A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks

Size: px
Start display at page:

Download "A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks"

Transcription

1 A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo, NY 46 {jzhu, qiao, Abstract Current minimum energy routing schemes in wireless networks only consider energy consumtion for transmitting data ackets. However most wireless devices also transmit some control ackets such as RTS and CTS in 8. besides data ackets. Without considering the energy consumtion for control ackets, the existing minimum energy routing schemes tend to use more intermediate nodes, which results in more energy consumtion and less throughut. In this aer, we first roose more comrehensive energy consumtion models that consider the energy consumtion for data ackets as well as control ackets. Based on these models, we roose our minimum energy routing scheme. The simulation results verify that our scheme erforms better than the existing minimum energy routing schemes in terms of energy consumtion as well as throughut. I. INTRODUCTION A wireless ad hoc network usually consists of mobile devices with limited battery ower. Thus, energy-efficient communication techniques are very imortant. The most common technique is the ower control scheme, in which a node transmits data ackets to its neighbor at the minimum required ower level [7]. However, this scheme only minimizes the transmission ower within a node s neighborhood. Several energy-aware multi-ho routing rotocols have been roosed to minimize the total ower over all the nodes along the ath between a source and its destination [] [5]. In wireless networks, the ower of a transmitted signal is attenuated at the rate of /d n, where d is the distance between the sender and receiver and n is the ath loss exonent between and 6. Accordingly, transmitting data ackets directly to a node may consume more energy than going through some intermediate nodes. Based on this observation, most of the roosed energy-efficient routing rotocols have tried to find a ath that has many short-range hos in order to consume the least amount of total energy. These rotocols can be generally classified into the following three categories: Minimum Total Transmission Power MTTP rotocols: These rotocols set the link cost to the transmission ower and use a shortest ath algorithm to search for the minimum energy ath. PAMAS [] used the Dijkstra s shortest ath algorithm to search for the ath. The authors in [] modified DSR into a MTTP rotocol. PARO [5] erformed oweraware routing otimization across the MAC and Network layers. In this scheme, one or more intermediate nodes elect to forward ackets on behalf of the source-destination airs to reduce the transmission ower. Minimum Total TransCeiving Power MTTCP rotocols: As the intermediate nodes consume energy not only when forwarding ackets but also when receiving ackets, the rotocol in [] assigned the transmission ower as well as receiving ower to be the link cost metric, and used the Bellman-Ford shortest ath algorithm to find the minimum energy ath. Minimum Total Reliable Transmission Power rotocols: The authors in [4] claimed that a link cost should be a function of both the energy required for a single transmission attemt across the link and the link error rate, which determines the number of retransmission attemts needed for a successful transmission, and accordingly, roosed a minimum total reliable transmission ower rotocol. This rotocol aims to minimize the energy consumtion in transmitting data ackets from a source to a destination reliably. However, none of these rotocols considered the additional energy consumtion in sending control or signaling ackets at the Data Link layer. Therefore, the roosed energy consumtion models could not cature the actual energy consumtion in most wireless networks. For examle, in an 8. network, the energy consumtion by the RTS, CTS and ACK ackets accounts for a significant art of the total energy consumtion. Without considering such energy consumtion, these rotocols may tend to use a larger number of intermediate nodes, thus resulting in more energy consumtion, a lower throughut and/or a higher end-to-end acket error rate. To address the deficiency of the existing aroaches, in this aer, we first analyze the energy consumtion for three oular wireless ad hoc networks. After develoing these more accurate energy consumtion models, we roose new link costs for use by our minimum energy routing scheme. Our evaluation shows that the roosed minimum energy routing scheme erforms better in terms of the total energy consumtion as well as throughut than existing schemes. The rest of the aer is organized as follows. Section II contains our energy consumtion models for wireless networks. In Section III, our roosed minimum energy routing scheme is described and its imlementation issues are discussed. Simulation-based erformance evaluation is conducted in Section IV. Section V concludes the aer.

2 II. ENERGY CONSUMPTION MODELS In wireless ad hoc networks, there are two tyical reliable transmission modes [4]: End-to-End Retransmission EER and Ho-by-Ho Retransmission HHR. In the EER mode, intermediate nodes along a ath do not rovide any link-layer retransmission. The source node will retransmit the acket if it doesn t receive the acknowledgement acket ACK from the destination within some redefined eriod. In the HHR mode, the source node and all the intermediate nodes rovide link-layer retransmissions. Since neither the MTTP nor the MTTCP rotocols considers reliable transmissions, they don t distinguish the energy consumtion between these two modes. For examle, consider the scenario where there are M intermediate nodes between a source and a destination. Let the nodes along the ath from the source to the destination be numbered from to M in that order. Denote the acket error rate from node i to node j by i,j, the transmission ower from node i to node j by P i,j, and the receiving ower by P r. In addition, for a variable x, denote x by x, and the mean value of x by x. Then the total ower in transmitting data ackets to the destination calculated by a MTTP rotocol is M P i,i+. For a MTTCP rotocol, the total ower along the ath [] will be calculated as P i,i+ + P r. M On the other hand, the rotocol calculates the total ower differently for EER and HHR. For the EER mode, the total ower over the ath [4] is M P i,i+ M. i,i+ For the HHR mode, the total ower over the ath [4] is M P i,i+. i,i+ Note that, the energy consumtion models used by the MTTP, MTTCP and rotocols only consider the energy consumtion by data ackets. However, in most wireless ad hoc networks, control ackets, which also consume energy, need to be sent before and/or after the data ackets are sent. Therefore, the existing energy consumtion models underestimate the real energy consumtion, and as a result, alying an otimization technique based on such inaccurate energy consumtion models will lead to a subotimal solution only. To address the above roblem, we will develo more accurate energy consumtion models for three common wireless MAC rotocols: CSMA, MACA and 8.. The first two belong to the EER mode where end-to-end retransmission is rovided by the Transort layer using e.g.,tcp and may involve ACK ackets as control ackets. The third 8. belongs to the HHR mode, and may also contain ACK ackets as control ackets. Other MAC rotocols can be analyzed in a similar way. A. Energy Consumtion Models for the EER mode Carrier Sense Multile Access CSMA: In CSMA, a node transmits a data acket if the channel is sensed idle; otherwise, it will defer the transmission. If the source node doesn t receive the ACK for the transmitted data acket from its destination node for some redefined eriod, it will retransmit the data acket. The ACK can be transmitted searately or iggybacked. In the following, it is assumed that ACK transmission or retransmission also consumes energy. The state diagram for transmitting data ackets from the source node to its destination node M reliably with CSMA is in Fig.. The average total ower consumed by the nodes along the ath can be obtained, based on the state diagram, as: P,, + M j j P i,i+ j= P S,D = M + i,i+ M i,i+ M P i,i+ M i,i+ j,j+ i,i+ If we also consider the energy consumtion for receiving ackets as in [], we can modify Eq into: M j j P S,D =, P,,+,,,4 j= P i,i++p r i,i+ j,j+ M i,i+ M M P i,i++p r i,i+ + M,4 i,i+,,, M- Fig.. M, M State diagram for CSMA. M M, M. However, such one-way energy consumtion is still not enough since the source knows the acket arriving at its destination correctly only if it receives the ACK back. But.

3 the ACK can also be lost so the destination node needs to retransmit the ACK. Usually, the destination retransmits the ACK only after it receives the retransmitted data acket from the source correctly as in the case of sto-and-wait ARQ rotocol. That is, the number of ACK retransmissions equals the number of retransmitted data ackets arriving at the destination correctly. In such a case, the average total ower in sending a acket from the source to its destination successfully is: P S,D N D,S ACK+P D,S ACK, where N D,SACK is the average number of ACK retransmissions given by: N S,D = M i,i+ and P D,SACK is the average total ower for transmitting an ACK from the destination node to the source node correctly, which can be comuted as in Eq. Multile Access with Collision Avoidance MACA: MACA attemts to reduce collisions in CSMA by introducing two control messages: Request To Send RTS and Clear To Send CTS. A node transmits a RTS to its receiver before transmitting a data acket. Nodes in its neighborhood will defer their transmission until they receive the CTS or timeout. If the receiver receives the RTS, it will rely with a CTS. Nodes in the receiver s neighborhood will yield to allow the data ackets to be transmitted. Once the node receives the CTS, it will transmit the data ackets. If it doesn t receive the CTS, the whole rocess will be reeated. Let the acket error rate from node i to node j for RTS and CTS be r,i,j and c,i,j resectively. The state diagram for node i to transmit a data acket to one of its neighboring nodes, node j, isshown in Fig, where state S is the initial state, S is the state in which node j receives the RTS acket, S is the state in which node i receives the CTS acket, S is the state in which node j receives the data acket and S4 is the state in which the data acket from node i is lost. We assume that the nodes ; RTS and CTS acket sizes by N rts and N cts resectively, the hysical layer overhead size by N hy and the data acket size by N, then the average total ower in sending a acket from node i to node j can be exressed, based on the state diagram in Fig., as: N r+n c P T i, j =P i,j + P r,i,j m N m, 4 c,j,i r,i,j where N r = N rts+n hy, N c = N cts+n hy, N m = N +N maca+ N hy. Considering the scenario with M intermediate nodes between the source node and the destination node M, the average total ower in transmitting data ackets from node to node M reliably is: P S,D = M P T,,+ j j= + j P T i,i+ i,i+ j,j+ M i,i+ M M P T i,i+ i,i+ M i,i+. 5 Similar to the case for CSMA, if we also consider the energy consumtion for receiving the acket, we can modify Eq 4 to be: P T i, j =P i,j + P r +P m + P r N r + N c r,i,j N m. 6 c,j,i r,i,j In addition, the average number of source retransmission until the acket can reach the destination reliably is N S,D = M i,i+ Hence, as in the case for the end-to-end retransmission in CSMA, the average total ower in sending a acket and getting an ACK back successfully will be: P S,D N D,S ACK+P D,S ACK. 7. S c, j, i r, i, j r, i, j S c, j, i S i, j i, j S S4 B. Energy Consumtion Models for the HHR mode 8. is a tyical HHR scheme. There are two ways of transmitting data frames over a channel: the Two Frame Exchange scheme and the Four Frame Exchange scheme. In the following, we will analyze the energy consumtion for both schemes. To simlify the exressions in the analysis, we denote the 8. header size and ACK acket size by and N ack resectively. And we also define the following symbols: Fig.. State diagram for transmitting a acket from node i to node j in MACA. transmit data ackets at the minimum necessary ower level, but transmit RTS and CTS at the maximum ower level P m. Denote the MACA header size for data ackets by N maca, the = N + + N hy,n r = N rts + N hy N c = N cts + N hy, andn a = N ack + N hy. In 8., the number of retransmissions is limited e.g., the short retry limit is 7 and the long retry limit is 4 [6]. However, to simlify our analysis, we assume unlimited retransmissions

4 which should not affect the accuracy too much as most of the acket retransmissions will not be over the limits. the Two Frame Exchange scheme: In the Two Frame Exchange scheme, a node transmits a data acket if the channel is idle for a eriod that exceeds the Distributed Inter Frame Sace DIFS. If the channel is busy, it will defer the transmission and kee monitoring the channel until it is idle for a eriod of DIFS. And then,it starts backoff with a random backoff time. The backoff timer will be aused if the channel is busy and continued once the channel is idle again for the DIFS eriod. Once the backoff timer reaches zero, the node will transmit the data acket immediately. The receiver relies with an ACK to the sender after receiving the data acket successfully. If the transmitter doesn t receive the ACK within a redefined time eriod, the whole rocess will be reeated. Let the ACK acket error rate from node i to node j be a,i,j. The state diagram for transmitting a data acket from node i to one of its neighboring nodes, node j, isinfig.,where S is the initial state, S is the state in which node j receives the data acket, S is the state in which node i receives the ACK acket. Then, the average total transmission ower in transmitting a acket from node i to node j successfully is given by P T i, j = P N i,j + P a j,i i,j. 8 i,j a,j,i Similiarly, the average total receiving ower in receiving a acket from node i at node j successfully is obtained as P R i, j =P r + N a. a,j,i Therefore, the average total ower in sending a acket from node i to node j successfully is Fig.. P i, j =P T i, j+p R i, j. S a, j, i i, j i, j a, j, i S S State diagram for the Two Frame Exchange scheme. The average total ower consumed along the ath from the source node to the destination node M is P total = M P T i, i ++P R i, i + the Four Frame Exchange scheme: In the Four Frame Exchange scheme, nodes exchange two more frames before transmitting data ackets: RTS and CTS. More secifically, the sender transmits a RTS acket after the channel is available for a eriod longer than DIFS or the backoff timer reaches zero. 9 The receiver resonds with a CTS acket after receiving a RTS acket. If the CTS is not received within a redetermined time interval, the sender retransmits the RTS acket. After receiving the CTS, the sender will send out the data acket and the receiver will rely with an ACK acket after receiving the data acket successfully. If the transmitter doesn t receive the ACK acket within a redefined time eriod, the whole rocess will be reeated. The state diagram for transmitting a data acket from node i to one of its neighboring nodes, node j, is shown in Fig 4, where S is the initial state, S is the state in which node j receives the RTS acket, S is the state in which node i receives the CTS acket, S is the state in which node j receives the data acket, and S4 is the state in which node i receives the ACK acket. S Fig. 4. c, j, i r, i, j r, i, j c, j, i S i, j a, j, i S i, j S a, j, i S4 State diagram for the Four Frame Exchange scheme. Therefore, the average total transmission ower in successfully transmitting a acket from node i to node j is P T i, j = P m Nr + Nc r,i,j + Pi,j + P N j,i a i,j r,i,j c,j,i i,j a,j,i. i,j a,j,i And the average total receiving ower in successfully receiving a acket from node i at node j is N r N P R i, j =P 8 + Nc N8 + i,j + Na i,j a,j,i c,j,i r. c,j,i i,j a,j,i The average total ower consumed along the ath from the source node to the destination node M isthus P total = M P T i, i ++P R i, i +. III. MINIMUM ENERGY ROUTING SCHEME A key element in any minimum energy routing scheme is the link cost assignment. The accuracy of link costs determines the erformance of these schemes in terms of energy consumtion as well as throughut. Therefore, we need to determine link costs that can reresent real energy consumtion in wireless networks as accurately as ossible. Once we get the link costs, we can then modify the traditional shortest ath routing If a node receives a RTS but can t rely with a CTS because the channel is busy, we treat it as a RTS acket error in our analysis even though the RTS acket is received correctly. We call this as the busy channel roblem.

5 rotocols e.g. Bellman-Ford, DSR, and AODV to suort minimum energy routing. Currently, there exist three tyes of link costs: Transmission Power Level P i,j in the MTTP rotocols; TransCeiving Power Level P i,j + P r in the MTTCP rotocols; P Reliable Transmission Power Level i,j i,j, where L = L,,,... in the Protocols. However, these link costs could not accurately reresent the energy consumtion since they do not take the extra energy consumtion in MAC and Physical layers into account. Therefore, we need to derive new link costs for our minimum energy routing scheme. In Section II, we have introduced more accurate energy consumtion models for wireless networks. In this section, we will derive new link costs for our minimum energy routing scheme based on these models. A. Link costs for the EER mode Based on the energy consumtion models for two MAC rotocols CSMA and MACA in the eer mode develoed earlier, the minimum energy routing scheme would find a ath that minimizes Eq for CSMA or Eq 7 for MACA. Given these two equations, the average total ower over the ath can not be exressed as a linear sum of individual ower levels. Therefore we need to simlify these two equations. By using the same assumtion as that in [4] that transmission errors on a link do not sto downstream nodes from relaying the acket, we can aroximate Eq in CSMA by: M P i,i+ + P r M, i,i+ i+,i and Eq 7 in MACA by M Nr +Nc r,i,i+ P i,i++p r+p m+p r Nm r,i,i+ c,i+,i M i,i+ i+,i. 4 Note that, the numerators in these two equations can be exressed as a linear sum of ower levels and the logarithm of the denominators can be exressed as a linear sum of the logarithm of acket error rates. Therefore, we can let each node advertise two different metrics: one is P i,j+p r for CSMA and P i,j + P r +P m + P r Nr+Nc r,i,j N m for MACA; the other r,i,j c,j,i is log i,j j,i. With these two metrics and their cumulative values, every node can calculate P and select the minimum energy ath. From Eqs and 4, we can see that the variation in the data acket error rates for each link i,i+ or i+,i has a significant effect on the total energy consumtion as P is roortional to, which can be aroximated as + i,i+ i,i+ by using the Taylor exansion. For examle, if the data acket error rate on one link changes from. to., the total energy consumtion will be increased for about ercent. If data acket error rates on more than one link change, the total energy consumtion will be affected more dramatically. For CSMA, this could be a big roblem as the data acket error rates are very senstive to environment change such as noise, interference, and number of cometing nodes so that they may change very fast. To kee track of data acket error rates in CSMA will require a lot of routing overhead, which may consume more energy than the savings from minimum energy ath. Therefore, CSMA is not suitable for minimum energy routing if the enviroment is not static enough. On the other hand, in MACA, the sender exchanges RTS and CTS with the receiver before sending a data acket, the data acket error rates will not vary too much to cause a major concern. B. Link costs for the HHR mode It is easier to derive the link costs for the HHR mode since the average total ower over the ath is a linear sum of ower levels in each link. More secifically, for 8., we can use P T i, j+p Ri, j as the link cost. For the Two Frame Exchange scheme, the link cost is + P r C i, j =P i,j + Na i,j i,j a,j,i a,j,i + Na. 5 For the Four Frame Exchange scheme, the link cost is P m Nr N + Nc C 4i, j = 8 N 8 r,i,j P i,j + Na N + 8 i,j r,i,j c,j,i i,j a,j,i i,j a,j,i Nr N + Nc +P 8 N8 c,j,i + c,j,i i,j + Na N 8 c,j,i i,j a,j,i r. 6 c,j,i i,j a,j,i From Eqs. 5 and 6, we can see that the variation in the acket error rates may have some high effects on the energy consumtion for transmitting the data acket from one node to another. However, this is not as significant as in EER since the energy consumtion in one link is far smaller than the total energy consumed along the ath from the source to the destination, esecially when the number of links is large enough. IV. SIMULATION RESULTS In this section, we evaluate the roosed energy consumtion models and comared several minimum energy routing schemes via simulations. A. Energy Consumtion Models In this set of simulations, We obtain the energy consumed for transmitting data ackets from the source node to the destination node,, 4, 5, or 6 using GlomoSim. The transmission ower level is mw for data ackets, and 5mW for RTS and CTS ackets. To exclude the imact of finding a route on the energy consumtion, we use static routing. In addition, we assume that there is no ower saving mode for the nodes, and accordingly, a receiving node will send the same amount of energy in monitoring the channel even if it doesn t receive a acket. In this way, we need to focus only on the transmission ower in simulations and comare that with the transmission ower redicted by various models. For this reason, we will only comare the accuracy of the energy consumtion models used in MTTP and with

6 our models. Note that, in terms of redicting the transmission ower, the model used in MTTCP is as inaccurate as the model used in MTTP. In terms of redicting the total energy consumtion, the model used in MTTCP is more accurate than that in MTTP and, but still not as accurate as our model as the energy needed for receiving control ackets is ignored in the model used in MTTCP as well as MTTP and. Energy Consumtion Models for EER: In this mode, we use FTP File Transfer Protocol to transmit 6, data ackets with 5 bytes er acket. To reduce the imact on the energy consumtion due to FTP control ackets, we set the size of FTP control ackets to one byte. The acket error rates for CSMA and MACA are set to.5 and. resectively. The simulation results and the energy consumtion estimated by each model are shown in Figs. 5 and 6. It is clear that our models match the simulation results very well in both CSMA and MACA. On the other hand, both MTTP and models, which resulted in almost the same energy consumtion estimate due to the low acket error rate esecially in the case of MACA, are seen to underestimate the energy consumtion significantly and the underestimation increases with the number of intermediate nodes. In addition, the underestimation is much more in MACA than in CSMA. The reason is that the MTTP and models in MACA not only do not consider the energy consumtion by ACK and the number of ACK retransmissions on the Transort layer, but also ignore the energy consumtion for RTS and CTS in the MAC layer. Energy Consumtion mwhr Simulation Our Model MTTP Energy Consumtion mwhr Fig Simulation Our Model MTTP 4 5 M Energy consumtion for simulation and analysis with MACA. and the underestimation is more serious as the number of intermediate nodes increases. In addition, the underestimation is much larger in the Four Frame Exchange scheme than in the Two Frame Exchange scheme. Energy Consumtion mwhr Simulation Our Model MTTP M Fig. 7. Energy consumtion for simulation and analysis with Two Frame Exchange scheme. Fig M Energy consumtion for simulation and analysis with CSMA. Energy Consumtion Models for HHR: In this mode, we use CBR Constant Bit Rate to transmit 65,56 data ackets. The acket error rate is set to. for both the Two Frame Exchange scheme and the Four Frame Exchange scheme. The simulation results and the energy consumtion estimated by each model are shown in Figs. 7 and 8. Our models match the simulation results quite well in both schemes. Again, MTTP and models underestimate the energy consumtion B. Minimum Energy Routing Schemes In this set of simulations, we modified AODV to suort minimum energy routing schemes in GlomoSim. We changed the battery model in GlomoSim by setting the battery efficiency to, and in addition removed the energy consumtion for receiving ackets or monitoring the channel. The area simulated is m m, the received ower threshold is set to 8 dbm, the available transmission ower levels are, 5,, 5,, 5, and 5mW, and the rocessing ower level is.5mw. The nodes are uniformly distributed and the airs of source and destination nodes are randomly selected. The connection requests arrive according to a Poisson rocess

7 .7.6 Simulation Our model MTTP 7 x 5 6 Energy Consumtion mwhr Energy Consumtion er Packet mwhr M Fig. 8. Energy consumtion for simulation and analysis with Four Frame exchange scheme. Fig. 9. Energy consumtion er acket in MACA. and the connection duration is exonentially distributed. The data acket size is 5 bytes and the data rate is Mbs. Since the authors in [4] already showed that the is better than the MTTP, we will only comare our rotocol to and Scheme, which uses AODV as the routing rotocol and adjusts the transmission ower according to the distance between the sender and the receiver. We study two erformance metrics for these three rotocols. For the EER mode, these two metrics are: Energy consumtion er acket, which is defined as the total energy consumtion divided by the total number of ackets transmitted successfully; Number of ackets transmitted, which reresents the effective throughut. For the HHR mode, the two erformance metrics are: Energy consumtion er acket;percentage of ackets transmitted, which is defined as the number of ackets received by the destination correctly divided by the number of ackets transmitted by the source. This metric also reflects the throughut if the end-to-end delay is almost the same for each acket. The higher the ercentage of the ackets transmitted, the higher the throughut. EER mode: In this mode, we use FTP as our alication rotocol. The connection arrival rate is er hour and the average connection duration is 6 minutes. We simulate each rotocol for hours in MACA. The amount of energy consumed and number of ackets transmitted are collected. The simulation results are shown in Figs. 9 and. As can be seen from Fig. 9, our rotocol has the least energy consumtion er acket, followed by and the Power Control scheme. However, in terms of the number of ackets transmitted, The scheme erforms the best, followed by our rotocol and. That is because the number of ackets transmitted is mainly determined by endto-end delay and acket error rate. The larger end-to-end delay and acket error rate, the less number of ackets transmitted. As the uses the least number of intermediate nodes, it will have the least delay and end-to-end acket error Number of Packets transmitted 4 x Fig.. Number of ackets transmitted in MACA. rate. Therefore it has the most number of ackets transmitted. It is worthwhile to oint out that we simulated the rotocols using toologies with different density and only allowed discrete transmit ower levels so that the curve for each rotocol is not so smooth. However, as we are only interested in comaring the erformance of three rotocols with the same number of nodes, but not the erformance of any given rotocol with different numbers of nodes, this henomena doesn t affect our analysis. HHR mode: In this mode, we used CBR 5 ackets er second as our alication rotocol. The connection arrival rate is 5 er hour and the average connection duration is minutes. We simulated each rotocol for one hour using the Two Frame Exchange scheme and the Four Frame Exchange scheme. The amount of energy consumed, the number of ackets transmitted and the number of ackets received correctly are monitored. The simulation results are deicted in Fig. through 4.

8 7 x Energy Consumtion er Packet mwhr 5 4 Fig.. Percentage transmitted Fig.. Energy Consumtion er Packet mwhr Energy consumtion er acket in two frame scheme Percentages of ackets transmitted in two frame scheme. 7 x Percentage transmitted Fig Percentages of ackets transmitted in four frame scheme. As can be seen from these figures, our scheme also has the best erformance in terms of energy consumtion er acket, followed by and the scheme. Our scheme can also transmit a higher ercentage of ackets as comared to. However, the scheme has the lowest ercentage of ackets transmitted in the Two Frame Exchange scheme but the highest ercentage of ackets transmitted in the Four Frame Exchange scheme. This is exlained as follows. In the Two Frame Exchange scheme, most of the ackets lost are caused by the asymmetric ower roblem.inthe scheme, the transmission ower can vary between the minimum and the maximum, hence the asymmetric roblem is very serious. and our rotocol use more short-distance links to save energy, hence the transmission ower for each link does not change significantly. However, uses more intermediate nodes than our scheme. Therefore, our rotocol has the highest ercentage of ackets transmitted, followed by and the ower control scheme. In the Four Frame Exchange scheme, as the nodes exchange RTS and CTS at the maximum ower level, the asymmetric ower roblem can be ignored. However, it has the busy channel roblem see footnote. If the number of RTS retransmissions is over the limit because of the busy channel roblem, the node has to discard the data acket. Most of the ackets are lost in this way in the Four Frame Exchange scheme. Obviously, more radio transmissions would make the busy channel roblem more serious. Therefore, has the lowest ercentage of ackets transmitted because it uses the largest number of intermediate nodes that generate the highest number of radio transmissions. And the ower control scheme has the highest ercentage of ackets transmitted, followed by our rotocol. Fig.. Energy consumtion er acket in four frame scheme. One node cannot sense other nodes radio transmission because they use a low transmission ower, however this node can cause collision if it sends ackets to one of its neighboring nodes using a high transmission ower.

9 V. CONCLUSION In this aer, we have develoed, for the first time, energy consumtion models for common wireless ad hoc networks that take the energy consumtion in sending control ackets into account as well. These theoretical models have been verified to be much more accurate than existing models used by the minimum total tranmission ower routing rotocols, the minimum total transceiving ower routing rotocols, and the minimum total reliable transmission ower routing rotocols. Based on our models, we have also roosed a minimum energy routing scheme. Our simulation results have shown that our scheme erforms better than other existing schemes in terms of both the energy consumtion and the effective throughut. As many current 8. cards already suort the functions of received ower measurement and transmission ower setting, it is easy to imlement our scheme in real alications. REFERENCES [] S. Singh and C. Raghavendra, Pamas-ower aware routing in mobile ad-hoc networks, In Proceedings of Mobicom, Oct [] S. Doshi, S. Bhandare, and T. X Brown, An on-demand minimum energy routing rotocol for a wireless ad hoc network, in ACM Mobile Comuting and Communications Review, vol. 6, no., July. [] V. Rodolu and T. Meng, Minimum energy mobile wireless networks, IEEE Journal on Selected Areas on Communications, vol. 7, Aug [4] S. Banerjee and A. Misra, Minimum energy aths for reliable communication in multi-ho wireless networks, MOBIHOC, June. [5] J. Gomez, A. T. Cambell, M. Naghshineh, and C. Bisdikian, Conserving transmission ower in wireless ad hoc networks, in Proc. of IEEE Conference on Network Protocols, Nov. [6] ANSI/IEEE Std 8., 999 Edition. [7] E. Jung and N. H. Vaidya, A ower control MAC rotocol for ad hoc networks, MOBICOM, Set.. [8] V. Kawadia and P. R. Kumar, Power control and clustering in ad hoc networks, in Proceedings of IEEE INFOCOM,. [9] C. E. Perkins, E. M. Belding-royer, and S. R. Das, Ad hoc On-demand Distance Vector AODV routing, Mobile Ad Hoc Networking Working Grou Internet Draft, 4 Nov.. [] E. M. Royer, and C. K. Toh, A review of current routing rotocols for ad hoc mobile wireless networks, IEEE Personal Communications, Aril 999. [] Theodore S. Raaort, Wireless communications rinciles and ractice, PRENTICE HALL.

A Novel Power Optimized Routing Model for Mobile Ad Hoc Networks

A Novel Power Optimized Routing Model for Mobile Ad Hoc Networks A Novel Power Optimized Routing Model for Mobile Ad Hoc Networks Ashay Indrabhan Rokade Mtech, VVIT College Hyderabad, India rokadeashay@gmail.com Abstract: In today s world, Energy preservation is significant

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

IN an ad hoc wireless network, where nodes are likely to

IN an ad hoc wireless network, where nodes are likely to 1432 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 10, OCTOBER 2006 Otimal Transmit Power in Wireless Sensor Networks Sooksan Panichaiboon, Student Member, IEEE, Gianluigi Ferrari, Member, IEEE, and

More information

Power Aware Routing using Power Control in Ad Hoc Networks

Power Aware Routing using Power Control in Ad Hoc Networks Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Computer Communications

Computer Communications Comuter Communications 34 (2011) 54 67 Contents lists available at ScienceDirect Comuter Communications journal homeage: www.elsevier.com/locate/comcom Review A survey of energy efficient MAC rotocols

More information

Cooperative Diversity Combined with Beamforming

Cooperative Diversity Combined with Beamforming Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In

More information

Performance Analysis of IEEE

Performance Analysis of IEEE Performance Analysis of IEEE 8. Deartment of Electrical and Comuter Engineering Rutgers University, Piscataway, NJ 8854 Abstract. Introduction Existing work includes [Bianchi ], and some roblems that we

More information

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN htt://dx.doi.org/10.5755/j01.eee.20.3.3951 ELEKRONIKA IR ELEKROENIKA, ISSN 1392-1215, VOL. 20, NO. 3, 2014 PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN Ke Xiong 1, Yu

More information

PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON AD HOC NETWORKS

PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON AD HOC NETWORKS PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON 802.11 AD HOC NETWORKS Alexandre Andrade Pires and JosC Ferreira de Rezende GTA - COPPE Universidade Federal do Rio de Janeiro, Brazil Ernail: {andrude,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

BLAM: An Energy-Aware MAC Layer Enhancement for Wireless Adhoc Networks

BLAM: An Energy-Aware MAC Layer Enhancement for Wireless Adhoc Networks : An Energy-Aware MAC Layer Enhancement for Wireless Adhoc Networks Sameh Gobriel, Rami Melhem and Daniel Mossé Computer Science Department, University of Pittsburgh {sameh, melhem, mosse}@cs.pitt.edu

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Performance Incentives for Cooperation between Wireless Mesh Network Operators

Performance Incentives for Cooperation between Wireless Mesh Network Operators Performance Incentives for Cooeration between Wireless Mesh Network Oerators Xenofon Fafoutis and Vasilios A. Siris Institute of Comuter Science, Foundation for Research and Technology - Hellas (FORTH)

More information

New Techniques for Making Transport Protocols Robust to Corruption-Based Loss

New Techniques for Making Transport Protocols Robust to Corruption-Based Loss New Techniques for Making Transort Protocols Robust to Corrution-Based Loss Wesley M. Eddy NASA GRC / Verizon weddy@grc.nasa.gov Shawn Ostermann Ohio University ostermann@eecs.ohiou.edu Mark Allman ICSI

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways IJCSNS International Journal of Comuter Science Network Security, VOL.10 No.11, November 2010 63 QSRED, An Algorim To Solve The Mismatch Between The Microscoic Macroscoic Behavior of RED Gateways Nabhan

More information

Available online at I-SEEC Proceeding - Science and Engineering (2013)

Available online at  I-SEEC Proceeding - Science and Engineering (2013) Availale online at www.iseec.com I-EEC roceeding - cience and Engineering (3) 69 86 roceeding cience and Engineering www.iseec.com cience and Engineering ymosium 4 th International cience, ocial cience,

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

TCP over Multihop Networks: Issues and Performance Enhancement

TCP over Multihop Networks: Issues and Performance Enhancement TCP over Multiho 8.11 Networks: Issues and Performance Enhancement Kitae Nahm nahm@sii.usc.edu Ahmed Helmy helmy@usc.edu Deartment of Electrical Engineering University of Southern California, Los Angeles,

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

A Novel Implementation of TCP Vegas for Optical Burst Switched Networks

A Novel Implementation of TCP Vegas for Optical Burst Switched Networks A Novel Imlementation of TCP Vegas for Otical Burst Switched Networks Basem Shihada 1, Qiong Zhang, Pin-Han Ho 1, and Jason P. Jue 3 1 Deartment of Electrical and Comuter Engineering, University of Waterloo,

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

Distributed Systems (5DV147)

Distributed Systems (5DV147) Distributed Systems (5DV147) Mutual Exclusion and Elections Fall 2013 1 Processes often need to coordinate their actions Which rocess gets to access a shared resource? Has the master crashed? Elect a new

More information

AN early generation of unstructured P2P systems is

AN early generation of unstructured P2P systems is 1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

A Power Control MAC Protocol for Ad Hoc Networks

A Power Control MAC Protocol for Ad Hoc Networks A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A&M University, College Station esjung@cs.tamu.edu Nitin H. Vaidya Dept. of Electrical and Computer Engineering,

More information

A Robust Implicit Access Protocol for Real-Time Wireless Collaboration

A Robust Implicit Access Protocol for Real-Time Wireless Collaboration A Robust Imlicit Access Protocol for Real-Time Wireless Collaboration Tanya L. Crenshaw, Ajay Tirumala, Sencer Hoke, Marco Caccamo Deartment of Comuter Science University of Illinois Urbana, IL 61801 {tcrensha,

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Mung Chiang, Daniel ONeill, David Julian andstehenboyd Electrical Engineering Deartment Stanford University, CA 94305, USA Abstract-

More information

Reliability in Underwater Inter-Vehicle Communications

Reliability in Underwater Inter-Vehicle Communications Reliability in Underwater Inter-Vehicle Communications Amrita A. Nimbalkar and Dario Pomili Rutgers, The State University of New Jersey Deartment of Electrical and Comuter Engineering 94 Brett Road, Piscataway,

More information

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels Shoko Uchida, Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering,

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

CHAPTER 7 SIMULATION OBSERVATIONS

CHAPTER 7 SIMULATION OBSERVATIONS CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

A Low-latency and Energy-efficient TDMA Protocol for Wireless Sensor Networks

A Low-latency and Energy-efficient TDMA Protocol for Wireless Sensor Networks A Low-latency and nergy-efficient Protocol for Wireless Sensor Networks Guoqiang Zheng 1, 2, a, Yaru Sun 1, b, Huahong Ma 1, c, Baofeng Ji 1, d, Jishun Li 2, 3, e and Yujun Xue 2, 3, f 1 School of lectronic

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

3D Surface Simplification Based on Extended Shape Operator

3D Surface Simplification Based on Extended Shape Operator 3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless Personal Area Networks

Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless Personal Area Networks International Journal of Computer Applications (975 8887) Volume 55 No.1 October 1 Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless ersonal

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

IEEE High Performance Serial Bus

IEEE High Performance Serial Bus IEEE 1394-1995 High Performance Serial Bus Michael D. Johas Teener Editor, P1394 Working Grou Plumbing Architect, Ale Comuter, Inc. One Infinite Loo, MS 35-OEM Cuertino, CA 95014 teener@ale.com Background

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Power Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks

Power Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks Wireless Network, 2016, 8, 13-23 Published Online February 2016 in SciRes. htt://www.scir.org/journal/wsn htt://dx.doi.org/10.4236/wsn.2016.82002 Power Efficient Scheduled-Based Medium Access Control Protocol

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Election Algorithms. has elected i. will eventually set elected i

Election Algorithms. has elected i. will eventually set elected i Election Algorithms Election 8 algorithm designed to designate one unique rocess out of a set of rocesses with similar caabilities to take over certain functions in a distributes system central server

More information

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

Aligned Beacon Transmissions to Increase IEEE s Light Sleep Mode Scalability

Aligned Beacon Transmissions to Increase IEEE s Light Sleep Mode Scalability Aligned Beacon ransmissions to Increase IEEE 802.11s Light Slee Mode Scalability Marco Porsch and homas Bauschert echnische Universität Chemnitz, Reichenhainer Str. 70, 09126 Chemnitz, Germany {marco.orsch

More information

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort

More information

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

forward packets do not forward packets

forward packets do not forward packets Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Scheduling of real-time traffic in IEEE networks

Scheduling of real-time traffic in IEEE networks Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt

More information

A Comparative Study of Power Aware Routing Protocols of Ad Hoc Network

A Comparative Study of Power Aware Routing Protocols of Ad Hoc Network A Comparative Study of Power Aware Routing Protocols of Ad Hoc Network Shilpa Mehta Tamanna Mukesh Kumar EI DEPTT, TITS BHIWANI CSE DEPTT, TITS BHIWANI ECE DEPTT,UIET,KUK ABSTRACT An adhoc mobile network

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Accurate Assessment of Link Loss Rate in Wireless Mesh Networks

Accurate Assessment of Link Loss Rate in Wireless Mesh Networks Accurate Assessment of Link Loss Rate in Wireless Mesh Networks Bing Qi, Saad Biaz qibing1@auburn.edu, biazsaa@auburn.edu Technical Report CSSE08-02 Dept. of Computer Science and Software Engineering Auburn

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information