Performance Analysis of Quasi-Random Deployment Strategy in Sensor Networks

Similar documents
Performance of DSDV Protocol over Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Performance Evaluation of Various Routing Protocols in MANET

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

MultiHop Routing for Delay Minimization in WSN

Performance Analysis and Enhancement of Routing Protocol in Manet

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Energy Efficient EE-DSR Protocol for MANET

Energy Aware Node Placement Algorithm for Wireless Sensor Network

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

ENSC 427: COMMUNICATION NETWORKS

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

Integrated Routing and Query Processing in Wireless Sensor Networks

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

A Review Paper on Routing Protocols in Wireless Sensor Networks

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

Energy Efficient Collection Tree Protocol in Wireless Sensor Networks

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Routing protocols in WSN

A cluster based interference mitigation scheme for performance enhancement in IEEE

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Cost Based Efficient Routing for Wireless Body Area Networks

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

Figure 1. Clustering in MANET.

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Quantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic

Chapter 2 Enhanced Back-Off Technique for IEEE WSN Standard

Performance of Static Networks for Power Saving Mode

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs

The General Analysis of Proactive Protocols DSDV, FSR and WRP

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology

Fig. 2: Architecture of sensor node

Review on an Underwater Acoustic Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

An efficient Multi-Parent Hierarchical Routing Protocol for WSNs

A Survey On: Cluster Based Routing Protocols in Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

EFFECT OF NODES MOBILITY BY MOVING NODES AT DIFFERENT TRAJECTORIES ON ZIGBEE MESH TOPOLOGY

To enhance Routing in ZigBee Wireless Networks

Energy Efficient MAC Protocol & Radio Energy Model for AODV & Bellman Ford Routing Protocol

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

DEPLOYMENT OF PERFORMANCE IN LARGE SCALE WIRELESS MESH NETWORK 1

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Subject: Adhoc Networks

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL

Energy Consumption for Cluster Based Wireless Routing Protocols in Sensor Networks

Introducing a Routing Protocol Based on Fuzzy Logic in Wireless Sensor Networks

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Performance Improvement of Wireless Network Using Modern Simulation Tools

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

WSN Routing Protocols

Addressing Asymmetric Link in Wireless Mesh Networks

Ad Hoc Networks: Issues and Routing

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Increasing Node Density to Improve the Network Lifetime in Wireless Network

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

Wireless Sensor Networks CS742

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Energy-Aware Routing in Wireless Ad-hoc Networks

Chapter 7 CONCLUSION

Transcription:

Performance Analysis of Quasi- Deployment Strategy in Sensor Networks Itu Snigdh #1, Nisha Gupta* 2 # Dept. of Computer Science and Engg., BIT Mesra, India. 1 itusnigdh@bitmesra.ac.in * Dept. of Electronics and Communication Engg., BIT Mesra, India 2 ngupta@bitmesra.ac.in Abstract This article evaluates the performance of a quasi random deployment strategy for wireless sensor networks on the basis of the application invoked for tree based communication networks. The quasi random deployment strategy tries to combine the benefits of both random and deterministic approaches for effective coverage and connectivity. We adopt Halton sequence to generate the node placement co-ordinates and study the features and effects on the network traffic, the total carried load, the amount of delay incurred and the energy consumption under the IEEE 82.15.4 standard. Our analysis suggests the need to revisit currently used models of deployment in such networks. This paper also tries to suggest adoption of quasi based deployment on the basis of the simulation results. It shows that quasi random deployment strategy is better than deterministic deployment which is difficult to maintain and better than random deployment scheme that is expensive in terms of coverage, and network constraints. Keyword- Wireless Sensor networks, Minimum Spanning Tree architectures, Delay, Throughput, Quasirandom deployment, Zigbee networks I. INTRODUCTION The quality of service metric in a wireless sensor is evaluated on the basis of energy efficiency, lifetime, delay, coverage and the robustness against transient load. However, there is a fair share of how the nodes are arranged in the region of interest. Deployment methods may force an early depletion of nodes irrespective of the efficiency of the routing protocol unless there is a guarantee to self adjustment or self organization among the nodes. Not many algorithms focus on the readjustment of the node positions and many algorithms assume a deterministic deployment with static nodes. In such scenarios, the initial deployment method of the nodes or their readjustment plays an important role in achieving the desired quality of metrics, as per the application specified; be it a simple monitoring application, or a real time environment like disaster control. This requirement compels us to analyse the performance of a network under the different strategies of deployment. The available deployment strategies are shown in Fig. 1. Air dropping distribution based Circular Grid Based Square Deployment methods Regular Computational geometery based Incremental Hexagonal Vornoi diagrams Delaunay triangulation Planned Probabilistic based Virtual force based Fig.1. Existing deployment methods ISSN : 975-424 Vol 7 No 1 Feb-Mar 215 386

The deployment methods are usually suited for both flat and hierarchy based communication architectures. In contrast to Flat or clustered networks, a hierarchy based architecture requires more in-network data processing or data aggregation. Moreover, the parent nodes are prone to early failures due to extra data relaying and computation. Still, there are ample works that advocate the use of tree based structure for achieving the quality of service metrics for wireless sensor networks. In most cases we can infer that use of single paths to connect each node to the base station has been preferred as opposed to using the multiple paths at the same time due to the duplication of the same packet.[1] Moreover, on analysis of the performance of cluster-based and tree-based topologies, it is found that cluster-based topology is more energy efficient for aggregation than tree-based topology; but in the case of acquisition, tree-based topology is more energy efficient than cluster-based topology. Other similar works like Tree-based routing protocols are aimed to construct the best route from a node to base station [2]. Protocols like HTECRP [3] claim to manage congestion and perform fairness on the network by assigning privileges to the traffic. ViTAMin [4] offers a hierarchical backbone tree algorithm for energy efficiency and sufficient network lifetime. While Localized area spanning tree (LAST) protocols for wireless short range sensor networks optimizes the energy cost and the interference imposed by the structure [5], a BFS based tree rooted at the base station offers shortest path traversal for each data message which utilizes the sensor resources efficiently by employing a local repairing approach for the crashing nodes thereby increasing the lifetime [6]. CTP is a routing protocol implemented in TinyOS-2.x, offers 9-99.9% packet delivery in highly dynamic environments while sending up to 73% fewer control packets than existing approaches ([7]-[9]). Tree based strategies reduce the burden of retransmissions and hence can be used for congestion management [3]. Thus, it can be believed that a tree structure is popular in wireless sensor network structure, for most applications having one sink and too many sender nodes. But does the node placement which affects the tree formation affect the communication as well? Our approach tries to answer this question. To the best of our knowledge, there has been no systematic experimental study that analyses how underlying deployment strategies manifest themselves for tree based network characteristics for the different classes of protocols. We provide a systematic analysis of factors influencing the network behaviour by separating them out each primary level: the network layer, medium access layer, and application layer. Our work considers a tree based topology constructed for a quasi random deployment scenario under the specific application like Zigbee for a number of routing protocols. Typically, a parent node is selected based on two parameters. One is the number of hops from the node to base station, and the other is one of the following: parent s residual energy, link quality, or the length of routing path to base station. We use an MST to generate the required communication backbone based on the shortest path characteristics. We observe the performance metrics for the different deployments, namely:, and Quasi. Section 2 discusses the system requirements while results are analysed in section 3 followed by conclusion in section 4. II. SYSTEM MODEL We consider a terrain of size X deployed with 5 homogeneous nodes in three phases. The network is modeled as a graph G = (N, L) where N is the set of nodes and L is the set of links between the nodes. Among the N nodes there is a special device or pan coordinator that we consider to be the initiator of the connection procedure. To deal with the necessary connection establishment and maintenance, we adopt a unit disk model constraint where any two nodes can communicate if their distance is smaller than or equal to R where R is the transmission range. Phase 1 places the nodes in a square grid pattern while phase 2 arranges the nodes in a random manner. Phase 3 deploys nodes in a quasi sequence. These deployment schemes then connect to the sink in the form of a tree. The idea behind tree-based communication architecture is simple. A spanning tree is first constructed, with the root node being the sink node. Each node transmits its value to its own parent. At each non-leaf node, the value of each of its child nodes, in addition to its own value, is processed before transmitting the result up the tree. This message passing can be considered similar to a star based network with one parent and n non-leaf nodes. The emphasis is not on the best tree structure, but whether the different deployment methods have different performance of the identical tree structure mechanism. Zigbee application is used for the traffic generation for a set of 5 nodes deployed deterministically, quasi-random and randomly. The next step generates the MST for the deployed nodes as shown in fig. 1, 2 and 3; which are analyzed for Distance vector based, Ad Hoc and link based protocols. ISSN : 975-424 Vol 7 No 1 Feb-Mar 215 387

Fig. 2. Deployment Fig. 3. deployment Fig. 4. Quasi Deployment A. Assumptions All Sensor nodes are homogeneous in nature and are location aware. Sink is responsible for forwarding the data to the base station. The parent nodes forward their data from the leaf nodes in addition to their collected data. Only the nodes within the transmission radius of other nodes are a part of the communication structure but there is no spanning forest formation. The simulation parameters considered for analysis are given in table 1. ISSN : 975-424 Vol 7 No 1 Feb-Mar 215 388

Parameters Table I Simulation Parameters Values Radio type 82.15.4 Transmission power Number of nodes Packet reception model Modulation scheme CCA Mode 3. dbm Noise factor 1. Energy model Node Type 15,25,5 nodes PHY 82.15.4 Reception model O-QPSK Carrier sense Linear gradient model MICAZ motes III. RESULTS AND DISCUSSIONS The results are analysed for the network and MAC layer as the MAC layer protocols that traditionally manage power saving are designed to be application aware to some degree, for example they provide service differentiation for data, query and management packets. The parameters that are considered for comparison under the following set of protocols are: 1) Total carried load: is indicative of the throughput of the network. Since we consider TCP/IP for our analysis the throughput decrease is indicative of the TCP s counterbalance for packet drops. The number of packets dropped at the Mac layer is due to link failure or congestion or collisions. The throughput is directly affected by the number of packets dropped in the MAC layer and hence those statistics are also included. Throughput can be calculated as: Total bytes sent or received * 8 / (Total time allotted for communication - time first packet is sent or received). 2) Average delay: at the network layer is crucial, in case of real time applications. The average delay is computed as follows: Avg. End to end delay = Total transmission delays of all the received packets / No of packets received Where, The transmission delay of a packet = Total time when a packet is received at the server - Time when a packet is transmitted at the client. The comparison of the deployment schemes in Fig. 5, show that the number of successful deliveries of the packets is better in case of quasi based deployment as compared to both random and deterministic deployments for all the protocols considered. It is also observed from Fig. 6 and 7 that as a consequence the TTL sum of indeliveries and the throughput is more for quasi based network rather than the other two deployment schemes. By observing Fig. 7 we see that in case of AODV, DYMO and Fisheye, the carried load is remarkably high for quasi based deployment scheme. In case of Bellman ford algorithm (BF), the carried load in case of deterministic and random deployment is slightly more than quasi which is attributed to its proactiveness in route selection. This is also the reason that delay is more in case of a quasi deployed network than the other two deployment cases for DYMO and AODV as depicted in Fig. 8. The delay is nearly equal for Bellman ford and fisheye protocols for all the three deployment strategies. In Fig. 9, in case of average jitter, quasi based deployment shows a better performance and is always lesser than random based deployments. The feature that is significant is that, as compared to the corresponding carried load, the incurred delay is comparatively lesser or equal in case of quasi based deployment. ISSN : 975-424 Vol 7 No 1 Feb-Mar 215 389

No of succussful deliveries 17 16 15 14 13 12 11 9 8 7 6 5 4 3 2 1 Quasi ipindelivers TTL sum 1 9 8 7 6 5 4 3 2 - Quasi Fig. 5. IP Indelivers for different protocols Fig. 6. TTL Sum of packets at the network layer 25 Quasi 8 7 6 Quasi Carried load (bits/second) 2 15 5 Average delay (seconds) 5 4 3 2 1-1 protocols used Fig. 7. Average carried load by nodes Fig. 8. Average delay of nodes no of packets dropped 55 5 45 4 35 3 25 2 15 Quasi random no of packets dropped due to no ack. 5 4 3 2 1 Quasi random Fig.9. Average number of packets dropped Fig.1. Number of packets dropped due to no acknowledgement ISSN : 975-424 Vol 7 No 1 Feb-Mar 215 39

18 No of retries for sending data packets 16 14 12 8 6 4 2 Quasi random Fig.11. No of retries made to send packets The figures 9, 1 and 11 are the statistics collected as per the MAC layer where we see that the number of packets dropped and the number of retries for packet resending in quasi based deployments is significantly lesser than the other two strategies. Hence, we confirm that the Quasi based strategy has a better payoff in case of congestion and collision in the channel. IV. ANALYSIS FOR IMPROVED PERFORMANCE Quasi based deployment strategy aims to bridge the gap between the performance of deterministic and random deployments. Hence, we further analyze our scheme to study the impact of varying AODV based constraints on the performance of the quasi based network. We put quasi based AODV statistics for analysis in the following section as AODV is the default protocol used for Zigbee networks. This section analyses the variance in the performance of the protocol when subject to varied network conditions. 1) Case 1: By varying the traffic load By defining the total number of packets to send, it was observed that there was not much variation on the traffic load due to change in deployment as they depended more on the protocol involved. 2) Case 2: By varying the transmission power of the nodes Though the throughput performance of the network significantly increases by increasing the transmission power, the number of packet drops also increase due to the increase in contention and collision of the packets transmission. Since the increase in transmission power requires antenna size modifications, which is not a possibility in case of sensor networks due to the small size of the nodes employed. Hence, we do not include these results. 3) Case 3: On the basis of varying the hop counts of the AODV protocols The transmission power required by any node i to transmit data to node j is dependent on the distance between the nodes d ij,the rate of transmission r in bits/sec and the path loss index. We relate this distance d ij to the number of hops required for successful data delivery to the sink. In networking, the hop count represents the total number of devices a given piece of data (packet) passes through. The more the number of hops the data must traverse to reach their destination, the greater the transmission delay. Moreover, the devices receiving the packets compare the hop count against a predetermined limit and discard the packet if the hop count is too high. Hence increasing the hop count limit reduces the chances of packet dropping at the MAC layer. Since AODV uses max hop counts to limit the endless bouncing of packets around the network due to routing errors, on changing the maximum hop count, the network performance improves. Therefore, we vary the maximum hop counts from the ideal 35 hops to 1, 15, 25 and 45 to study the effect on the overall network performance of the different deployments. The observed results are presented henceforth. ISSN : 975-424 Vol 7 No 1 Feb-Mar 215 391

Carried load 45 4 35 3 25 2 15 5 5 1 15 2 25 3 35 4 45 5 No of hops DET QUASI RANDOM Avg. Delay 2.5 2. 19.5 19. 18.5 18. 17.5 17. 16.5 16. 15.5 15. 14.5 14. 5 1 15 2 25 3 35 4 45 5 No of hops DET QUASI RANDOM Fig. 12. Average carried load Fig. 13. Average Delay 5 DET QUASI RANDOM 6 DET QUASI RANDOM 4 5 No of sucessful deliveries 3 2 No of packets dropped 4 3 2 5 1 15 2 25 3 35 4 45 5 No of hops 5 1 15 2 25 3 35 4 45 5 No of hops Fig. 14. Number of successful packet deliveries Fig. 15. Number of packets dropped From the above figures it is observed that the average number of hops, a packet needs to travel, for successful delivery, increases with increase in the max number of hops as shown in Fig. 12, and the delay is more than random deployments in case of quasi based deployment as shown in Fig.13. But all the three deployments exhibit almost the same pattern of change with respect to the change in the maximum number of hops as shown in Fig. 14 and 15 respectively. It can further be noticed that the variation in the network parameters in case of quasi deployed network is lesser than the other two deployment schemes and hence quasi depicts a more stable network performance against the changes in given routing protocol parameters. V. CONCLUSION This article analyses the quasi based strategy prospects in the deployment of sensor networks. On observation of the performance parameters like carried load and successful deliveries, we find that the statistics are better for a quasi based network than both (deterministic and random deployment) or at least one of the existing strategies employed usually for deployment in sensor networks. The saving is not much when considering delay but there is a significant reduction in the number of packet drops due to channel congestion or no acknowledgement. Also, on varying the maximum hop counts we see that, the variation in network parameters is smoother in Quasi based networks as compared to both random and deterministic based networks. Hence, we can infer than employing Quasi based strategy in deployment guarantee a better network performance and can be adopted for further investigation. ISSN : 975-424 Vol 7 No 1 Feb-Mar 215 392

REFERENCES [1] Messina, D., Ortolani, M., Lo Re, G., A Network Protocol to Enhance Robustness in Tree-Based WSNs Using Data Aggregation, IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS, Pgs:1 4, 27. [2] Zhang, Z., Yu F., Analysis of Cluster-based and Tree-based Routing Protocols for Wireless Sensor Networks, IEEE International Conference on Communications and Mobile Computing (CMC), Volume: 1, Pgs: 418 422, 21. [3] Mohajerzadeh, A. H., Yaghmaee, M. H., Eskandari, Z., Tree Based Energy Efficient and Congestion Aware Routing Protocol for Wireless Sensor Networks, 11th IEEE Singapore International Conference on Communication Systems, Pgs: 177 1711, 28. [4] Wang, J., Jee-Hyong, K., ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing, IEEE International Conference on Information Networking (ICOIN), (ICOIN), Pgs: 144 149, 212. [5] Johansson, T., Osipov, E., Carr Motyckova, L., Interference Aware Construction of Multi- and Convergecast Trees in Wireless Sensor Networks. Next Generation Teletraffic and Wired/Wireless Advanced Networking, Lecture Notes in Computer Science. Volume 5174. pp 72-87, 28. [6] Chakraborty, S., Nandi, S., Karmakar, S., A Tree-Based Local Repairing Approach for Increasing Lifetime of Query Driven WSN,IEEE International Conference on Computational Science and Engineering (CSE), DOI 1.119/CSE/I-SPAN/I, 211. [7] Patel, D., Chawla B., Parekh C., Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x, International Journal of Modern Engineering Research Vol.3, Issue.3, pp-1357-1365, 213. [8] Colesanti, U., Santini, S., The Collection Tree Protocol for the Castalia Wireless Sensor Networks Simulator, Technical Report Nr. 729 Department of Computer Science ETH Zurich, 211. [9] Gnawali, O., Fonseca, R., Jamieson, K., Moss, D., Levis, P., Collection Tree Protocol Technical Report SING-9-1, In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys), 29. AUTHOR PROFILE Itu Snigdh received her Master s Degree (Software Engg.) from B.I.T Mesra (Ranchi) and her bachelor s degree in electrical engineering from BIT Sindri. She is currently working as an assistant professor in the Department of Computer Science and Engineering, at BIT Mesra and also pursuing her Ph D from the same institute in the area of wireless sensor networks. Her areas of interest include software Eng, Database Mgmt. Systems and Wireless Sensor Networks. Nisha Gupta received the Bachelor s and Master s degrees in Electronics and Telecommunication and Electrical and Electronics engineering both from Birla Institute of Technology, Mesra, Ranchi, India and Ph.D. degree from the Indian Institute of Technology, Kharagpur, India. She was a Maintenance Engineer at Shreeram Bearings Ltd., Ranchi during 1982-83 and was a Programmer at Ranchi University, Ranchi from 1983 to 1986. She was a Junior Scientific Officer in a DRDO sponsored project, at Department of Electronics and Electrical Communication Engineering, Indian Institute of Technology, Kharagpur, from 1986-1989 and a Institute Research Scholar and Research Associate (CSIR) in the same department from 199-1996. She was a postdoctoral fellow at University of Manitoba, Canada from 1997-1998 before joining the department of Electronics and Communication Engineering, Birla Institute of Technology in 1999 as a Reader. Currently, she is a Professor in the same department. She has authored and coauthored more than 75 technical journal articles and conference papers. Her research interests are Computational Electromagnetics, Antennas and MICs for Wireless Communication and AI techniques in Wireless and Mobile Communication ISSN : 975-424 Vol 7 No 1 Feb-Mar 215 393