Fast and efficient randomized flooding on lattice sensor networks
|
|
- Mitchell Gregory
- 5 years ago
- Views:
Transcription
1 Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation to Center for Telecommunications and Information Networking group Also submitted to the 3 rd International Symposium on Modeling and Optimizaton in Mobile, Ad Hoc, and Wireless Networks(WiOpt).
2 Abstract 1 We consider the problem of information dissemination on lattice based sensor networks. In particular, we are interested in obtaining fast, efficient, and simple mechanisms by which a source node may propagate information to all nodes in the network. Naive flooding Controlled flooding Random walk dissemination Randomized protocol We analyze and simulate this protocol, and conclude the parameter p permits valuable performance tradeoffs of efficiency and speed.
3 Outline of talk 2 What are sensor networks? Why is state promulgation important? Naive flooding Controlled flooding Random Walk Random flooding Percolation Theory
4 What are wireless sensor networks? 3 Similar to wireless Ad-Hoc Networks in that there is no centralized infrastructure and that nodes rely on each other to act as relays. They have a high failure rate and are deployed with a high spatial density. They have substantial processing capability in the aggregate, but not individually. In most settings the network must operate for long periods of time, hence energy resources limit their overall operation. Their dense deployment implies a high degree of interaction between nodes, which complicates the networking protocols.
5 Why is state promulgation important? 4 To make information available whenever, wherever To maintain control over the network For software updates For timing To check for node status
6 Topology of the Network and the protocol model Topology : the nodes are assumed to lie on the lattice Z 2. Communication : each node is capable of communicating with its four cardinal neighbors but not any other node, and all communication is assumed to be error free. Awareness : each node is aware of the identities of its four neighbors but not aware of its location or its position within the network. All nodes have sufficient memory to maintain state and identify whether or not it has received an incoming message. Timing : for simplicity and tractability we assume time is slotted and nodes are synchronized. Benefits of this model allow us to focus on the tradeoffs in protocol design. 5
7 Overview of 4 state promulgation protocols 6 Naive flooding : each node upon first receiving a packet, transmits the packet to its four cardinal neighbors. Controlled flooding : certain nodes, that are strategically placed on the lattice, are designed as transmitter nodes. These nodes, upon first receiving a packet, transmit the packet to their four cardinal neighbors. Random Walk : each node, upon first receiving a packet from a neighbor, transmits the packet to its neighbors, designating one of the three other neighbors as the next transmitter. Randomized flooding : each node, upon first receiving a packet, transmits the packet with probability p (0, 1). All subsequent receptions of the same packet are ignored by the node.
8 Naive Flooding 7
9 Efficiency 8 N t = {(x, y) Z 2 : x + y t} defines the set of possible receivers by time t. Note that N t 2t 2. R t is the set of nodes that receive the packet by time. T t is the set of nodes that transmit the packet by time t. η t = E R t E T t η = lim t η t
10 Controlled Flooding 9
11 Need for distributed protocols 10 Naive flooding where all nodes transmit the first time they receive is inefficient due to redundant transmissions. Controlled flooding demonstrates that higher efficiency can be obtained by designating certain nodes as transmitters a-priori. This protocol however requires centralized control and will not scale well for large scale networks. Hence we need a distributed protocol wherein every individual node makes a decision whom to transmit to depending on certain state information.
12 Random Walk 11
13 Speed and Spatial coverage 12 ν t = E R t N t is the instantaneous speed at time t, i.e., the total number of receivers by time t over the total number of possible receivers by time t. γ r = lim t E[ R t N r ] N r is the spatial coverage out to distance r, i.e. the fraction of receivers in N r that eventually receive the packet.
14 Characteristics of the protocols 13 The Naive flooding protocol is simple and fast. It is however inefficient in that each transmission effectively reaches only one new node The Controlled flooding protocol is fast, and can be shown to achieve twice the efficiency of naive flooding, but requires a centralized control. Effectively this protocol is not distributed and hence will not perform well for large scale networks. Random walk protocol has been analyzed previously in a paper addressing query strategies on a sensor network. This protocol is simple and efficient but extremely slow as the number of transmitters per time slot is fixed. The Randomized flooding protocol is what our paper focusses on. We have endeavored to show that the protocol is simple, fast, and efficient, and has performance tradeoffs that are parameterized by the transmission probability p.
15 Protocol Analysis 14 Naive flooding : R t = N t. Thus ν t = γ r = 1 for all t, r 0. It can be shown that T t 2t 2, hence lim t η t = 1, i.e., on average each transmission reaches only one first-time receiver. Conrolled flooding: Intelligent selection of half of the nodes as transmitters allows us to obtain the same speed and coverage as naive flooding but with twice the efficiency : i.e., T t t 2, lim t η t = 2. Random Walk : The speed in this protocol goes to zero since the number of receivers is linear in t while N t is quadratic in t.
16 15 Only partial success in analyzing the randomized protocol Observations of note are : E[R t ] = (x,y) N t P(node (x, y) receives the packet by time t). E[ T t ] = pe[ R t 1 ], i.e., the average number of transmitters by time t is p times the average number of receivers by time t 1. We see that the above two facts effectively reduces the computation of each of the performance metrics. Our analysis at this point is limited to computing the probability a node receives the packet at its earliest possible time: P(node(x, y) receives the packet by time x + y ). We compute this probability based on conditioning on all possible reception configurations of all nodes at a distance x + y 1, and then recursing back to the nodes on the axis. The problem with this technique is that it suffers from a combinatorial explosion that limits the distances from the origin, namely x + y 14.
17 Computation 16
18 Computation and Simulation Results 17 Figure 1: Two screen shots of the randomized flooding protocol. The square box contains sensors, the axis help denote the origin, and the diamonds denote the points at distance r = 10 and r = 50. The dots denote the sensors that have received the packet by time t. These screen shots are for p = 0.5. Note the rich spatial structure of the protocol.
19 18 Figure 2: Simulation results for efficiency vs. time show that the efficiency decreases in p from 2 for p = 0.5 down to 1.2 for p = 0.9.
20 19 Figure 3: Simulation results for coverage vs. distance show that coverage increases in p achieving almost perfect coverage for p 0.8.
21 20 Figure 4: Computation Results for efficiency vs. time show that efficiency decreases in p to 2 for p = 0.5 down to 1.2 for p = 0.9.
22 21 Figure 5: Computation Results for coverage vs. distance plots show that coverage increases in p. Note that the results from computation approximation runs only to t = 15 due to the combinatorial explosion and also do not consider or allow for back edges.
23 Figure 6: Computation approximation and simulation time-average efficiency versus the transmission probability p. The plot shows how higher efficiency is achieved by lower p. 22
24 Figure 7: Computation approximation and simulation spatial-average coverage versus the transmission probability p. The plot illustrates how higher coverage is achieved by higher p. 23
25 24 Figure 8: The bottom plot shows the fraction of simulations that ever reach one or more nodes at distance r versus p for r = 25, 50, 100. The plot illustrates a threshold behavior: choosing p < 0.5 means the state propagation will eventually die, while choosing p > 0.5 means the state propagation will likely continue forever.
26 Extending Computational approximations to run for higher values of t 25 As we have already mentioned we have been constrained in our ability to provide an accurate analysis of our proposed protocol. Is there a better way to analyze this protocol? The answer is Yes. Some unexpected help from another paper: Gossip-Based Ad Hoc Routing by Zygmunt J. Haas, Joseph Y. Halpern, Li Li.
27 Gossip-Based Ad Hoc Routing 26 Paper proposes a gossip-based approach, where each nodes forwards a message with some probability, to reduce overhead of routing protocols. the protocol model considers nodes placed on a two-dimensional area; with an edge placed between any pair of nodes less than a distance d apart. Implication is that gossiping exhibits bimodal behavior in sufficiently large networks Fraction of executions in which most nodes get the message depends on the gossiping probability and the topology of the network. Using gossiping probability between 0.6 and 0.8 suffices to ensure that almost every node in the network gets the message in almost every execution. Paper shows that for large networks, protocol uses up to 35 % fewer messages than (naive)flooding.
28 27 What is Percolation Theory? Percolation theory looks to answer the question : what is the probability that a large porous stone immersed in a bucket of water will be wetted at its center. Percolation Model : Z d = d-dimensional cubic lattice, with d 1. Two kinds of models in Percolation Theory : Bond model and Site Model
29 Clusters 28 C(x) = open cluster of x C(x) = Nodes in the Cluster Percolating Cluster C(x) = For the origin O, C(O) = C is defined as open cluster of origin. θ(p) = P r{ C = } If θ(p) > 0 Percolation θ(p) independent of x
30 The properties of θ(p) 29 p c (d) function of lattice dimension d. p c (1) = 1 p c (2) = 0.5 θ(p) is continuous except possibly at p c (d) θ(p) is increasing with p
31 Percolation Somewhere 30 Significance of p > p c the probability there is an I.C. somewhere in the lattice = 1. Number of I.C s if p > p c p c (d + 1) < p c (d) For p < p c size n of clusters is exponentially distributed for large n, namely P r{ C = n} exp( α(p)n) with α(p) > 0 p BOND c < p SIT E c
32 How is Percolation Theory relevant to our model 31 Given the high spatial density of Sensor Networks we see that the paths between any two nodes is negligible compared to the size of the network. The Site model of percolation theory can be used to model our network. The nodes are vertices(sites) and transmit with a probability p. We see that the theory of the existence of p c seems feasible. Our simulations(fig 8) show that there is a phase transition around the p = 0.5 point after which state promulgations will likely continue forever ( giving rise to an infinite cluster.) We are currently working on trying to use the analysis of percolation theory to carry out an analysis for our randomized protocol model.
33 Conclusion We have proposed a protocol that permits achieving a higher efficiency than naive flooding with a degradation in coverage that depends on p. 32 Randomized flooding attempts to emulate the performance of controlled flooding without incurring the associated increase in complexity. Simulations show that the optimum value of p to attain good efficiency and coverage is around the p = 0.5 mark. Simulations have shown that the choice of parameter p permits valuable performance tradeoffs of efficiency and speed. We have been unable to provide an exhaustive computational analysis of our protocol, to make a comparison with our simulation results. Our protocol model seems to be analogous to a site percolation model and it appears that we might be able to use results from percolation theory to analyze our protocol.
Achieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationBit Reversal Broadcast Scheduling for Ad Hoc Systems
Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationAdvanced Modeling and Simulation of Mobile Ad-Hoc Networks
Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494
More informationA ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING
A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING Gaurang Mokashi, Hong Huang, Bharath Kuppireddy, and Subin Varghese Klipsch School of Electrical and
More informationMobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo In this lecture We will describe techniques to reprogram a sensor network while deployed. We describe
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationPhase Transition Phenomena in Wireless Ad Hoc Networks
Phase Transition Phenomena in Wireless Ad Hoc Networks Bhaskar Krishnamachari y, Stephen B. Wicker y, and Rámon Béjar x yschool of Electrical and Computer Engineering xintelligent Information Systems Institute,
More informationData Dissemination in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationAchievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying
Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,
More informationOn the Optimal SINR in Random Access Networks with Spatial Reuse
On the Optimal SINR in Random ccess Networks with Spatial Reuse Navid Ehsan and R. L. Cruz Department of Electrical and Computer Engineering University of California, San Diego La Jolla, C 9293 Email:
More informationSENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS
SENSOR PACEMENT FOR MAXIMIZING IFETIME PER UNIT COST IN WIREESS SENSOR NETWORKS Yunxia Chen, Chen-Nee Chuah, and Qing Zhao Department of Electrical and Computer Engineering University of California, Davis,
More informationBiologically-inspired Autonomic Wireless Sensor Networks. Haoliang Wang 12/07/2015
Biologically-inspired Autonomic Wireless Sensor Networks Haoliang Wang 12/07/2015 Wireless Sensor Networks A collection of tiny and relatively cheap sensor nodes Low cost for large scale deployment Limited
More informationOptimal Relay Placement for Cellular Coverage Extension
Optimal elay Placement for Cellular Coverage Extension Gauri Joshi, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, India 400076. Email: gaurijoshi@iitb.ac.in,
More informationWireless in the Real World. Principles
Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse
More informationEnergy-Efficient Data Management for Sensor Networks
Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell
More informationMore Efficient Routing Algorithm for Ad Hoc Network
More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1
More informationOptimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function
Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering
More informationTSIN01 Information Networks Lecture 9
TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationOn the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks
On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin
More informationPart I: Introduction to Wireless Sensor Networks. Alessio Di
Part I: Introduction to Wireless Sensor Networks Alessio Di Mauro Sensors 2 DTU Informatics, Technical University of Denmark Work in Progress: Test-bed at DTU 3 DTU Informatics, Technical
More informationAn Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks
An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems Research
More informationOpportunistic cooperation in wireless ad hoc networks with interference correlation
Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract
More informationAdaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks Ing-Ray Chen*, Anh Phan Speer* and Mohamed Eltoweissy+ *Department of Computer Science
More informationAn Accurate and Efficient Analysis of a MBSFN Network
An Accurate and Efficient Analysis of a MBSFN Network Matthew C. Valenti West Virginia University Morgantown, WV May 9, 2014 An Accurate (shortinst) and Efficient Analysis of a MBSFN Network May 9, 2014
More informationLocation Discovery in Sensor Network
Location Discovery in Sensor Network Pin Nie Telecommunications Software and Multimedia Laboratory Helsinki University of Technology niepin@cc.hut.fi Abstract One established trend in electronics is micromation.
More informationLink Activation with Parallel Interference Cancellation in Multi-hop VANET
Link Activation with Parallel Interference Cancellation in Multi-hop VANET Meysam Azizian, Soumaya Cherkaoui and Abdelhakim Senhaji Hafid Department of Electrical and Computer Engineering, Université de
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationBandwidth-SINR Tradeoffs in Spatial Networks
Bandwidth-SINR Tradeoffs in Spatial Networks Nihar Jindal University of Minnesota nihar@umn.edu Jeffrey G. Andrews University of Texas at Austin jandrews@ece.utexas.edu Steven Weber Drexel University sweber@ece.drexel.edu
More informationDISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song
DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment
More informationp-percent Coverage in Wireless Sensor Networks
p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage
More informationProbabilistic Link Properties. Octav Chipara
Probabilistic Link Properties Octav Chipara Signal propagation Propagation in free space always like light (straight line) Receiving power proportional to 1/d² in vacuum much more in real environments
More informationLocalization in Wireless Sensor Networks
Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem
More informationJoint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,
Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and
More informationDesign of Simulcast Paging Systems using the Infostream Cypher. Document Number Revsion B 2005 Infostream Pty Ltd. All rights reserved
Design of Simulcast Paging Systems using the Infostream Cypher Document Number 95-1003. Revsion B 2005 Infostream Pty Ltd. All rights reserved 1 INTRODUCTION 2 2 TRANSMITTER FREQUENCY CONTROL 3 2.1 Introduction
More informationMedium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks
Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern
More informationThe Impact of Channel Bonding on n Network Management
The Impact of Channel Bonding on 802.11n Network Management --- Lara Deek --- Eduard Garcia-Villegas Elizabeth Belding Sung-Ju Lee Kevin Almeroth UC Santa Barbara, UPC-Barcelona TECH, Hewlett-Packard Labs
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationProbabilistic Coverage in Wireless Sensor Networks
Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:
More informationLocalization (Position Estimation) Problem in WSN
Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless
More informationSo Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Tyler W Moore (joint work with Jolyon Clulow, Gerhard Hancke and Markus Kuhn) Computer Laboratory University of Cambridge Third European
More informationDistributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes
7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationAvoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute
More informationCalculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node
Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Shikha Nema*, Branch CTA Ganga Ganga College of Technology, Jabalpur (M.P) ABSTRACT A
More informationEnergy-Efficient Communication Protocol for Wireless Microsensor Networks
Energy-Efficient Communication Protocol for Wireless Microsensor Networks Wendi Rabiner Heinzelman Anatha Chandrasakan Hari Balakrishnan Massachusetts Institute of Technology Presented by Rick Skowyra
More informationDeployment Design of Wireless Sensor Network for Simple Multi-Point Surveillance of a Moving Target
Sensors 2009, 9, 3563-3585; doi:10.3390/s90503563 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Deployment Design of Wireless Sensor Network for Simple Multi-Point Surveillance
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationODMA Opportunity Driven Multiple Access
ODMA Opportunity Driven Multiple Access by Keith Mayes & James Larsen Opportunity Driven Multiple Access is a mechanism for maximizing the potential for effective communication. This is achieved by distributing
More informationOpportunistic Communications under Energy & Delay Constraints
Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities
More informationMobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks
Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks A. P. Azad and A. Chockalingam Department of ECE, Indian Institute of Science, Bangalore 5612, India Abstract Increasing
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationRouting in Massively Dense Static Sensor Networks
Routing in Massively Dense Static Sensor Networks Eitan ALTMAN, Pierre BERNHARD, Alonso SILVA* July 15, 2008 Altman, Bernhard, Silva* Routing in Massively Dense Static Sensor Networks 1/27 Table of Contents
More informationAdaptive Sensor Selection Algorithms for Wireless Sensor Networks. Silvia Santini PhD defense October 12, 2009
Adaptive Sensor Selection Algorithms for Wireless Sensor Networks Silvia Santini PhD defense October 12, 2009 Wireless Sensor Networks (WSNs) WSN: compound of sensor nodes Sensor nodes Computation Wireless
More informationAdaptation of MAC Layer for QoS in WSN
Adaptation of MAC Layer for QoS in WSN Sukumar Nandi and Aditya Yadav IIT Guwahati Abstract. In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types
More informationENERGY-CONSTRAINED networks, such as wireless
366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 8 Energy-Efficient Cooperative Communication Based on Power Control and Selective Single-Relay in Wireless Sensor Networks Zhong
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationEasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network
EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and
More informationRandomized Channel Access Reduces Network Local Delay
Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement
More informationMultihop Routing in Ad Hoc Networks
Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline
More informationSimulating AODV and DSDV For Adynamic Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.7, July 2010 219 Simulating AODV and DSDV For Adynamic Wireless Sensor Networks Fasee Ullah, Muhammad Amin and Hamid ul
More informationLow-Latency Multi-Source Broadcast in Radio Networks
Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years
More informationField Testing of Wireless Interactive Sensor Nodes
Field Testing of Wireless Interactive Sensor Nodes Judith Mitrani, Jan Goethals, Steven Glaser University of California, Berkeley Introduction/Purpose This report describes the University of California
More informationABSTRACT. Ahmed Salah Ibrahim, Doctor of Philosophy, 2009
ABSTRACT Title of Dissertation: RELAY DEPLOYMENT AND SELECTION IN COOPERATIVE WIRELESS NETWORKS Ahmed Salah Ibrahim, Doctor of Philosophy, 2009 Dissertation directed by: Professor K. J. Ray Liu Department
More informationAn Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks
An Adaptable Energy-Efficient ium Access Control Protocol for Wireless Sensor Networks Justin T. Kautz 23 rd Information Operations Squadron, Lackland AFB TX Justin.Kautz@lackland.af.mil Barry E. Mullins,
More informationBBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks
International Journal of Distributed Sensor Networks, : 3 54, 006 Copyright Taylor & Francis Group, LLC ISSN: 1550-139 print/1550-1477 online DOI: 10.1080/1550130500330711 BBS: An Energy Efficient Localized
More informationRouting Protocols for Wireless Sensor Networks that have an Opportunistic Large Array (OLA) Physical Layer
Routing Protocols for Wireless Sensor Networks that have an Opportunistic Large Array (OLA) Physical Layer LAKSHMI V. THANAYANKIZIL, ARAVIND KAILAS, AND MARY ANN INGRAM School of Electrical and Computer
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationZippy: On-Demand Network Flooding
Zippy: On-Demand etwork Flooding Felix utton, Bernhard Buchli, Jan Beutel, and Lothar Thiele enys 2015, eoul, outh Korea, 1 st 4 th ovember 2015 enys 2015 Problem tatement Energy-efficient wireless dissemination
More informationA Performance Study of Deployment Factors in Wireless Mesh
A Performance Study of Deployment Factors in Wireless Mesh Networks Joshua Robinson and Edward Knightly Rice University Rice Networks Group networks.rice.edu City-wide Wireless Deployments Many new city-wide
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationThe Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks
The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks Jon Even Corneliussen Master of Science in Electronics Submission date: June 2009 Supervisor: Geir Egil Øien, IET Co-supervisor:
More informationScheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks
Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:
More informationDynamic Zonal Broadcasting for Effective Data Dissemination in VANET
Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Masters Project Final Report Author: Madhukesh Wali Email: mwali@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationOptimal Power Allocation over Fading Channels with Stringent Delay Constraints
1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu
More informationRetransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks
Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian Electrical and
More informationEngineering Project Proposals
Engineering Project Proposals (Wireless sensor networks) Group members Hamdi Roumani Douglas Stamp Patrick Tayao Tyson J Hamilton (cs233017) (cs233199) (cs232039) (cs231144) Contact Information Email:
More informationCHANNEL ASSIGNMENT IN MULTI HOPPING CELLULAR NETWORK
CHANNEL ASSIGNMENT IN MULTI HOPPING CELLULAR NETWORK Mikita Gandhi 1, Khushali Shah 2 Mehfuza Holia 3 Ami Shah 4 Electronics & Comm. Dept. Electronics Dept. Electronics & Comm. Dept. ADIT, new V.V.Nagar
More informationDistributed receive beamforming: a scalable architecture and its proof of concept
Distributed receive beamforming: a scalable architecture and its proof of concept François Quitin, Andrew Irish and Upamanyu Madhow Electrical and Computer Engineering, University of California, Santa
More informationATPC: Adaptive Transmission Power Control for Wireless Sensor Networks
ATPC: Adaptive Transmission Power Control for Wireless Sensor Networks Shan Lin, Jingbin Zhang, Gang Zhou, Lin Gu, Tian He, and John A. Stankovic Department of Computer Science, University of Virginia
More informationChapter 10. User Cooperative Communications
Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a
More informationRFID (radio frequency identification) tags are becoming
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Identifying State-Free Networked Tags Abstract Traditional radio frequency identification (RFID) technologies allow tags to communicate with a reader but not among
More informationNetworks: how Information theory met the space and time. Philippe Jacquet INRIA Ecole Polytechnique France
Networks: how Information theory met the space and time Philippe Jacquet INRIA Ecole Polytechnique France Plan of the talk History of networking and telecommunication Physics, mathematics, computer science
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationCollaborative transmission in wireless sensor networks
Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg
More informationDistributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks
The InsTITuTe for systems research Isr TechnIcal report 2009-9 Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks Kiran Somasundaram Isr develops, applies and
More informationDeployment scenarios and interference analysis using V-band beam-steering antennas
Deployment scenarios and interference analysis using V-band beam-steering antennas 07/2017 Siklu 2017 Table of Contents 1. V-band P2P/P2MP beam-steering motivation and use-case... 2 2. Beam-steering antenna
More informationFrequency-Hopped Spread-Spectrum
Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading
More informationMobile Positioning in Wireless Mobile Networks
Mobile Positioning in Wireless Mobile Networks Peter Brída Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina SLOVAKIA Outline Why Mobile Positioning?
More informationAn Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks
Article An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks Prasan Kumar Sahoo 1, Ming-Jer Chiang 2 and Shih-Lin Wu 1,3, * 1 Department of Computer Science and Information
More informationAmplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes
Amplify-and-Forward Space-Time Coded Cooperation via Incremental elaying Behrouz Maham and Are Hjørungnes UniK University Graduate Center, University of Oslo Instituttveien-5, N-7, Kjeller, Norway behrouz@unik.no,
More informationInstantaneous Inventory. Gain ICs
Instantaneous Inventory Gain ICs INSTANTANEOUS WIRELESS Perhaps the most succinct figure of merit for summation of all efficiencies in wireless transmission is the ratio of carrier frequency to bitrate,
More informationInformation Theory at the Extremes
Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.
More informationChapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University
Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional
More informationBroadcast in Radio Networks in the presence of Byzantine Adversaries
Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)
More informationIN recent years, there has been great interest in the analysis
2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We
More information