Impact Analysis of Different Scheduling and Retransmission Techniques on an Underwater Routing Protocol
|
|
- Melanie Richard
- 5 years ago
- Views:
Transcription
1 Impact Analysis of Different Scheduling and Retransmission Techniques on an Underwater Routing Protocol Salvador Climent 1 Nirvana Meratnia 2 Juan Vicente Capella 1 1 Universitat Politècnica de València 2 University of Twente Workshop on UnderWater Networks, 2011 Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
2 Outline 1 Underwater Transmission Problems 2 Contributions 3 Routing protocol: EDETA 4 Scheduling and Retransmission Techniques Combination of scheduling and retransmission techniques used 5 Performance evaluation Simulation configuration Simulation results 6 Conclusions and Future work Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
3 Outline 1 Underwater Transmission Problems 2 Contributions 3 Routing protocol: EDETA 4 Scheduling and Retransmission Techniques Combination of scheduling and retransmission techniques used 5 Performance evaluation Simulation configuration Simulation results 6 Conclusions and Future work Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
4 Underwater Transmission Problems Differences between WSNs and UWSNs make current protocols developed for WSNs unsuitable or inefficient for UWSNs. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
5 Underwater Transmission Problems Different signal attenuation depending on distance and frequency. Signal spreading proportional to the distance. Long propagation delay. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
6 Underwater Transmission Problems Given the long propagation delay: TDMA and CSMA might not perform well. An schedule algorithm can avoid collisions and overlap transmissions. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
7 Outline 1 Underwater Transmission Problems 2 Contributions 3 Routing protocol: EDETA 4 Scheduling and Retransmission Techniques Combination of scheduling and retransmission techniques used 5 Performance evaluation Simulation configuration Simulation results 6 Conclusions and Future work Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
8 Contributions Analyze performance of different delay-aware and non-delay aware scheduling techniques. Combine them with simple retransmission techniques. The analysis is done using a routing protocol named EDETA. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
9 Outline 1 Underwater Transmission Problems 2 Contributions 3 Routing protocol: EDETA 4 Scheduling and Retransmission Techniques Combination of scheduling and retransmission techniques used 5 Performance evaluation Simulation configuration Simulation results 6 Conclusions and Future work Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
10 EDETA Hierarchical protocol Nodes arrange themselves in clusters. The cluster-heads (CHs) are know a priori. CHs arrange themselves in a tree structure with the sink as root. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
11 EDETA Corporative network Sink node Clusterhead node Normal node Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
12 Outline 1 Underwater Transmission Problems 2 Contributions 3 Routing protocol: EDETA 4 Scheduling and Retransmission Techniques Combination of scheduling and retransmission techniques used 5 Performance evaluation Simulation configuration Simulation results 6 Conclusions and Future work Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
13 Scheduling advantages Scheduling allows to avoid collisions and can overlap transmissions which can reduce the energy consumption and the delays. There should be an extra time for retransmission in case of packet errors. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
14 Delay-aware schedule The delay between a node and its CH is estimated at the configuration phase. The delay between a CH and its parent is estimated at the configuration phase. The schedule is done taking into account these delays. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
15 Delay-aware schedule Based on scheduling constrains from: W. A. P. van Kleunen et al. MAC Scheduling in Large-scale Underwater Acoustic Networks. 8th International Joint Conference on e-business and Telecommunication, ICETE W. A. P. van Kleunen et al. A Set of Simplified Scheduling Constraints for Underwater Acoustic MAC Scheduling. The 3rd International Workshop on Underwater Networks, WUnderNet Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
16 TAck TDMA schedule with acknowledgement. Slots have to include the maximum propagation time. Each transmission is scheduled two times. Main Tx Backup Tx Data Ack Data Ack Tx Prop Tx Prop Tx Prop Tx Prop Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
17 TnoAck TDMA schedule without acknowledgement. Slots have to include the maximum propagation time. There is no backup transmission. Data Data Tx Prop Tx Prop Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
18 DAck Delay-aware schedule with acknowledgement. Transmissions can be overlapped. Each transmission is scheduled two times. DATA ACK DATA ACK DATA ACK DATA ACK DATA ACK DATA ACK DATA Avoid interference with ACK at sender Time Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
19 DnoAck Delay-aware schedule without acknowledgement. Transmissions can be overlapped. There is no backup transmission. Receiver Time Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
20 DnoAck2 Delay-aware schedule without acknowledgement Transmissions can be overlapped. The data is sent twice. DATA DATA DATA DATA DATA DATA DATA DATA Time Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
21 Outline 1 Underwater Transmission Problems 2 Contributions 3 Routing protocol: EDETA 4 Scheduling and Retransmission Techniques Combination of scheduling and retransmission techniques used 5 Performance evaluation Simulation configuration Simulation results 6 Conclusions and Future work Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
22 Simulator ns-3 simulator. UAN module for the underwater layer. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
23 Scenario configuration Three different deployment areas: Three different node densities: 50 nodes 100 nodes 200 nodes Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
24 Radio configuration Transmission range of 100 meters. Transmission speed 500 bps. Data sent periodically every 250 seconds. Nodes start with 150 Joules. Tx: watts Rx and Idle: watts Sleep: watts Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
25 TnoAck vs DnoAck. Delay Delay heavily influenced by the network topology. Short transmission range: 100 meters Propagation delay is not the dominant factor Packet delay (s) n100m 50n150m 50n200m 100n100m 100n150m Scenarios 100n200m 200n100m 200n150m 200n200m DnoAck TnoAck Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
26 TnoAck vs DnoAck. Energy Same energy consumption for the leaf nodes CHs using delay-aware schedule have less energy consumption. Energy (J) n100m 50n150m 50n200m 100n100m 100n150m Scenario 100n200m 200n100m 200n150m 200n200m DnoAck TnoAck (a) Leaf nodes energy consumption Energy (J) n100m 50n150m 50n200m 100n100m 100n150m Scenario 100n200m 200n100m 200n150m 200n200m DnoAck TnoAck (b) CH nodes energy consumption Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
27 TAck vs DAck. Delay TDMA delay increases when new control packets are introduced. The delay-aware schedule can optimize and reduce these delays Packet delay (s) n100m 50n150m 50n200m 100n100m 100n150m 100n200m Scenarios 200n100m 200n150m 200n200m DAck TAck Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
28 TAck vs DAck. Energy CHs using delay-aware schedule have less energy consumption. Leaf nodes spend the same time awake in the two alternatives. Energy (J) n100m 50n150m 50n200m 100n100m 100n150m 100n200m 200n100m 200n150m 200n200m Scenarios (c) Leaf nodes energy consumption DAck TAck Energy (J) n100m 50n150m 50n200m 100n100m 100n150m 100n200m 200n100m 200n150m 200n200m Scenarios (d) CH nodes energy consumption DAck TAck Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
29 DAck vs DnoAck2. Delay As expected DnoAck2 has less delay since nodes don t wait for the ACK. Packet delay (s) n100m 50n150m 50n200m 100n100m 100n150m Scenarios 100n200m 200n100m 200n150m 200n200m DnoAck2 DAck Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
30 DAck vs DnoAck2. Energy Leaf nodes with DnoAck2 alternative have an overhead. CH nodes with DnoAck2 have the lowest energy consumption. Energy (J) n100m 50n150m 50n200m 100n100m 100n150m Scenario 100n200m 200n100m 200n150m 200n200m DnoAck2 DAck (e) Leaf nodes energy consumption Energy (J) n100m 50n150m 50n200m 100n100m 100n150m Scenario 100n200m 200n100m 200n150m 200n200m DnoAck2 DAck (f) CH nodes energy consumption Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
31 Outline 1 Underwater Transmission Problems 2 Contributions 3 Routing protocol: EDETA 4 Scheduling and Retransmission Techniques Combination of scheduling and retransmission techniques used 5 Performance evaluation Simulation configuration Simulation results 6 Conclusions and Future work Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
32 Conclusions The differences between TnoAck and DnoAck are given by the configuration phase. CHs using DAck has less energy consumption and there is lower delay. With the DnoAck2 alternative leaf nodes have the highest energy consumption. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
33 Future work Include different topologies. Guidelines on the optimal use of retransmission techniques and different scheduling techniques under different circumstances. Climent, Meratnia, Capella (UPV and UT) WUWNet / 34
34 Impact Analysis of Different Scheduling and Retransmission Techniques on an Underwater Routing Protocol Salvador Climent 1 Nirvana Meratnia 2 Juan Vicente Capella 1 1 Universitat Politècnica de València 2 University of Twente Workshop on UnderWater Networks, 2011
MAC Essentials for Wireless Sensor Networks
MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path
More informationReview on an Underwater Acoustic Networks
Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationProject: IEEE P Working Group for Wireless Personal Area Networks N
Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs) Title: [Olympus MAC Proposal] Date Submitted: [May 2009] Source: [Gang Ding] Company [Olympus Communication Technology
More informationMDS-Mac: A Scheduled MAC for Localization, Time-Synchronisation and Communication in Underwater Acoustic Networks
2012 IEEE 15th International Conference on Computational Science and Engineering MDS-Mac: A Scheduled MAC for Localization, Time-Synchronisation and Communication in Underwater Acoustic Networks Wouter
More informationWireless Sensor Networks, energy efficiency and path recovery
Wireless Sensor Networks, energy efficiency and path recovery PhD dissertation Anne-Lena Kampen Trondheim 18 th of May 2017 Outline Introduction to Wireless Sensor Networks WSN Challenges investigated
More informationResearch Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks
Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless
More informationEnergy-Efficient Communication Protocol for Wireless Micro-sensor Networks
Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor
More informationR-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks
R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationAn Energy-Efficient Hierarchical Routing for Wireless Sensor Networks
Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless
More informationProject: IEEE P Working Group for Wireless Personal Area Networks N
Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs) Title: [Olympus MAC Proposal] Date Submitted: [May 2009] Source: [Gang Ding] Company [Olympus Communication Technology
More informationWP-PD Wirepas Mesh Overview
WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,
More informationAdaptive Opportunistic Routing Protocol for Energy Harvesting Wireless Sensor Networks
Adaptive Opportunistic Routing Protocol for Energy Harvesting Wireless Sensor Networks Zhi Ang Eu and Hwee-Pink Tan Institute for Infocomm Research, Singapore Email: {zaeu,hptan}@ir.a-star.edu.sg Abstract
More informationEnergy Efficient MAC Protocols Design for Wireless Sensor Networks
Energy Efficient MAC Protocols Design for Wireless Sensor Networks Francesco Chiti*, Michele Ciabatti*, Giovanni Collodi, Davide Di Palma*, Romano Fantacci *, Antonio Manes *Dipartimento di Elettronica
More informationReservation Packet Medium Access Control for Wireless Sensor Networks
Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationNode activity scheduling in wireless sensor networks
1 Node activity scheduling in wireless sensor networks Saoucene Mahfoudh, Pascale Minet 1 Outline 2 1. Introduction: Maximize network lifetime 2. The node coloring problem Constraints Complexity 3. Three-hop
More informationstandards like IEEE [37], IEEE [38] or IEEE [39] do not consider
Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationA Survey on Underwater Sensor Network Architecture and Protocols
A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi
More informationDelay Analysis of ML-MAC Algorithm For Wireless Sensor Networks
Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationPrinciples of Wireless Sensor Networks. Medium Access Control and IEEE
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:
More informationCSMA/CD (Collision Detection)
CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed
More informationSensor Network Protocols
EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationWireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization
Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationAN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,
More informationPower Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol
ARTICLE International Journal of Engineering Business Management Special Issue on Radio Frequency Identification and Wireless Sensor Networks Editor: Cristina Turcu Power Saving MAC Protocols for WSNs
More informationAdvanced Networking Technologies
Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control
More informationWireless Sensor Networks 8th Lecture
Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet
More informationPresenting A Distributed Algorithm For The Energy Consumption Reduction in Underwater.
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. II (Sept - Oct. 2016), PP 95-102 www.iosrjournals.org Presenting A Distributed Algorithm For
More informationSummary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks
Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks Juhana Yrjölä, Tik 58673B, jayrjola@cc.hut.fi 13th March 2005 Abstract Conventional routing protocols may not be optimal
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationWireless Sensor Networks
Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationWiseTOP - a multimode MAC protocol for wireless implanted devices
WiseTOP - a multimode MAC protocol for wireless implanted devices Lorenzo Bergamini, Philippe Dallemagne, Jean-Dominique Decotignie RTNS 2018 Conference, 10.10.2018 - Poitiers Futuroscope Overview Detop
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationOutline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols
Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationAn Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing
More informationIntegrated Routing and Query Processing in Wireless Sensor Networks
Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationCooperation in Wireless Grids
Cooperation in Wireless Grids An Energy Efficient MAC Protocol for Cooperative Network with Game Theory Model Master Thesis Puri Novelti Anggraeni Satya Ardhy Wardana Supervisor : Frank Fitzek Introduction
More informationSESAM: A Semi -Synchronous, Energy Savvy, Application-Aware Aware MAC
Uni Innsbruck Informatik - 1 SESAM: A Semi -Synchronous, Energy Savvy, Application-Aware Aware MAC Joint work with Renato Lo Cigno and Matteo Nardelli,, University of Trento,, Italy Published at IEEE/IFIP
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationResearch Article An Energy and Latency Aware WSN MAC Protocol for Bidirectional Traffic in Data Collection
Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 215, rticle ID 97538, 17 pages http://dx.doi.org/1.1155/215/97538 Research rticle n Energy and Latency ware WSN
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationAd hoc and Sensor Networks Chapter 5: Medium access control protocols
Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Controlling
More informationCPSC 441 Tutorial-19. Department of Computer Science University of Calgary
CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.
More informationCONCLUSIONS AND SCOPE FOR FUTURE WORK
Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationSESAM: A Semi -Synchronous, Energy Savvy, Application-Aware Aware MAC SESAM. Outline. Michael Welzl
Uni Innsbruck Informatik - 1 SESAM: A Semi -Synchronous, Energy Savvy, Application-Aware Aware MAC Joint work with Renato Lo Cigno and Matteo Nardelli,, University of Trento,, Italy Published at IEEE/IFIP
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationSURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS
SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut, Storrs,
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationEmbedded Internet and the Internet of Things WS 12/13
Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationAn Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks
Article An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks Faisal Alfouzan *, Alireza Shahrabi, Seyed Mohammad Ghoreyshi and Tuleen Boutaleb School of Engineering and Built Environment,
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationWPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/
WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationCSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols
CSC8223 Wireless Sensor Networks Chapter 5 Medium Access Control Protocols Goals of this chapter Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations
More informationMedia Access Control. Networked Systems (H) Lecture 5
Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationRT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar
RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar Papa Alioune Ly, Joel Alloh, Carl Hedari, Tom Reynaert Outline Introduction Design of the
More informationData Communications. Automatic Repeat Request Medium Access Control
Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements
More informationQoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks
QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,
More informationImplementation of an Adaptive MAC Protocol in WSN using Network Simulator-2
Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,
More informationWLAN Performance Aspects
Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationUNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar
UNIT IV Data link layer protocols Link Layer Frame synchronization. Data are sent in blocks called frames. The beginning and end of each frame must be recognized. Flow control. The sending station must
More informationChoosing the Packet Size in Multi-hop Underwater Networks
Choosing the Packet Size in Multi-hop Underwater Networks Stefano Basagni, Chiara Petrioli, Roberto Petroccia and Milica Stojanovic ECE Department Northeastern University {basagni, millitsa}@ece.neu.edu
More informationA Secure Time Synchronization Protocol for Mobile Underwater Wireless Sensor Network
A Secure Time Synchronization Protocol for Mobile Underwater Wireless Sensor Network Reshma J Kunnuthara PG Student Dept ECE MBITS,Nellimattom India reshmajkunnuthara@gmail.com Abstract This paper presents
More informationComputer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48
Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationPacket Routing using Optimal Flooding Protocol in Cluster based MANET
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya
More informationMedium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra
Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationA Qos Based Mac Protocol for Wireless Multimedia Sensor Network
IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN : 2278-2834 Volume 1, Issue 5 (May-June 2012), PP 30-35 A Qos Based Mac Protocol for Wireless Multimedia Sensor Network Smita Pawar
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationWireless Ad-Hoc Networks
Wireless Ad-Hoc Networks Dr. Hwee-Pink Tan http://www.cs.tcd.ie/hweepink.tan Outline Part 1 Motivation Wireless Ad hoc networks Comparison with infrastructured networks Benefits Evolution Topologies Types
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationMAC protocols for ad hoc networks
MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of
More information