice, Bob, and the relay are the same. The sending activity increases linearly until a load of2/3 where the capacity of the channel is fully used. From that point onwards the sending activity is limited to /3. Figure 2(d) gives the receive activity for the network coding approach which is similar to the plot 2(c) for the approach without network coding with an exception of that now both Alice and Bob have /3 receiving activity in phase III. Figures 2(f) is giving the idle activity for the network coding approach which once again is derived by Equation taking Figure 2(b) and 2( d) into account. B. Activity Model The goal of this subsection is to derive the activities of each node in the given scenario. We distinguish three different states, namely, send, receive, and idle. We introduce the parameter a as the proportion of time in which a node stays in a given state, whereas as specifically represents the proportion of any time period a node is actively sending. Similarly, ar and ai represent the proportion for receiving or being idle. For any given load l we assume: In Figure 2 we show the individual activity levels for sending, receiving, and idle for the two approaches using network coding in 2(b), 2(d) and 2(f) and without network coding in 2(a), 2(c) and 2(e). In 2(a) we see the activity level for the relay as well as for Alice or Bob (throughout this paper the activity of Alice and Bob can be used interchangeably). Here we see () Phase I II III Load [l] A&B l I WoNC Send [as] R I - NC WoNC A&B l I R l I A&B l -[ - 2-6' Receive [ar R I I 2 NC A&B l l R I I 2 TABLE I SENDING AND RECEIVING ACTIVITY LEVEL FOR ALL THREE NODES IN DIFFERENT PHASES FOR BOTH WITH(NC) AND WITHOUT(WoNC) NETWORK CODING. In Table I we give a detailed description of the activity 287

3 energy consumption at any given distributed node, we develop our low-cost energy measurement tool. f O (a) Send activity without network coding vs. load. f O Load Factor [II (c) Receive activity without network coding vs. load. 0.6 > « (b) Send activity with network coding vs. load. 0 8."'0-'0"'.2.-,.'-.-'-,:'7"'"0.8.'.0 0"'.0-'0"'.2.-,.' ,O"'.6"',c- A. Measurement tool The measurement tool can be divided in two parts: our own energy measurement circuit and the data acquisition board, see Figure 3. In the following we will give a short overview of these two parts. The first part, the energy measurement circuit, is based on the Texas Instruments INA39 current shunt monitor Ie. This IC is specially designed for measuring current by using a shunt resistor in serial with the power supply and the node. The voltage drop over the shunt resistor is then used to calculate the current used by the node. Because the voltage drop is very low it needs to be amplified which is also done by this Ie. In addition to the current measurement the voltage of the power supply is also measured, this is done by dividing the supply voltage with some resistors, which also makes the voltage level fit inside our measuring range. The supply voltage measuring is done to ensure that a high current drain by the node, (d) Receive activity with network codin hich can cause a voltage drop of the power supply, will not vs. load.. cause an mcorrect energy measurement b y t h e too I. F or more information regarding this circuit we refer the reader to the INA 39-datasheet. The second part, the data acquisition board, is a low-cost chipkit UN032 development board from Digilent with a 0 bit AID converter. The two above mentioned measuring points (current and supply voltage) from the monitoring circuit are connected to two separate ADC input-ports on the UN032 board. These inputs are sampled with 87 KHz sample rate Load Factor [II and the sampled data is stored in the memory ' (e) Idle activity without network coding (f) Idle activity with network coding vs. vs. load. load..0 Fig. 2. Expected activities for offered load in Alice and Bob topology with and without network coding. level for the two approaches distinguishing between the three activity states. We differentiate between three load situations. Phase I is describing the load between 0 and 0.5, phase II the load between 0.5 and 2/3, and phase III between 2/3 and. These phases reflect the characteristic load points reported in [5]. After deriving the different possible activity levels in a given state, we are able to calculate the power used at any given load situation: The only missing information now are the power levels for the three different states, which we will measure in one of the following sections. III. BUILDING A MEASUREMENT TOOL AND A TESTBED In this section we describe the implementation of our measurement tool and the testbed. In order to measure the Fig. 3. Measurement tool, consisting of our own measurement circuit and a data acquisition board. In order to validate the measurement tool, it was compared with an Agilent 6639D power supply from Agilent Technologies. Where we measured an average percent of error of 0.76 %, where the Agilent device is considered to give the actual measurement value. 288

4 Alice /8 Relay /8 Test Server Bob /8 Fig. 4. Testbed consisting of three nodes: Alice, Bob and the relay. These nodes are all connected to a test server from where we control our testruns and couect the measured data. end of this section we compare these two results with each other. Using our measurement tools we carried out preliminary power measurements in order to estimate the values Ps, Pr and Pi for Equation 2. This is achieved by connecting our measurement tool to a single node and then forces this node to enter one of the three states: send, receive or idle for a period of 60 seconds. The mean values from this test are given in Table II. I 3.:S s w I 3.:: W I 2.::i w I TABLE II MEASUREMENT OF THE ENERGY CONSUMPTION THAT A NODE HAS IN THE DIFFERENT STATES. B. Testbed Our testbed used throughout this paper consists of three OMIP routers from Open-Mesh (Alice, Bob and relay). Each node is installed with CATWOMAN on top of a standard installation of the B.A.T.M.A.N-adv routing protocol. This standard installation of BATMAN-adv. allows non-batmanenabled nodes to communicate through the mesh, by bridging the mesh network with a virtual access point. To do this B.A.T.M.A.N-adv. uses the so-called promiscuous mode. The main reason for selecting the standard installation is to use an of-the-shelf routing protocol without modifications. For more information regarding the setup and installation of the B.A.T.M.A.N-adv. routing protocol we refer the reader to [6]. The installed nodes Alice and Bob are both placed 90 meters apart from each other with the relay in the middle, see Figure 4. Both Alice and Bob are configured such that they are not able to communicate directly with each other, therefore they are forced to use the relay. Each node is connected to a laptop for traffic generation and data logging, as given in Figure 4. The test execution is handled from the test server which monitors and creates a test report. This test repor combines all the measured data during a test into a single report. A selection from such report is e.g. the node CPU usage, amount of data packets sent, received and lost, power usage etc. In order to generate the UDP data stream between Alice and Bob the Iperf tool was used. Furthermore, each node is configured to use a fixed rate of Mbitls for data transmission (rate adaptation is disabled). Similarly to [7] we measure a link capacity C = 4.9 Mbitls for our configuration. The transmission rate is varied from 00 Kbitls to 3000 Kbitls in steps of 00 Kbitls. Each transmission is measured for a duration of 60 seconds and is defined as one testrun. Our test consists of five testruns per transmission rate and from these the average current, voltage and throughput are collected and used for calculating the power and the energy per bit ratio for each node. IV. ENERGY MODEL AND MEASUREMENT S In this section we present the results for the analytical model as well as the results for the measurement campaign. At the A. Results for the Analytical Model We note that we are now multiplying the load factor l with the capacity C = 4.9 Mbitls in order to compare the analytical model with the real measurements that we will present later on. By using the power values given in Table II and Equation 2 we derive the power vs. load plot given in 6(c). We see that for both approaches the power value increases with the load in phase I and II, whereas the power stabilizes in phase III. We also see that for the case without network coding the power level is slightly higher in comparison to with network coding in phase I and phase II. The increase in the power level in phase III, for the case with network coding, is a result from the network coding receive-activity in compare to the case without network coding (Figure 2(c) and 2(d)). Recall that network coding doubles the throughput, while the sending activity stays the same. With the doubled throughput, however, the receiving activity has to be twice as well. In Figure 6(a) we depict the throughput for the two approaches vs. the offered load as given in [5]. By dividing the power in 6(c) with the throughput given in 6(a) we derive the energy per bit as presented in 6(e). We see that the energy per bit in phase I is nearly the same with and without network coding and decreasing with an increasing offered load. In phase II the energy per bit for the approach without network coding is increasing and for the approach with network coding it is decreasing. In phase III the energy per bit has stabilized to a value of 6 j. J /bit and 3 j. J /bit for the approach without and with network coding, respectively. The interested reader is referred to the work in [8] for the explanation of the throughput model in 6(a). B. Energy Measurements For the energy measurements in our testbed we are running multiple tests with different load situations as explained beforehand. These measurements were conducted at nighttime where the WiFi interference caused by other wireless devices is expected to be minimal. The first result is the throughput vs. the load given in 6(b) showing the difference between the approaches with and without network coding. Figure 6(d) shows the power vs. the offered load. We see that the power 289

5 values increase linearly for low load situations, whereas the approach without network coding yields to larger values. Later the power level for the approach without network coding is stabilizing at 9.77 Watts, whereas the approach with network coding is still increasing and stabilizes later at 9.82 Watts. In Figure 6(d) we see that in low load scenarios network coding results in lower power values as the reduction of radio transmission activities is reduced due to coding. For high load scenarios more power is used by the nodes for the case with network coding in receiving in compared to the case without network coding. By combining 6(b) and 6(d) we derive 6(f) reporting the energy per bit vs. offered load. We see that for low load scenarios the two approaches yield the same energy per bit values whereas an increased offered load results in larger energy per bit values for the approach without network coding (6 ILJ /bit) compared to the approach with network coding (3.8 ILJ /bit). C. Comparison of Model and Measurements In order to compare the results achieved by the model and the measurements, we start to compare the intermediate results. Figure 6(a) and 6(b) represent the throughput vs. load. In general, these two plots fit very well. The expected throughput for network coding is slightly smaller than expected. This is due to the fact that we could not assure fully symmetric traffic. Nevertheless network coding achieved significant larger throughput than without network coding. Comparing Figure 6(c) and 6(d) the power vs. load for the model and the measurements also match. For load situations lower than 3000 Kbitls both (model and measurement) report a larger power value. After that, the measurements report larger power values than the model. Furthermore the model expects the power values to fully stabilize after 3000 Kbitls, whereas the measurements show steady increase for an increasing load. In order to explain the increase in the power level seen in Figure 6(d) for both with and without network coding, we present Figure 5(a) and 5(b). 70',-,, -, than the approach without network coding. Nevertheless the CPU is never fully loaded. More interestingly is the difference between the relay and the other two nodes. Whereas the relay is stabilizing the CPU cycles after 3000 Kbitls, Alice as well as Bob are still increasing the CPU cycles as the offered load increases. The reason for this behavior is based on the fact that the laptops generating the traffic are overloading Alice and Bob, this means more packets are entering the node than can be sent out over the wireless medium. Packets that arrive at Alice and Bob have to be received and stored and some of them have to be discarded afterwards. Those activities leads to an increase in the power values beyond the offered load of 3000 Kbitls. Such an effect is not covered by our analytical model === ===,-, 3000 E 2500 :c '" :;'2000 " c. -, Without Network Coding With Network Coding (a) Model: Throughput. 0.Or-, 9.8 _ 9.6! 9.4 tr. 9.2 (c) Model: Power With Network Coding (b) Measurement: Throughput. With Network Coding Without Network Coding (d) Measurement: Power u Offered Load [Kbit/s[ (e) Model: Energy per bit. (f) Measurement: Energy per bit. (a) CPU Utilization for Alice or Bob. (b) CPU Utilization for the Relay. Fig. 5. CPU Utilization. Fig. 6. Energy model vs. measured data for the Alice and Bob topology. Figure 5(a) and Figure 5(b) show the CPU utilization on the wireless node for Alice or Bob as well as the relay for both modes (with and without network coding). With an increased offered load all nodes start to use more of the CPU cycles. If the offered load increases above 3000 Kbitls the network coding approach need approximately 6 % more CPU cycles In Figure 6(e) and 6(f) we show the energy per bit for the model and the measurement. We see that the results delivered by the model as well as measurement for the approach without network coding fits nearly perfectly. Both, the model and the measurement, predict that the energy per bit for high load scenarios will be exactly 6 ILJ /bit. The match between the 290

6 model and the measurements is slightly worse for the network coding approach, whereas the model foresees 3 J,J /bit for high load scenarios. The measurements report values around 3.8 J,J /bit. The mismatch is a result of the false prediction of the throughput and the power values for the high load scenarios. Where the error in the power values is very small, the prediction error in the throughput is the dominant one. Nevertheless, the presented results for the model as well as the measurements are clearly in line. V. CONCLUSION In this paper we presented an analytical model and its validation by means of real measurements for the energy consumption for a wireless meshed network based on IEEE 802. technology. This was achieved by comparing the impact of network coding with state of the art approaches. In this paper we show how we carry out energy measurement for distributed wireless nodes. In order to do so we introduced our own low cost measurement tool. The paper shows that our low cost tool is capable of giving quite accurate results in comparison to an Agilent 6639D. The new hardware allows system wide energy measurement at each node in a wireless meshed network. In addition we also present a simple energy consumption model for network coding enabled and network coding agnostic setup. Finally we compare the results of the analytical model and the real life measurement for a simplified Alice and Bob mesh network scenario. The measured results are in line with our analytical model even though the model does not include the operational cost due to coding (which is neglected in our analytical model, due to the simple XOR operations). It is shown that applying network coding saves energy for low and high load scenarios. For low load we could show that the energy consumption is almost.5% less for network coding compared to an approach that does not support network coding. For high load scenarios we see that the energy consumption for with network coding is slightly higher due to the computational power it requires, but as the throughput increases with network coding, the energy per bit ratio is improving so that the gain per Joule is higher. In the past, network coding has been featured for saving bandwidth in case of high load, as for low load there is no throughput gain. Our model and measurements, however, demonstrate that network coding gives even benefits for the case of low load - in that case saving energy at the nodes. In our future work we will extend the analytical work by including the error prone wireless transmission resulting in more radio transmission. In this paper we provide an elementary example to prove the analytical model and to introduce the distributed energy measurement. In the future work we will investigate arbitrary networks with large number of nodes. While for the simple Alice and Bob topology we could use the measurements to validate our analytical model, we expect that for the more complex topologies the measurements will help to derive suitable models. We will also consider combining sets of elementary models to build analytical models of larger networks. VI. ACKNOWLEDGEMENT This work was partially financed by the Green Mobile Cloud project granted by the Danish Council for Independent Research (Grant No ). The work of Gergo Ertli has been funded by the Research Project GREENET (PITN-GA ). REFERENCES [] L. M. Correia, D. Zeller, O. Blume, D. Ferling, Y. Jading, I. Godor, y. Jading, I. Godor, Y. Jading, and I. Godor, "Challenges and enabling technologies for energy aware mobile radio networks," Communications Magazine, IEEE, vol. 48, no., pp , 20. [2] G. GUr, F. Alagoz, and B. University, "Green wireless communications via cognitive dimension: An overview," Network, IEEE, vol. 25, no. 2, pp [3] w. Guo and T. O'Farrell, "Green cellular network: Deployment solutions, sensitivity and tradeoffs," in Proc. of Wireless Advanced (WiAd), pp , 20. [4] S. Moad, M. T. Hansen, R. Jurdak, B. Kusy, and N. Bouabdallah, "Load balancing metric with diversity for energy efficient routing in wireless sensor network," in Proc. of International Symposium on Intelligent Systems Techniques for Ad hoc and Wireless Sensor Networks [5] K. Nagata, K. Kobayashi, and S. Yuki, "Control techniques and power saving effects of intermittent operation in radio units," in Proc. of 37th IEEE, Vehicular Technology Conference, pp , -3 June 987. [6] K. Gomez, R. Riggio, T. Rasheed, D. Miorandi, l. Chlamtac, and F. Granelli, "Analysing the energy consumption behaviour of wifi networks," in Proc. of IEEE, Online Conference on Green Communications (GreenCom), pp ,20. [7] K. Gomez, R. Riggio. D. Miorandi. I. Chlamtac, and F. Granelli, "Tunegreen: A distributed energy consumption monitor for wireless networks," in Proc. of IEEE, International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. -3, 20. [8] c. Cam polo, C. Casetti, c.-f. Chiasserini, and S. Tarapiah, "Performance of network coding for ad hoc networks in realistic simulation scenarios," in Proc. of the International Conference on Telecommunications (ICT 09), pp. 3-36, [9] S. Tarapiah, C. Casetti. and C.-F. Chiasserini. "Network coding in ad hoc networks: A realistic simulation study," in Proc. of IEEE INFO COM Workshops, pp. -2,2009. [0] S. Katti. H. Rahul, W. Hu, D. Katabi. M. Medard, and J. Crowcroft, "Xors in the air: practical wireless network coding," IEEEIACM Transactions on Networking, vol. 6, no. 3, pp , [] M. HundeblZili and J. Ledet-Pedersen, "Inter-flow network coding for wireless mesh network, master thesis, Aalborg University," 20. [2] Catwoman. [Online]. Available: batman-adv-nc/tree/nc [3] M. HundeblZill, J. Ledet-Pedersen, S. Rein, and F. H. Fitzek, "Comparison of analytical and measured performance results on network coding in ieee 802. ad-hoc networks, submitted to the international symposium on network coding (netcod'2)," 202. [4] T. Ho, M. Medard, R. Koetter, D. R. Karger. M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," IEEE Transactions on Information Theory, vol. 52, no. 0, pp ,2006. [5] F. Zhao, "Distributed control of coded networks. phd thesis, Massachusetts Institute of Technology," 200. [6] Freifunk. B.a.t.m.a.n. advanced documentation overview. [Online]. Available: hup:llwww.open-mesh.orgl [7] J. Jun, P. Peddabachagari, and M. Sichitiu, 'Theoretical maximum throughput of ieee 802. and its applications," in Proc. of Second IEEE International Symposium on, Network Computing and Applications,NCA 2003, pp , [8] M. M. Fang Zhao, "On analyzing and improving cope performance, Massachusetts Institute of Technology," in Proc. of Information Theory and Applications Workshop (ITA),

Published in: Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2012 IEEE 17th International Workshop on

Published in: Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2012 IEEE 17th International Workshop on Aalborg Universitet Energy and Data Throughput for Asymmetric Inter-Session Network Coding Paramanathan, Achuthan; Heide, Janus; Pahlevani, Peyman; Hundebøll, Martin; Rein, Stephan Alexander; Fitzek, Frank

More information

Comparison of Analytical and Measured Performance Results on Network Coding in IEEE Ad-Hoc Networks

Comparison of Analytical and Measured Performance Results on Network Coding in IEEE Ad-Hoc Networks Comparison of Analytical and Measured Performance Results on Network Coding in IEEE 802.11 Ad-Hoc Networks Fang Zhao Singapore-MIT Alliance for Research and Technology, Singapore Email:fang.zhao@smart.mit.edu

More information

Energy Consumption in Wireless Mesh Networks. Ulrik Wilken Rasmussen Aalborg University

Energy Consumption in Wireless Mesh Networks. Ulrik Wilken Rasmussen Aalborg University Energy Consumption in Wireless Mesh Networks Ulrik Wilken Rasmussen Aalborg University The Faculties of Engineering, Science and Medicine Department of Electronic Systems Frederik Bajers Vej 7 Phone:

More information

Published in: 2013 IEEE Consumer Communications & Networking Conference Proceedings

Published in: 2013 IEEE Consumer Communications & Networking Conference Proceedings Aalborg Universitet Impact of Network Coding on Delay and Throughput in Practical Wireless Chain Topologies Hundebøll, Martin; Rein, Stephan Alexander; Fitzek, Frank Hanns Paul Published in: 213 IEEE Consumer

More information

The Importance of Being Opportunistic

The Importance of Being Opportunistic High Performance Switching and Routing Telecom Center Workshop: Sept 4, 1997. The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard Bandwidth is

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

Aalborg Universitet. Published in: Vehicular Technology Conference (VTC Spring), 2014 IEEE 79th

Aalborg Universitet. Published in: Vehicular Technology Conference (VTC Spring), 2014 IEEE 79th Aalborg Universitet Sharing the Pi Paramanathan, Achuthan; Pahlevani, Peyman; Thorsteinsson, Simon; Hundebøll, Martin; Roetter, Daniel Enrique Lucani; Fitzek, Frank Hanns Paul Published in: Vehicular Technology

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

CATWOMAN: Implementation and Performance Evaluation of IEEE based Multi-Hop Networks using Network Coding

CATWOMAN: Implementation and Performance Evaluation of IEEE based Multi-Hop Networks using Network Coding TWOMN: Implementation and Performance Evaluation of IEEE 802.11 based Multi-Hop Networks using Network oding Martin Hundebøll, Jeppe Ledet-Pedersen, Janus Heide, Morten V. Pedersen, Stephan. ein, Frank

More information

Reverse Direction Transmissions and Network Coding for Energy-Efficient Wi-Fi Networks

Reverse Direction Transmissions and Network Coding for Energy-Efficient Wi-Fi Networks Reverse Direction Transmissions and Network Coding for Energy-Efficient Wi-Fi Networks Raul Palacios a, Dzmitry Kliazovich b, Fabrizio Granelli a a University of Trento, Trento, Italy b University of Luxermbourg,

More information

Reliable video-streaming delivery in wireless access networks using Network Coding

Reliable video-streaming delivery in wireless access networks using Network Coding Reliable video-streaming delivery in wireless access networks using Network Coding MELISA JUNUZOVIĆ, KEMAL ALIČ, ALEŠ ŠVIGELJ Department of Communication Systems, Jozef Stefan Institute Jozef Stefan International

More information

Published in: Mobile Wireless Middleware, Operating Systems, and Applications - Workshops

Published in: Mobile Wireless Middleware, Operating Systems, and Applications - Workshops Aalborg Universitet Connecting the islands - enabling global connectivity through local cooperation Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank Hanns Paul; Larsen, Torben Published in: Mobile

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering University of South Florida Tampa,

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Jason Cloud*, Linda Zeger, Muriel Médard* *Research Laboratory of Electronics, Massachusetts Institute of Technology,

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

Embracing Wireless Interference: Analog Network Coding

Embracing Wireless Interference: Analog Network Coding Embracing Wireless Interference: Analog Network Coding By Sachin Katti, Shyamnath Gollakota, and Dina Katabi Shyamala Villupuram Sundararaman University of Freiburg shyamala.villupuram.sundararaman@venus.uni-freiburg.de

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Exploiting Sparse Coding: A Sliding Window Enhancement of a Random Linear Network Coding Scheme

Exploiting Sparse Coding: A Sliding Window Enhancement of a Random Linear Network Coding Scheme Exploiting Sparse Coding: A Sliding Window Enhancement of a Random Linear Network Coding Scheme Pablo Garrido, David Gómez, Jorge Lanza and Ramón Agüero, IEEE Senior Member Universidad de Cantabria, Santander,

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Experimental Evaluation on the Performance of Zigbee Protocol

Experimental Evaluation on the Performance of Zigbee Protocol Experimental Evaluation on the Performance of Zigbee Protocol Mohd Izzuddin Jumali, Aizat Faiz Ramli, Muhyi Yaakob, Hafiz Basarudin, Mohamad Ismail Sulaiman Universiti Kuala Lumpur British Malaysian Institute

More information

WIRELESS networks suffer from low throughput and

WIRELESS networks suffer from low throughput and IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 3, JUNE 2008 497 XORs in the Air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Senior Member,

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme

Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme European Wireless 29 1 Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme Gian Paolo Perrucci and Morten V. Pedersen and Tatiana K. Madsen and Frank H.P. Fitzek Department of Electronic

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing Sudipta Sengupta Shravan Rayanchu,2 Suman Banerjee 2 Bell Laboratories, Lucent Technologies, Murray Hill,

More information

NECO: Network Coding Simulator

NECO: Network Coding Simulator NECO: Network Coding Simulator Diogo Ferreira 1, Luísa Lima 2, João Barros 1 1 Instituto de Telecomunicações Faculdade de Engenharia da Universidade do Porto 2 Instituto de Telecomunicações Faculdade de

More information

PictureViewer Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul; Larsen, Torben

PictureViewer Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul; Larsen, Torben Aalborg Universitet PictureViewer Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul; Larsen, Torben Published in: European Wireless 29 DOI (link to publication from Publisher): 1.119/EW.29.5357968

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

10 THINGS YOU MUST KNOW BEFORE BUYING YOUR NEXT Benchtop Digital Multimeter

10 THINGS YOU MUST KNOW BEFORE BUYING YOUR NEXT Benchtop Digital Multimeter THINGS YOU MUST KNOW BEFORE BUYING YOUR NEXT Benchtop Digital Multimeter Introduction The digital multimeter (DMM) is the most commonly used instrument on an engineer s bench. We use it almost every day.

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Chapter 1 - Introduction

Chapter 1 - Introduction Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation Javier Gozalvez and John Dunlop Department of Electronic and Electrical Engineering, University of

More information

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots Fair Time Sharing Protocol: a Solution for IEEE 802.11b Hot Spots Anelise Munaretto 1,2, Mauro Fonseca 1,4, Khaldoun Al Agha 2,3, and Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 75015 Paris,

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Chapter 2. Literature Survey. 2.1 Remote access technologies

Chapter 2. Literature Survey. 2.1 Remote access technologies Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is

More information

DEPLOYMENT OF PERFORMANCE IN LARGE SCALE WIRELESS MESH NETWORK 1

DEPLOYMENT OF PERFORMANCE IN LARGE SCALE WIRELESS MESH NETWORK 1 DEPLOYMENT OF PERFORMANCE IN LARGE SCALE WIRELESS MESH NETWORK 1 Richa Sharma, 2 Ms.Pency Juneja 1 Perusing M.Tech (CSE), 2 Assistant Professor Lovely Professional University, Phagwara Email: 1 rsricha177@gmail.com,

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang School of Electrical and Computer Engineering, Purdue University,

More information

CAERP: A Congestion and Energy Aware Routing Protocol for Mobile Ad Hoc Network

CAERP: A Congestion and Energy Aware Routing Protocol for Mobile Ad Hoc Network Indian Journal of Science and Technology, Vol 8(35), DOI: 10.17485/ijst/2015/v8i35/70014, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 : A Congestion and Energy Aware Routing Protocol

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network. By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS)

On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network. By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS) On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS) Outline 1. Introduction to Wireless Mesh Networks 2. Multicast and its

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 2 October 25, 2017 This problem set has 6 questions, each with several parts.

More information

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Fair scheduling in the network with a mesh topology

Fair scheduling in the network with a mesh topology International Research Journal of Applied and Basic Sciences. Vol., 3 (5), 911-918, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Fair scheduling in the network with a mesh topology

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Egyptian Computer Science Journal Vol. 38 No.3 September 2014

Egyptian Computer Science Journal Vol. 38 No.3 September 2014 Deploying IPTV Services Over Proposed Network for Yemen Universities Khaled O. Basulaim Dept. of Information Technology, Faculty of Engineering University of Aden k.basulaim@ycit-he.org Abstract Recently,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Effect of Context Transfer during Handoff on Flow Marking in a DiffServ Edge Router

Effect of Context Transfer during Handoff on Flow Marking in a DiffServ Edge Router Effect of Context Transfer during Handoff on Flow Marking in a DiffServ Edge outer Muhammad Jaseemuddin 1, Omer Mahmoud 2 and Junaid Ahmed Zubairi 3 1 Nortel Networks, Ottawa, Canada, 2 International Islamic

More information

BANDWIDTH MEASUREMENT IN WIRELESS NETWORKS

BANDWIDTH MEASUREMENT IN WIRELESS NETWORKS BANDWIDTH MEASUREMENT IN WIRELESS NETWORKS Andreas Johnsson, Bob Melander, and Mats Björkman The Department of Computer Science and Electronics Mälardalen University Sweden Abstract Keywords: For active,

More information

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding GTAR-2014, Vol. 1, 463--469 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-30-5 GTAR-14 The Impact

More information

Aalborg Universitet. Published in: Communications (ICC), 2014 IEEE International Conference on

Aalborg Universitet. Published in: Communications (ICC), 2014 IEEE International Conference on Aalborg Universitet On the Coded Packet Relay Network in the Presence of Neighbors Khamfroush, Hana; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Hundebøll, Martin; Fitzek, Frank Hanns Paul Published

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Multilevel Fault-tolerance for Designing Dependable Wireless Networks

Multilevel Fault-tolerance for Designing Dependable Wireless Networks Multilevel Fault-tolerance for Designing Dependable Wireless Networks Upkar Varshney Department of Computer Information Systems Georgia State University Atlanta, Georgia 30302-4015 E-mail: uvarshney@gsu.edu

More information

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments Sachin Katti Dina Katabi Wenjun Hu Hariharan Rahul Muriel Médard {skatti@, dk@, wenjun@csail., rahul@csail., medard@}mit.edu

More information

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 137 CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 5.1 INTRODUCTION The simulation study in this chapter analyses the impact of the number

More information

On the Energy Efficiency of Opportunistic Access in Wireless Home Networks

On the Energy Efficiency of Opportunistic Access in Wireless Home Networks On the Energy Efficiency of Opportunistic Access in Wireless Home Networks Ahmed Khattab EECE Department Cairo University Giza, Egypt akhattab@ieee.org Abstract In this paper, we evaluate the energy efficiency

More information

Cooperation in Wireless Grids

Cooperation in Wireless Grids Cooperation in Wireless Grids An Energy Efficient MAC Protocol for Cooperative Network with Game Theory Model Master Thesis Puri Novelti Anggraeni Satya Ardhy Wardana Supervisor : Frank Fitzek Introduction

More information

Practical Network Coding in Sensor Networks: Quo Vadis?

Practical Network Coding in Sensor Networks: Quo Vadis? Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

XORs in The Air: Practical Wireless Network Coding

XORs in The Air: Practical Wireless Network Coding XORs in The Air: Practical Wireless Network Coding Sachin Katti Hariharan Rahul Wenjun Hu Dina Katabi Muriel Médard Jon Crowcroft MIT CSAIL Univ. of Cambridge ABSTRACT This paper proposes COPE, a new architecture

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Performance Analysis of Digital Network Coding Based Two Way Amplify and Forward Relay Networks

Performance Analysis of Digital Network Coding Based Two Way Amplify and Forward Relay Networks International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 National Conference on Performance Analysis of Digital Network Coding Based Two Way Amplify and Forward Relay Networks

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

Network Coding Approach: Intra-Cluster Information Exchange in Sensor Networks

Network Coding Approach: Intra-Cluster Information Exchange in Sensor Networks 1 Network oding pproach: Intra-luster Information Exchange in Sensor Networks Zhiqiang Xiong, Wei Liu, Jiaqing Huang, Wenqing heng, Zongkai Yang Huazhong University of Science and Technology Wuhan, Hubei

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

A Mobile Platform for Measurements in Dynamic Topology Wireless Networks

A Mobile Platform for Measurements in Dynamic Topology Wireless Networks A Mobile Platform for Measurements in Dynamic Topology Wireless Networks E. Scuderi, R.E. Parrinello, D. Izal, G.P. Perrucci, F.H.P. Fitzek, S. Palazzo, and A. Molinaro Abstract Due to the wide spread

More information

On the Optimizing of LTE System Performance for SISO and MIMO Modes

On the Optimizing of LTE System Performance for SISO and MIMO Modes 2015 Third International Conference on Artificial Intelligence, Modelling and Simulation On the Optimizing of LTE System Performance for SISO and MIMO Modes Ali Abdulqader Bin Salem, Yung-Wey Chong, Sabri

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information