Reliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor Networks

Size: px
Start display at page:

Download "Reliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor Networks"

Transcription

1 Reliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor etworks Lin Guo and Qi Han Department of Electrical Engineering and Computer Science Colorado School of Mines 15 Illinois Street, Golden, CO, 841 Abstract Reliably collecting data from mobile sensor nodes is essential with the increasing popularity of integrating mobile nodes into stationary sensor network infrastructure for various scientific and social applications. Existing sensor data collection protocols demonstrate high reliability in stationary sensor networks, but when applied to mobile nodes, the packet acceptance ratio drops significantly. This is because the topology changes due to mobility are not well detected by routing protocols. We present Location-Aware Relay Association Protocol (), a relay association protocol that is independent of any routing protocols and adopts distance measurement techniques to detect topology changes. Instead of reinventing yet another routing protocol, complements it by estimating the distances between a mobile node and its current parent node in the infrastructure network. notifies the routing protocol to trigger route refreshes when a node moves out of the effective communication range of its parent. By continuously adapting to changing topologies in a fast and efficient manner, improves the network reliability and throughput when nodes are moving. In test bed experiments, achieves higher network throughput and lower control overhead than other comparable protocol in data collection applications with high data rate under various mobile environments. Keywords-Reliable data collection, Mobile wireless sensor network, High data rate, Relay association protocol I. ITRODUCTIO Wireless sensor networks (WSs) have been used in a wide range of applications such as structural health monitoring in remote or hostile environments. The use of low power sensors offers the benefit of continuously collecting data at unprecedented spacial and temporal scales. Many applications expect to reliably receive data at a very high data rate from sensors that might be mobile. For instance, voice and video data may be collected from sensors carried by first responders who move around at a disaster site to improve emergency response; patient-specific data may be monitored and collected from sensors worn by patients and these patients do not stay still for a long period of time [1]; structural health monitoring applications [2] collect data from sensors mounted on continuously rotating parts such as wind turbines or aircraft wings. In this work, we investigate how to provide reliable data collection from mobile sensors with high data rates. We specifically consider the scenario where mobile sensors co-exist with static sensors in the area of interest. This hybrid infrastructure allows for mobile nodes in the network to move to any location while still maintaining communication with stationary nodes. These stationary nodes (also called infrastructure nodes) provide necessary network coverage of the area. Mobile nodes are able to move around the coverage area based on application needs and use infrastructure nodes to transmit data to the base station. In other words, we assume each mobile node is always able to communicate with at least one infrastructure node. Therefore, the impact of mobility is limited to the first hop between a mobile node and the base station. The requirements of high data rate, mobility support, and reliable data collection pose significant challenges. First, the high data rate traffic consumes more bandwidth than low data rate traffic and pushes the network to the capacity limit. Second, the movement of sensors results in the change of communication links. The routing protocol should be adaptive to the topology change in order to identify a reliable and efficient path. Last, dynamic wireless links are notoriously known to present variable and unreliable link quality even in stationary networks and stable environmental conditions. The mobility of sensor nodes exacerbates the situation. In the literature, techniques have been developed to deal with high data rate, node mobility, and reliability separately. For instance, various techniques has been proposed to support high data rate applications in mobile ad-hoc networks (MAETs); numerous routing protocols have been developed to deal with mobility in MAETs. However, these techniques are not appropriate for WSs since WSs are more resource constrained than MAETs and end-to-end connectivity is not always available in WSs. One popular reliable data collection method for WSs is Collection Tree Protocol (CTP) [3], but it is designed for low data rate applications and it is not specifically addressing node mobility either. We argue that providing reliable data collection from mobile sensors with high data rates in WSs requires a holistic approach that is more than a crude composition of existing techniques addressing each individual requirement.

2 The goal of our work is to design an efficient strategy to reliably collect data from mobile nodes with high data rates in wireless sensor networks. Considering that a large number of routing protocols have already been developed for WSs, our approach is to design a relay association protocol for mobile nodes. The relay association protocol can work with any existing routing protocol and is responsible for effectively detecting invalid routes and then establishing a new route for mobile nodes. Our proposed relay association protocol achieves this by keeping track of the movement of mobile nodes. In contrast, a routing protocol runs on stationary nodes and is responsible for multi-hop communication in hybrid WSs. The primary objective of our protocol is to improve reliability and throughput in mobile environments. Reliability is an important metric from applications perspective. For example, the quality of voice data stream might become unacceptable when the reliability drops below 9%. With the improvement of reliability and decreased communication overhead, our approach indirectly improves the network throughput, thereby satisfying the high bandwidth requirement of high data rate applications. II. RELATED WORK Many techniques have been developed to handle lossy wireless links in static WSs. For example, the Estimated Transmission Times (ETX) is used to quantify transient link quality changes while selecting the best parent in route. Packet acknowledgement and retransmission with efficient control strategy is adopted to avoid packet loss in wireless links. One popular reliable routing protocol in WSs is Collection Tree Protocol (CTP) [3]. It forms a routing tree from the source nodes towards the base station. CTP achieves over 99.99% reliability in stationary WSs for low date-rate (i.e., less than 5 packets per second) applications. The general routing strategy to deal with mobility is maintaining the entire network topology view and reroute to a new path when the node moves. Even though the strategy works well in MAETs, it is not applicable for WSs. This is because sensor hardware platforms are known to be resource limited. The typical memory size of a sensor node is less than 1 KBytes which is not enough to hold the entire routing information. The situation becomes worse when high volume data are injected into the network, causing network congestion and significant drop in reliability. Existing WS routing protocols lack supporting mobility and fail to find the efficient route in mobile environments. This results in significant packet loss and network reliability degradation [1]. The major reason for route failure is that routing protocols do not have the knowledge of the mobile nodes and thus can not effectively adapt to topology changes when nodes are moving. For instance, CTP [3] assumes that neighbors are static and the change of link quality is transient, it takes a number of message exchanges to know the change of topology. Various techniques and systems has been proposed to support high data rate application in MAETs. Considering resource and network bandwidth limitation of WSs, the MAET techniques are not suitable for WSs. First, The packet size of WSs is often around 3-5 Bytes which is much smaller compared to 1 KBytes packet size in MAETs [4]. The MAET MAC and routing protocols incur excessive overhead due to large packet size. For some protocols, it is even hard to fit the message into small packets if the message structure is larger than the limitation of packet size in the sensor network. Second, WSs typically use low bandwidth IEEE radios while MAETs are typically networked with high bandwidth wireless links according to IEEE82.11x standard. For example, the achievable data rate in WSs is from 2Kbps with 868 MHz band to 25 Kbps with 2.4 GHz band. In MAETs, the data transfer rate ranges from 1 Mbps to over 5 Mbps. Last, there are limited computation and memory resources and severe energy constraints in sensor nodes. Those limitations require protocols to be efficient in terms of computation and memory complexity. For example, most mobile devices have 32 bit processors, 1+ MBytes memory, and powerful battery supplies. The typical sensor node has a 8 bit processor, 1 KBytes memory, and is powered by two AA sized batteries. The most relevant work is Dynamic Relay Association Protocol () [1]. It is used to collect data from sensors worn by patients. limits the mobility on first hop communication and shows better performance than CTP. In clinical health monitoring the typical data rate is 1 packet every second. detects invalid communication links with a reactive strategy. When the number of packet loss exceeds the predefined threshold, the current routing path is determined as invalid and then triggers the node to select a new node for routing. This reactive strategy works well in low data rate applications. However, it is not suitable for high data-rate applications. If an aggressive threshold is used, results in unnecessary rerouting overhead and decreases the performance. On the other hand, with a conservative threshold, fails to detect invalid links in a timely manner, thereby leading to degradation of reliability. III. LOCATIO-AWARE RELA ASSOCIATIO To ensure fast responses to topology changes caused by mobile nodes, we develop a proactive location-aware relay association protocol (). does not assume any prior knowledge of the node movement history and does not attempt to predict the movement patterns of nodes either. The mobile stress studies [1] conducted for clinical monitoring applications indicate that a typical routing protocol such as CTP [3] designed for stationary WSs fails to identify suitable parents in the routing tree for mobile nodes. To overcome this drawback, uses relative distances between nodes to infer whether a node might have moved

3 out of the effective communication range of its current parent in the routing tree. Therefore, the routing protocol can use this information to better cope with node mobility by broadcast the routing beacons to the neighbours and updating the stale routing information. Specifically, instead of finding the accurate locations of mobile nodes, estimates the relative distance from a mobile node to its parent stationary node. Using this relative distance, infers whether the mobile node is still within the maximum transmission range (also called distance threshold d th ) of the current parent. If the node moves away from its parent more than the threshold, will trigger the routing protocol to refresh the route so that a new parent will be used for the mobile node. Otherwise, the topology is considered stable, so the routing protocol will determine the next hop node as usual. However, it is not reasonable to assume that the communication range remains constant since the quality of radio links is essentially time-varying and also different hardware platforms and power levels usually have different communication ranges. To this end, employs an adaptation strategy for dynamically adjusting communication ranges based on current network conditions. In the following, we first discuss how relative distance between nodes is estimated and then present adaptive communication ranges used by. A. RSS-based Distance Estimation To calculate the relative distance between a mobile node and its current parent infrastructure node, we adopt the RSS (Received Signal Strength) based statistical model. RSS-based measurement has been widely used in various localization approaches because it is a low-cost solution for many applications in WSs. The RSS measurement is simple to implement in resource-constrained hardware platforms. It is also inexpensive to measure the RSS value in each receiver during normal data communication without extra communication and energy cost. TOA (Time of Arrival) based localization approach [5] requires sensitive timer and high time synchronization accuracy. AOA (Angle of Arrival) based localization approach [5] requires additional directional antenna in specific topology. Compared with TOA and AOA measurement, RSS measurement is more attractive due to its low complexity and cost. Typically, the received power in radio communications decays proportionally to d 2, where d is the distance between a node pair [5]. The received signal strength is affected by multipath reflection and environment noise, and the error of RSS measurement can impact the accuracy of estimated distance [6]. Assuming these effects are randomized, the received power at a given distance is modelled as a log-normal distributed variable as in Equation (1), where P (d )[dbm] is the prior known reference power at the reference distance d, n p is the environment-specific path loss exponent. X σ is Gaussian distributed random variable with standard deviation σ. X σ represents the random effect of a real environment. P r (d)[dbm] = P (d )[dbm] 1n p log 1 ( d d ) + X σ (1) Based on Gaussian probability density function, we can derive the maximum estimated distance between the transmitter and the receiver as follows. P r 1 d = d ( P (d ) )( np ) (2) In Equation (2), P r and P are measured in millliwatts instead of dbm. Distance estimation and route update are done as follows. Require: Reference Power P, Reference Point d, Pass loss exponent n p, Initial Threshold D init 1: if receive beacon from parent then 2: Get RSSI value from incoming beacon 3: Calculate d using Equation (2) 4: if d d th then 5: trigger routing update. 6: end if 7: end if Distance estimation is complementary to the routing protocol. It does not need additional beacons running in the nodes. calculates the relative distance between a mobile node and its current parent using original routing beacons. The routing protocol uses periodic beacons to detect the link quality and topology. B. Adaptation of Distance Threshold The accuracy of RSS-based distance estimation is limited by additive noise and shading effect. The empirical study of distance measurement approaches on MICA2 sensors shows that accuracy of radio-based RSS measurement is low (2-4 meters) even in good conditions [7]. Since distance measurement errors are inevitable in practice, the routing protocol using this technique must be robust and tolerant of imprecise location or distance information. We also realize it is hard to balance the efficiency and cost with a fixed distance threshold. A smaller distance threshold is agile to topology changes, but decreases routing stability and uses more energy. In contrast, a larger distance threshold reduces the routing cost but might lead to stale and ineffective routings. To this end, dynamically adjusts the distance threshold, aiming to achieve both agility and low cost. In general, if a node establishes the same route as before after refreshing, increases the threshold to suppress future route refreshes. If a node detects the burst of packet loss or the continuous degradation of link quality, lowers the threshold to a smaller value to refresh the route.

4 Growing the threshold: suppresses route refreshes by monitoring any parent changes after reroute. The same parent implies that the previous link still maintains good connectivity but the node thought the link was broken due to mobility. The unmatched result reflects the effect of inaccurate distance estimation and dynamic channel condition. The same route selection will be fed back to the distance estimation module to increase the distance threshold D th a larger value. Inspired by the Trickle algorithm for efficient code maintenance and propagation in WSs [8], we design to scale up D th by a factor of distance when the same parent is selected after route refreshing. When adapting D th exponentially, quickly suppresses unnecessary route refreshes and becomes more tolerant of location measurement errors in dynamic radio communication. Shrinking the threshold: decreases the distance threshold when a burst of packet loss is observed in current link. Here, we define the size of packet loss as the parameter W loss. The packet loss information is pulled from the routing layer. The receiving node counts the sequence of routing beacons from the neighbor. If the current link drops more than W loss packets, modifies the distance threshold to a smaller value. Similar to the adapting mechanism in growing the threshold, multiples D th by a factor of 1/ distance when shrinking the threshold. With the new smaller threshold, is more sensitive to the location changes of mobile nodes and is more likely to trigger the routing protocol to update the routes. Figure 1 shows the process of adjusting distance threshold based on the feedback from the routing protocol. uses both regular route beacons and the packet losses to adjust the distance threshold in two parallel components. When mobile nodes receive packets from the parent nodes, measures the RSS value of the incoming packets to estimate the relative distance among the mobile node and its parent. If the estimated distance exceeds the threshold D th, it triggers the routing protocol to refresh the route. To protect the route refreshing from interrupt, the refresh flag will be set to true when the routing protocol starts refreshing. When it finishes route update and selects new parent, the refresh flag will be set to false. During the route refresh which is indicated by refresh flag, new refreshing request will be ignored since the routing protocol is currently refreshing the route table. Simultaneously, tracks the number of packet losses to determine when to shrink the threshold D th. If the packet loss exceeds the loss window W loss, it will decrease the threshold D th to a smaller value. IV. PERFORMACE EVALUATIO The performance of is evaluated against [1] under various real world mobile conditions using data collection applications with different data rates. is chosen as the comparison candidate because previous work shows that outperforms well-known CTP [3] when Estimate the relative distance (Mobile ode, Parent) Distance(Mobile ode, Parent) > distance threshold? Figure 1. When Mobile ode Receives Packet From Parent refresh flag == true? Set refresh flag to true, Refresh Routing Table Set refresh flag to false Does the Parent change? Grow distance threshold End Packet Loss > loss window? Shrink distance threshold Adaptation of Distance Threshold collecting data from mobile nodes for clinic monitoring applications [9]. In the experiments, we measure the receiving data rate ratio and number of beacons. The sending (or receiving) data rate is computed as the total number of sending (or receiving) packets divided by the duration of test. Receiving data rate ratio is the ratio of receiving data rate to the sending data rate. The receiving data rate ratio measures the network reliability under different traffic load. The number of beacons measures the network routing packets overhead which reflects the efficiency of routing strategy. A. Testbed Setup We deploy an infrastructure network with 11 TelosB nodes in a closed office environment illustrated in Figure 2. The sensors are distributed in four walls of the room. On each wall, the sensors are placed in a line with equal distance apart. The infrastructure nodes provide the communication coverage in the space. They are running regular CTP protocol and do not inject data traffic in the network. The base station is placed in one corner of the office to best explore the depth of network. Mobile sensors are attached to IRobots which can be programmed to move around in the office. We used robots to carry sensors so that experiments can be repeated. Figure 3 shows the robots loaded with the sensors. The mobile nodes are running both relay protocols and CTP protocols. They inject data traffic with specified data rate and send the data towards the base station. The robot is programmed to move forward at a given speed. Once the robot runs into obstacles,

5 3.6m 5.5m Figure 2. Testbed: The green square denotes the base station. Red circles denote the infrastructure node. Blue stars represent mobile nodes. The solid line are forwarding links in the routing tree while dashed lines are relay links at the current position. a fitted curve with the power and distance data to calculate np. The experiment consists of one sender and one receiver. The sender is broadcasting packets, and the receiver records the receiving power level at the given distance. We vary the distance among the sender and receiver, and record the corresponding power readings at the receiver. Figure 4 shows the measurement and fitted curve. From our experimental data, np is calculated as Distance(meter) it moves back and turns around at random angle to avoid the obstacles. Since the office is occupied with desks and chairs, the robots are eventually moving in random patterns. Measured Distance RSS Measurement Power(milliwatts) Figure 4. RSS Measurement model for different distances listed in Table I. The fitted curve plots Equation 2. Figure 3. IRobot with two TelosB nodes attached To make sure and are run under the same movement condition for fair comparison, we placed two sensors in one robot. One is running at channel 15 and the other is running at channel 21. Corresponding to two mobile nodes running two protocols, we deployed two set of infrastructure nodes which have the same network topology. One network uses channel 15 and the other uses channel 21. B. Setup There are several configurable parameters in RSSI Equation 2 we need to determine when setting up. Those parameters should be configured based on environment and application scenarios. 1) d, p, np (Constants in Equation (2)) d represents the reference distance which can be configured with any distance value. In our implementation, d is set as 1 meter for simplicity. p represents the reference receiving power at the reference distance. Since d is set to 1 meter, the p is determined as 39dbm correspondingly. np is the path loss exponent and depends on the sensor hardware and environment. To determine np for our hardware and environment, we implemented a smallscale experiment and measured the power data with a variety of distances listed in Table I. We then plotted 2) Dinit (Predefined Distance Threshold) The appropriate value of Dinit helps to minimize the warm up time of the protocol. Otherwise, the protocol will take longer time to adjust the threshold to an appropriate value. In our implementation, we set initial distance Dinit to 3 according to the TelosB hardware manual [1]. 3) distance (Distance Adjustment Amount) distance relates to the velocity of the mobile nodes. The higher velocity the mobile nodes moves, the more amount we need to adapt in distance threshold. In our implementation, we configured distance adjustment factor distance to 2 from practical experience under low-speed scenarios. 4) Wloss (Packet Loss Window) Wloss is related to the rate of the transmitted data rate. The higher the data rate is, the larger the packet loss window is. In our implementation, we chose packet loss window Wloss to be 1 which is same as the current implementation of CTP in TinyOS2.1 distribution [11]. C. Experimental Results Impact of Date Rate Effect. Figure 5 shows the performance results when we vary the data rate in the application. In this experiment, the sending data rate increases from 1 packet/second to 2 packets/second. Increasing data rate is necessary to observe the network performance under

6 Table I THE POWER MEASUREMET WITH DIFFERET DISTACES Distance(/m) Measured Power(/dbm) Measured Power(/mW) Receiving Date Rate Ratio different traffic load. When the sending data rate increases, the receiving data rate ratio of drops from 95% to 8%. In contrast, the receiving data rate ratio of remains over 99% for all data rates. These results demonstrate that is more suitable for high data rate applications. Figure 5(b) shows the beacon traffic from 2-minute experiments when a mobile node moves at 5 millimeters/second. has a much lower number of beacon packets than in all experiments: the beacon overhead in is at least 5% less than the beacon overhead in. The high beacon overhead in implies that it overestimates the effect of movement in route selection and triggers excessive beacon messages to probe the topology change resulting in unnecessary overhead Sending Data Rate(packets/second) (a) Receiving Data Rate Ratio Figure 5. Total umber of Beacons/ode Impact of Data Rate Sending Data Rate(packets/second) (b) umber of Beacons Impact of Moving Speed. Figure 6 shows the result of one mobile node sending data at the rate of 2 packets every second while increasing the moving speed from 1 mm/second to 5 mm/second. achieves higher receiving data rate and lower beacon overhead than in all cases. When the moving speed varies, the receiving data rate ratio of is above 95% while the receiving data rate ratio of fluctuates between 8% and 9%. The beacon overhead of shows significant difference in all cases. In four experiments, the average number of beacon packets per node in is greater than 15 but the beacon cost drops below 4 in the last experiment. We believe that the differences in all experiments is because refreshes the routes simply based on the fixed number of unacknowledged packets. It is expected that one strategy can not be adapted to all cases and results in unstable beacon overhead in different cases. Combining Figure 5 and Figure 6, it reveals that within certain speed range, the network reliability and throughput mainly relates to the sending data rate. Figure 5 shows the general trend for both protocols is that the higher the sending Receiving Date Rate Ratio data rate is, the lower the receiving data rate ratio is. This is because when the sender is sending packets in a short interval, the application needs the network to discover the topology changes and forward the data packets within short time intervals as well. The high data traffic load increases pressure on the network strategy to discover the topology change in a fast and efficient way Speed(mm/second) (a) Receiving Data Rate Ratio Figure 6. Total umber of Beacons/ode Impact of Moving Speed Speed(mm/second) (b) umber of Beacons Impact of umber of Simultaneous Mobile odes. Figure 7 shows the result of increasing the number of simultaneous mobile nodes while keeping the data rate at 2 packets per second and the moving speed at 5 mm per second in each mobile node. As expected, the receiving data rate ratio increases in proportion to the number of mobile nodes. In this experiment, achieves higher receiving data rate ratio and lower beacon cost in all cases than. Figure 7 also indicates that the average receiving data rate ratio per mobile node is decreasing when the number of mobile nodes is increasing. In, the receiving data rate ratio is above 95% when there is one mobile node. But the average receiving data rate ratio drops to 9% when there are three mobile nodes. This implies that when more mobile users are injecting data traffic in the networks, more packet losses occur due to potential network congestions and network bandwidth limitation. We further study the packet loss in the mobile experiments. In our experiments, there were few consecutive packet losses. This means the forwarding path in the network is reliable and the data packets are rarely dropped in intermediate nodes. The reason that receiving data rate is decreased might be that the source nodes (i.e., mobile nodes) fail to relay all the packets to the infrastructure nodes. In, when the source node fails to discover a parent to relay packets or the packet is not sent out after maximum time retransmissions, the packet will be dropped at the source node.

7 Receiving Date Rate Ratio umber of Mobile odes (a) Receiving Data Rate Ratio Figure 7. Total umber of Beacons/ode umber of Mobile odes (b) umber of Beacons Impact of umber of Simultaneous Mobile Users The performance results show that achieves higher receiving data rate and lower control overhead than in hybrid WSs. It convinces us that our design in provides promising strategy to well support sensor data collection from mobile users with high data rates. V. COCLUSIOS In this paper we present a design supporting data collection applications with high data rates in hybrid wireless sensor networks. We devise the Location-Aware Relay Association Protocol which adopts RSS-based localization technique to detect topology changes. We also provide an adaptive strategy to adjust the maximum communication range in order to allow the relay association protocol to remain efficient and cost effective in the presence of changing topologies. The performance of has been thoroughly evaluated using data collection applications with different data rates under a variety of moving speeds. Testbed results demonstrate that offers higher network reliability with different data traffic loads and sends 5% fewer beacon packets than the existing protocol. [4] G. Zhou, C. Huang, T. an, T. He, J. A. Stankovic, and T. F. Abdelzaher, Mmsn: Multi-frequency media access control for wireless sensor networks, in IEEE Infocom, 26. [5]. Patwari, J.. Ash, S. Kyperountas, A. O. H. III, R. L. Moses, and. S. Correal, Locating the nodes: cooperative localization in wireless sensor networks, in IEEE Signal Processing Magazine, vol. 22, 25, pp [6] G. Mao, B. Fidan, and B. D. Anderson, Wireless sensor network localization techniques, Computer etworks, pp , 27. [7] C. wang and L. Xiao, Sensor localization under limited measurement capabilities, IEEE etworks, vol. 21, pp , 27. [8] P. Levis,. Patel, D. Culler, and S. Shenker, Trickle: A selfregulating algorithm for code propagation and maintenance in wireless sensor networks, in Proceedings of the First USEIX/ACM Symposium on etworked Systems Design and Implementation(SDI), 24. [9] O. Chipara, C. Brooks, S. Bhattacharya, C. Lu, R. Chamberlain, G. catalin Roman, and T. C. Bailey, Reliable data collection from mobile users for real-time clinical monitoring, in Proceedings of the 29 International Conference on Information Processing in Sensor etworks, 29, pp [1] W. Technologies. (211) Telosb datasheet. [Online]. Available: Datasheet.pdf [11] TinyOS. (211) Tinyos google code project. [Online]. Available: ACKOWLEDGEMET This work was supported in part by SF grant CS REFERECES [1] O. Chipara, C. Lu, T. C.Bailey, and G.-C. Roman, Reliable clinical monitoring using wireless sensor networks:experiences in a step-down hospital unit. in ACM Conference on Embedded etworked Sensor Systems (SenSys), 21. [2] J. P. Lynch and K. J. Loh, A summary review of wireless sensors and sensor networks for structural health monitoring, Shock and Vibration Digest, vol. 38, pp , 26. [3] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, Collection tree protocol, in Proceedings of the 7th ACM Conference on Embedded etworked Sensor Systems (Sen- Sys), 29.

Reliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor Networks

Reliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor Networks Reliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor Networks Lin Guo and Qi Han Department of Electrical Engineering and Computer Science Colorado School of Mines Email:{lguo,qhan}@mines.edu

More information

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Tree Protocol A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Protocols Why do we need collection protocols? Collecting data at a base station is a

More information

Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications

Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications Octav Chipara University of Iowa https://cs.uiowa.edu/~ochipara 1 Detecting clinical deterioration at low cost Clinical

More information

Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs

Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs Rachel Cardell-Oliver School of Computer Science & So8ware Engineering semester-2 2018 MoBvaBon Holes cause WSN to fail its role Holes can

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks Experimental methodology Empirical study in homes Spectrum study of existing wireless signals

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Critique #2. Ø Due on 2/13 (Tuesday)

Critique #2. Ø Due on 2/13 (Tuesday) Critique #2 Ø M. Sha, G. Hackmann and C. Lu, Real-world Empirical Studies on Multi- Channel Reliability and Spectrum Usage for Home-Area Sensor Networks, IEEE Transactions on Network and Service Management,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios

Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios Jatinder Pal Singh, Nicholas Bambos Department of Electrical Engineering Stanford University, CA 943 {jatinder, bambos}@stanford.edu

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

A Joint Power Control and Routing Scheme for Rechargeable Sensor Networks

A Joint Power Control and Routing Scheme for Rechargeable Sensor Networks A Joint Power Control and Routing Scheme for Rechargeable Sensor Networks Amitangshu Pal and Asis Nasipuri Electrical & Computer Engineering, The University of North Carolina at Charlotte, Charlotte, NC

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

Network Initialization in Low-Power Wireless Networks: A Comprehensive Study

Network Initialization in Low-Power Wireless Networks: A Comprehensive Study The Computer Journal Advance Access published July 21, 2013 The British Computer Society 2013. All rights reserved. For Permissions, please email: journals.permissions@oup.com doi:10.1093/comjnl/bxt074

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS Md. Abdullah-Al-Mamun, M. Mahbubur Rahman Department of Information and Communication Engineering Islamic University Kushtia

More information

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Morteza Hashemi, Wei Si, Moshe Laifenfeld, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering, Boston University,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Topology and Power Control

Topology and Power Control Topology and Power Control Octav Chipara Motivation Energy and capacity are limited resources in wireless sensor networks Answer: Topology and Power Control maintain a topology with certain properties

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks

CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Multichannel MAC for Energy Efficient Home Area Networks

Multichannel MAC for Energy Efficient Home Area Networks 1st International Workshop on GReen Optimized Wireless Networks (GROWN'13) Multichannel MAC for Energy Efficient Home Area Networks Kok Keong Chai, Shihab Jimaa, Yun Li, Yue Chen, and Siying Wang Abstract

More information

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

A Lazy-Binding Communication Protocol for Highly Dynamic Wireless Sensor Networks

A Lazy-Binding Communication Protocol for Highly Dynamic Wireless Sensor Networks A Lazy-Binding Communication Protocol for Highly Dynamic Wireless Sensor Networks Abstract Wireless sensor networks are characterized by limited availability and reliability of the wireless channel and

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Integrated Routing and Query Processing in Wireless Sensor Networks

Integrated Routing and Query Processing in Wireless Sensor Networks Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Wireless networks. Wireless Network Taxonomy

Wireless networks. Wireless Network Taxonomy Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

DRCS: A Distributed Routing and Channel Selection Scheme for Multi-Channel Wireless Sensor Networks

DRCS: A Distributed Routing and Channel Selection Scheme for Multi-Channel Wireless Sensor Networks DRCS: A Distributed Routing and Channel Selection Scheme for Multi-Channel Wireless Sensor Networks Amitangshu Pal and Asis Nasipuri Electrical & Computer Engineering, The University of North Carolina

More information

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...

More information

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Routing for IoT and Sensor Systems

Routing for IoT and Sensor Systems Facoltà di Ingegneria dell Informazione, Informatica e Statistica Internet of Things A.Y. 2017/18 Routing for IoT and Sensor Systems Federico Ceccarelli PhD Student 1 The Collection Tree Protocol (CTP)

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Available online at ScienceDirect. Procedia Engineering 154 (2016 )

Available online at  ScienceDirect. Procedia Engineering 154 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 154 (2016 ) 223 228 12th International Conference on Hydroinformatics, HIC 2016 An Improved Method of Avoiding RF Congestion

More information

Multi-Tier Mobile Ad Hoc Routing

Multi-Tier Mobile Ad Hoc Routing Multi-Tier Mobile Ad Hoc Routing Bo Ryu Tim Andersen Tamer Elbatt Network Analysis and Systems Dept. HRL Laboratories, LLC. Malibu, CA, USA. {ryu,cellotim,telbatt}@wins.hrl.com Abstract We present a new

More information

A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks

A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Morteza Hashemi, Wei Si, Moshe Laifenfeld, David obinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering, Boston University,

More information

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com PERFORMANCE ANALYSIS FOR WIRELESS MESH NETWORK CONSIDERING DIFFERENT CLIENT DISTRIBUTION PATTERNS S.Dhivya #1,

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Ferry Route Design with MAC Protocol in Delay Tolerant Networks

Ferry Route Design with MAC Protocol in Delay Tolerant Networks Ferry Route Design with MAC Protocol in Delay Tolerant Networks Chaitra T K 1, Dr A S Poornima Ph.D 2 1 Student, Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Experimental Evaluation on the Performance of Zigbee Protocol

Experimental Evaluation on the Performance of Zigbee Protocol Experimental Evaluation on the Performance of Zigbee Protocol Mohd Izzuddin Jumali, Aizat Faiz Ramli, Muhyi Yaakob, Hafiz Basarudin, Mohamad Ismail Sulaiman Universiti Kuala Lumpur British Malaysian Institute

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Traffic Modeling of Wireless Body Area Network

Traffic Modeling of Wireless Body Area Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. IV (Sep. - Oct. 2016), PP 102-109 www.iosrjournals.org Traffic Modeling of Wireless Body Area

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Sabareesan M, Srinivasan S*,John Deva Prasanna D S

Sabareesan M, Srinivasan S*,John Deva Prasanna D S Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks Sabareesan M, Srinivasan S*,John Deva Prasanna D S Department of Computer Science and Technology, Hindustan University, Chennai,

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Research Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks

Research Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks e Scientific World Journal, Article ID 165694, 7 pages http://dx.doi.org/10.1155/2014/165694 Research Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks A. Q. Zhao, 1 Y. N. Weng,

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Dynamic Rate Adaptation in IEEE WLANs

Dynamic Rate Adaptation in IEEE WLANs Dynamic Rate Adaptation in IEEE 802.11 WLANs SongYiLin@ICT August 10, 2008 References [1] On the Performance Characteristics of WLANs: Revisited (SIGMETRICS 2005) [2] CARA: Collision-Aware Rate Adaptation

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

Header Compression Capacity Calculations for Wireless Networks

Header Compression Capacity Calculations for Wireless Networks Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between

More information