Topology Construction in RPL Networks over Beacon-Enabled

Size: px
Start display at page:

Download "Topology Construction in RPL Networks over Beacon-Enabled"

Transcription

1 Toology Construction in RPL Networks over Beacon-Enabled 8.. Mališa Vučinić, Gabriele Romaniello, Laurène Guelorget, Bernard Tourancheau, Franck Rousseau, Olivier Alhand, Andrzej Duda, and Laurent Damon Grenoble Als University, CNRS Grenoble Informatics Laboratory UMR 7, France STMicroelectronics, Crolles, France to construct a cluster-tree anchored at the PAN coordinator (also the sink node) for suorting multi-ho communication. Moreover, a node joining the cluster-tree has to associate with a coordinator (a Layer oeration) before it may send any data frame. The choice of the coordinator influences any ossible choice of the RPL arent node. In the case of the beacon-enabled IEEE 8.. nodes, the roblem is how to construct the 8.. cluster-tree according to the RPL routing information based on a DODAG. While both beacon-enabled IEEE 8.. and RPL have been extensively studied within their OSI abstraction layer, the joint oeration is surrisingly still an oen roblem. The existing work in the literature [] requires extensive modifications to both standards, which is an unrealistic requirement at the current stage of IoT stack develoment. We roose a solution to the roblem that satisfies the constraint of keeing RPL and IEEE 8.. unchanged. In our aroach, RPL constructs its DODAG before the clustertree at L and we use the RPL routing information (selection of the referred arent) in the association decision to establish links, i.e., to select the coordinator in the cluster-tree that is the referred arent in the DODAG. The roosed solution takes advantage of cross-layer signaling: a node joining the network requests RPL information from neighbor 8.. coordinators and associates with the right coordinator based on the information in the RPL DIO message (DODAG Information Object). We adat the oeration of the Trickle timer [6] that governs the transmission of DIO messages to rovide the required information to Layer (the adatation remains comliant with the RPL secification). The main contributions of the aer are the following: a new scheme that allows RPL to run over the beaconenabled IEEE 8.. without any modification to the two standards, the scheme leading to energy savings both during the toology construction and in the steady-state, due to the use of the Trickle timer, a simle robabilistic model of the Trickle timer and an analysis of the delay of the roosed scheme, an evaluation of energy savings and the time for toology convergence based on the imlementation of the roosed scheme in Contiki. The aer is organized as follows. We resent the backarxiv:.78v [cs.ni] Ar Abstract In this aer, we roose a new scheme that allows couling beacon-enabled IEEE 8.. with the RPL routing rotocol while keeing full comliance with both standards. We rovide a means for RPL to ass the routing information to Layer before the 8.. toology is created by encasulating RPL DIO messages in beacon frames. The scheme takes advantage of 8.. command frames to solicit RPL DIO messages. The effect of the command frames is to reset the Trickle timer that governs sending DIO messages. We rovide a detailed analysis of the overhead incurred by the roosed scheme to understand toology construction costs. We have evaluated the scheme using Contiki and the instruction-level Cooja simulator and comared our results against the most common scheme used for dissemination of the uer-layer information in beaconenabled PANs. The results show energy savings during the toology construction hase and in the steady state. Index Terms IEEE 8.., beacon-enabled mode, RPL, Wireless Sensor Networks, toology construction, multi-ho networks. I. INTRODUCTION The long awaited Internet of Things (IoT) has never been closer. The industry has fully begun to take art and the further develoment is all about standard comliance. The uer layers of the IP rotocol stack for Wireless Sensor Networks (WSN) are being fine-shaed and the gas between IETF and IEEE standards [] are being bridged. Full solutions begin to emerge so roduct interoerability and security are of rimary concern []. The IEEE 8.. standard [] is widely recognized as the main technology for low-ower wireless sensor networking []. Among its different modes, we focus on the beaconenabled mode able to achieve very low energy consumtion by suorting a desired level of radio duty cycling (the roortion between the eriods nodes are on and off). In this aer, we address the roblem of running the Routing Protocol for Low Power and Lossy Networks (RPL) [], the IETF standard for routing in WSN, on to of IEEE 8.. beacon-enabled nodes. The forwarding structure built by RPL is a Destination Oriented Directed Acyclic Grah (DODAG). Each node kees a list of available arent nodes closer to the DODAG root (sink node) and selects one of them as the referred arent based on an objective function. When a link to the referred arent fails, a node switches to another arent in its list. At the link layer, the beacon-enabled IEEE 8.. nodes need

2 ground information on the beacon-enabled IEEE 8.. and RPL in Sections II and III. We rovide a detailed descrition of the roosed scheme in Section IV and evaluate it in Section V. Section VI summarizes the related work. We conclude and discuss the future work in Section VII. II. BEACON-ENABLED IEEE 8.. The lack of a radio duty cycling scheme in the IEEE 8.. non-beacon mode has led to intensive research on the beacon-enabled mode. Periodic beacon frames allow the synchronous slee schedule of devices in the network. As a consequence, it is ossible to guarantee a desired level of radio duty cycling (RDC), which is of the utmost imortance for battery oerated nodes and esecially for those that harvest energy from the environment. The oeration of nodes in the beacon-enabled mode relies on beacons that delimit the start of a suerframe. Immediately following is the Contention Active Period (CAP) during which nodes transmit ending data frames to their arent (cluster coordinator) using the slotted CSMA/CA algorithm (a coordinator node needs to stay active during CAP). Beacon Order (BO) and Suerframe Order (SO) are the key arameters to tune the desired level of radio duty cycling in the beacon-enabled mode. Beacon Interval () is defined as = abasesuerf rameduration BO and SD = abasesuerf rameduration SO is the CAP duration. Thus, the uer-bound roortion of time a duty cycled coordinator node will be active is SO BO. Leaf nodes that only wake u for a transmission may benefit from an even lower duty cycle. The network formed in the non-beacon mode may be a mesh in which each node may communicate with its radiorange neighbors, so running RPL in this case does not raise any roblems. Nodes in the beacon-enabled mode have to form a cluster-tree: a node selects one arent node, the cluster coordinator, and synchronizes with its beacons. The node may become a coordinator itself on behalf of other nodes, which enables multi-ho communication from leaf nodes to the root of the cluster-tree. Scheduling of active eriods of different coordinators is not defined in the IEEE 8.. standard and is therefore left as an imlementation choice. In our evaluations, we use a simle static allocation of active eriods that allows us to focus on the toology construction without affecting the overall results. The Personal Area Network (PAN) coordinator is the root of the tree, the sink of the sensor network. It starts the toology construction by transmitting the first beacon. Other nodes are unassociated and have to switch their radio transceivers on to erform assive scanning, the only mechanism for discovering otential coordinators available in the beaconenabled mode. The recetion of a beacon initiates a scan eriod during which a node waits for beacons. At the end of this eriod, a node can initiate the association with the best coordinator with the sequence of association-request, ack, data-request, association-rely, ack control frames. Note that most of the energy consumed during the toology construction hase comes from idle listening during the scan eriod, which is unavoidable for any association strategy that discovers the best available coordinator. The duration of this interval should allow the discovery of all coordinators in the radio range. Fig. illustrates a timeline of the toology construction for an examle cluster-tree comosed of four nodes. Note that Node may receive beacons from Coordinators and, but it selects Node as the best arent. Scan eriod Association request ACK Beacon Tx Association resonse Data request Fig. : Toology construction in an examle 8.. clustertree. III. RPL ROUTING PROTOCOL FOR LOW POWER AND LOSSY NETWORKS Oerating at the Network layer, RPL [] is a Distance Vector rotocol that secifies how to construct a Destination Oriented Directed Acyclic Grah (DODAG) with a defined objective function and a set of metrics and constraints. RPL secifies a set of new ICMPv6 control messages to exchange information related to a DODAG and notably: DODAG Information Object (DIO) defines and maintains uward routes to the root, i.e. the DODAG. DODAG Information Solicitation (DIS) messages request the DODAG related information from neighboring nodes. The root starts the DODAG building rocess by transmitting a DIO. Neighboring nodes rocess DIOs and make a decision on joining the DODAG based on the objective function and/or local olicy. A node comutes its Rank with resect to the root and starts advertising DIO messages to its neighbors with the udated information. As the rocess continues, each node in the network receives one or more DIO messages and selects a referred arent towards the root. Note that for robustness, RPL kees a list of other arents that can be used in case link conditions change. As we focus on toology construction, we limit the discussion to uward routes. In case of beacon-enabled IEEE 8.. at L, the traditional layer-indeendent oeration would confine the selection of RPL routes to those in the already-constructed L clustertree. Consequently, the overall erformance of RPL would be significantly degraded. We exloit the aroach of merging two structures: the 8.. cluster-tree and the DODAG of t

3 RPL, which allows us to benefit from low overhead, small delays, and near otimal uward routes of RPL [7] while creating the IEEE 8.. cluster-tree required for low duty cycle communications. RPL uses the Trickle algorithm [6] to govern the transmission interval of DIOs. The Trickle algorithm has three main arameters: i) the minimum interval size I min, ii) the maximum interval size I max exressed as the number of times the timer may double, iii) the redundancy constant k. The main idea of the algorithm is to exonentially reduce the amount of control traffic in the network when the toology is consistent, i.e. when there are no link failures or arriving nodes. Consistency is checked by comaring the DODAG state advertised by other nodes in DIOs with the local one. If the number of consistent DIO recetions is higher than redundancy constant k, Trickle refrains from transmitting. Instant t at which Trickle decides if it is going to transmit is randomly selected from interval [I/, I), where I {I min n n Z, n I max }. Interval I is doubled uon its exiration by incrementing n. When a node detects inconsistency (which also includes the initial DODAG construction), n becomes, which sets interval I to I min. As detailed in the next section, we suitably adat arameter I min to construct IEEE 8.. cluster-tree according to the DODAG of RPL. IV. 8.. CLUSTER-TREE CONSTRUCTION BASED ON RPL DODAG We roose the selection of the best coordinator in the 8.. cluster-tree based on the referred arent in the DODAG of RPL. The resulting cluster-tree will effectively be a subset of the DODAG initialized during the toology construction hase. There are several issues with such an aroach: ) RPL is a network layer rotocol, but no communication among nodes at Layer may take lace before links at Layer are established (node association with a coordinator). ) An IEEE 8.. node once associated can only communicate with its cluster coordinator, so after association, a node can only receive DIO messages from its cluster coordinator. In this aer, we focus on addressing the first issue to enable toology construction. The second issue is a art of the future work that may add robustness to IEEE 8.. cluster-tree by keeing alternate arents from the DODAG of RPL. To address the first issue, we exloit the fact that DIO messages are multicast. As Layer multicasts translate to Layer broadcasts, we use beacons to broadcast DIO messages. There is no better broadcast mechanism in multi-ho beacon-enabled networks than the beacons themselves during the scan eriod devices wait for beacons. We assume that IEEE 8.. Reduced Function Devices (RFD) are configured as RPL leaf nodes, i.e., they do not send DIO messages. Similarly, Full Function Devices (FFD) may become cluster coordinators, i.e., they have to be configured as RPL routers, which is a realistic assumtion as the role of a device mainly deends on its energy source. We assume that a node a riori knows if it is an RFD or an FFD. We roose the encasulation of RPL DIO messages in the beacon frame ayload following an idea discussed in the team [8]. Layer adds DIO to the ayload of the next scheduled beacon if the resulting frame does not exceed IEEE 8.. maximum hysical layer frame size of 7 bytes (cf. Fig. ). In case the DIO message cannot fit into the current beacon, it may be fragmented or delayed for the following one as the beacon ayload size varies as a function of downward traffic. RPL IP 6LoWPAN IEEE 8.. DIO event Beacon Tx DIO event DIO ayload Fig. : Encasulation of DIO messages in beacon frames. The exonential increase of the DIO transmission interval governed by Trickle has an imortant side effect: arriving nodes would otentially wait a long time interval before receiving the first DIO. RPL addresses this issue with DIS messages that can be broadcast to solicit the transmission of a DIO: uon recetion of a DIS, a node resets its Trickle interval I to I min so DIO will be transmitted shortly []. However, DIS broadcast is not enough for synchronous duty cycled networks neighbor nodes in the radio range may slee at the instant of the DIS transmission. As exlained above, the recetion of a beacon delimits the start of the Contention Active Period during which the coordinator is active. Thus, CAP is the most suitable eriod during which an unassociated node may solicit information from nearby coordinators. Note that a node wanting to join the network is awake during the scanning eriod so it can receive beacons from several neighbor coordinators. Thus, we roose that the node transmits a solicitation message by erforming CSMA/CA after the beacon if the following two conditions hold: the received beacon is the first one received from a given coordinator, the beacon does not contain a DIO in its ayload. The solicitation message could be a RPL DIS message encasulated in an 8.. command frame. Note that a node cannot send data frames before association []. However, we have chosen to use the IEEE 8.. beacon-request command frame without any ayload as a solicitation message it has a small size (8 bytes) so a very short transmission time. Additionally, the RPL secification [] allows the Trickle reset triggered by external events. Note that the beacon-request command frame is tyically used in the non-beacon mode to solicit the information about the network. It has no use in the beacon-enabled mode as beacons are eriodically transmitted. We use its recetion at Layer to trigger the reset of the Trickle timer at the RPL layer t

4 to sawn a DIO transmission. The goal is to encasulate the DIO message in the following beacon so that arriving nodes can select the best coordinator. As a node may send several beacon-request solicitation frames during the scan eriod (and CAP of each detected coordinator), the scheme ensures the reset of the Trickle timer for all RPL routers in the range. A ossible drawback of the scheme could be its ossible side effect on the duration of the always-on scan eriod. In fact, with tyical arent selection schemes at Layer, each beacon carries a network-secific metric rocessed by arriving nodes. Then, in case Beacon Order is a riori known, the worst-case scan duration is one Beacon Interval. However, a simle algorithm achieves the same duration with our scheme as well during the scan eriod of duration : ) for each discovered coordinator, a node stores the exected instant of the next beacon (current time() + ), ) for each discovered coordinator, a node solicits the reset of the Trickle timer as exlained above, ) uon exiration of, a node goes to slee and schedules its wake u at the instants found in (), ) a node wakes u and receives the beacon with the DIO ayload, ) uon recetion of the DIO ayload from the last discovered coordinator, a node consults RPL about the best choice and schedules the next wake u just before the beacon of the selected coordinator; then, the node follows the standard association rocedure. This scheme ensures the discovery of all coordinators in the radio range while allowing a node to start duty cycling after one from the boot time (cf. Fig. ). During next, node receives DIOs and asses them to RPL. In the worst case, by the end of the second, RPL will have the referred arent selected. The additional worst-case delay of one is the rice to ay during the toology construction for the benefit that comes later-on with the Trickle timer during the network oeration. As the node sends most of the second beacon interval sleeing, it consumes energy only for receiving beacons. For n discovered coordinators, the energy will be E = n T I RX V, where I RX is the radio current draw in receive mode, V the oerating voltage, and T transmission time of one IEEE 8.. beacon with a DIO message in its ayload (tyically around. ms for kb/s IEEE 8.. comliant radios). Note, however, that in many deloyments, BO is not a- riori known. In such cases, devices have to scan for longer eriods to account for the largest exected in resence of multile PANs [9]. Our scheme in such scenarios introduces no additional delay as long as the reconfigured scan duration is greater than or equal to half the actual in the network. A. I min Parameter Tuning and Analysis The successful oeration of the roosed scheme requires that, uon solicitation, the subsequent beacon includes a DIO message. To achieve such behavior while keeing the oeration of two layers indeendent, we need to configure beginning of scan CAP scan eriod Association request Association resonse sleeing eriod Beacon Tx DIO ayload sleeing eriod DIO Solicitation frame Data request ACK Fig. : Soliciting DIO during the scan eriod. t Trickle reset the Trickle I min arameter as a function of, because the recetion of a solicitation frame triggers the Trickle timer reset and the next timer value will be uniformly drawn from the interval [I min /, I min ). Thus, to ensure the arrival of the next DIO before the subsequent beacon, the following condition needs to hold: I min SD, () where SD denotes CAP duration. Similarly, as reviously discussed, the worst case scan eriod when BO is a riori known, is. The otimal erformance of Trickle with our scheme is obtained when I min = SD, which ensures the successful oeration while having the lowest overhead. B. Analysis of DIO Recetion Delay We evaluate here the exected delay of DIO messages encasulated in eriodic beacons. We define the Trickle timer value as random variable X uniformly distributed in [I/, I), where I is a random variable denoting the current Trickle state. Then, from the Layer oint of view, a DIO message arrives during a beacon interval at instant X mod. Delay D is the interval remaining until the transmission of the next beacon: D = (X X ). () The exected delay is then: X E[D] = E[X] + E[ ]. () Now, recall that I is a discrete random variable in {I min n }, where n =,,..., I max. We model I with a discrete-time Markov chain shown in Fig., where denotes the robability of the Trickle reset. We can notice from I I I I... Imax Fig. : Markov chain with I max + states for Trickle. Fig. that stationary robabilities of states I,..., I Imax

5 follow a geometric distribution with reset robability : Π Ii = ( ) i, i =,..., I max. The last state, I Imax has the stationary robability: Π IImax = ( ) Imax. We can find the exected Trickle timer value as E[X] = E[E[X I]]. As our scheme uses the beacon-request solicitation frame at L to reset Trickle, the case I = I min is of a articular interest. From Eq., it follows that: X E[D I=Imin ] = E[X I=Imin ] + E[ I=Imin ]. () Given the condition of Eq. and also the fact that the right endoint is excluded from the uniform interval, term E[ X ] goes to zero leaving: E[D I = I min ] = E[X I = I min ]. Finally, as X is now a uniform random variable in [I min /, I min ), the exected DIO delay becomes: E[D I = I min ] = I min, I min. () We have validated Eq. by emulating a real node running the Contiki oerating system for constrained devices. We have timestamed the exiration instants of Trickle and the instants of the beacon with DIO transmission. We have configured I min to an aroximate value of / (Contiki accets the values of I min in ower of ). The emulation results over samles strongly corroborate our analysis with a maximal error of.799%. From Eqs. and, it follows that for setting I min = SD, our scheme introduces the least additional delay to Trickle after reset, while ensuring successful oeration Pan coordinator Coordinator 6 Device 6 Cluster Fig. : Evaluated toology. V. PERFORMANCE EVALUATION To evaluate our scheme, we have used an imlementation of the IEEE 8.. beacon-enabled mode secifically develoed and otimized for harvested sensor motes manufactured by STMicroelectronics (ST) containing a bit microcontroller and a rorietary radio 8.. transceiver. To our knowledge, it is the first IEEE 8.. beaconenabled imlementation for the Contiki oerating system. To benefit from the Cooja simulator [] that uses the MSPsim instruction-level emulator of the Tmote Sky latform, our team orted the beacon-enabled layer develoed for the ST motes to the Tmote Sky latform. Tmote Sky is based on a 6-bit MSP microcontroller, oerating at 8MHz clock rate, and the CC Chicon radio. Note that the only imerfection of Cooja with resect to the real world environment comes from the Unit Disk Grah radio channel model. Fig. resents the evaluated toology. Many authors in the literature discussed the method of encasulating information necessary for toology construction in the beacon ayload (arent selection, neighbor discovery) [], [], []. Consequently, they assume the information to be resent in each beacon. As our goal in this aer was to resent benefits in terms of 8.. toology construction, we have comared our scheme against this aroach and denote the scheme Systematic Beacon Payload (SBP). To be fair and not to loose the generality of our results, we have studied the effects of varying the SBP message size and how it affects erformance. We found that the two schemes have similar erformance when the SBP message size is aroximately / of the DIO size (cf. Fig. 6(a)), that is, when one coordinator from Fig. sends DIO message for every beacons with SBP on the average during toology construction. Note that this ratio deends on the duration of the scan eriod and the configuration of Trickle. For a given imlementation, one can easily evaluate such a ratio and derive the gain or loss deending on the message size arameters. We set the I min Trickle arameter to aroximately SD and kee SO equal to. We comute the radio energy consumtion from the current draw values reorted in the Tmote Sky data sheet. We average all the oints in the following grahs over emulation runs and show them with 9% confidence intervals. We can notice in Fig. that nodes have only one coordinator in their radio range. We have chosen such toology to focus on toology construction in RPL networks over beaconenabled 8.. and evaluate the effect of our scheme. In this way, we isolate toology construction asects from the roblems related to routing that may deend on the choice of routing metrics or objective functions. Moreover, a single coordinator discovered during the scan eriod means that the solicitation scheme is ut under stress. Indeed, if a single DIO message does not arrive with the subsequent beacon uon solicitation, the node will have to initiate another scan eriod, which would unnecessarily increase the toology convergence delay. Nevertheless, the examle toology in Fig. is favorable to the roosed scheme in terms of delay it does not introduce additional delay in case BO is a riori known, i.e., the first discovered coordinator is also the last one, so a node can initiate the association rocedure after the scan eriod of one. However, we discuss the worst case delay in the resence of multile coordinators in Section IV. Also note that in some cases, the first beacon discovered during the scan eriod may already contain a DIO message. As the Trickle timer randomly selects its exiration interval and our scheme kees the oeration of two layers indeendent, it is a lucky outcome. In this case, a node does not need to solicit DIO as detailed in Section IV. However, a node still has

6 Control overhead [Kbytes] Energy consumtion in TX [mj] SBP BO= DIO BO= SBP BO=6 DIO BO=6 /6 / / / /6 SBP/DIO ratio (a) Overhead, variable SBP size... SBP ho SBP ho SBP ho DIO ho DIO ho DIO ho Association delays [s] SBP ho SBP ho SBP ho DIO ho DIO ho DIO ho (b) Toology convergence time. (c) Energy sent in transmission, in mj. (d) Energy sent in recetion, in J. Energy consumtion in RX [J].. SBP ho SBP ho SBP ho DIO ho DIO ho DIO ho Fig. 6: Results from emulation during toology construction. to wait for the exiration of the scan eriod before initiating its association rocedure to ensure that it has discovered all otential coordinators. Contol Overhead [Kbytes] 6 SBP DIO 8 Scan Duration (a) Total overhead Energy consumtion in TX [mj]... SBP ho SBP ho SBP ho DIO ho DIO ho DIO ho 8 Scan Duration (b) Energy sent in transmission, in mj Fig. 7: Results from emulation during toology construction for variable scan duration and BO =. We resent the results for the case in which two schemes have the most similar erformance, i.e., we set the message size of SBP to / of DIO (cf. Fig. 6(a)). Larger SBP message sizes result in worse erformance while smaller SBP messages result in better erformance during toology construction in case BO is a riori known. A. Toology Construction We study the toology construction hase for two cases: ) BO is a riori known so the scan eriod can be set to the minimal value of ; ) there is no a riori knowledge of BO so nodes use a sub-otimal scan duration to account for the worst case. In both cases, simulations last until the association of the last node. For case ), Figs. 6(b)-6(d) resent the results for varying BO. We can see in Fig. 6(b) that our scheme does not introduce any additional delay for the evaluated toology and the results for two schemes are similar within confidence intervals. Fig. 6(c) shows similar results in terms of cumulative energy sent in transmission, a consequence of the choice of the arameters for two schemes. Notably, coordinators at ho and send aroximately the same energy transmitting beacons. The major art of the energy sent in recetion comes from idle listening during the scan eriod so two schemes erform equally (cf. Fig. 6(d)). For case ), when BO is not a riori known, we vary the scan eriod. As nodes remain in recetion mode much longer, the energy sent in recetion makes the major art of the total consumtion. Similarly to Figs. 6(b) and 6(d), two schemes erform equally. However, as the scan eriod is longer, there is a larger number of beacons transmitted before the toology converges. We can thus see the effect of the Trickle algorithm and the roosed solicitation scheme (cf. Fig. 7(a)) that results in energy savings for ho nodes as they transmit beacons the longest until the end of the tree construction (cf. Fig. 7(b)). B. Steady-state Furthermore, we have evaluated the benefits in terms of energy savings in the steady state, i.e., after toology construction. There was no alication traffic in the network and nodes simly duty cycle according to their schedules. The resented results concern 6 minutes of the network oeration after the association of the last node. We can see the effect of the reduction in control overhead by the Trickle algorithm in Fig. 8(a). In articular, FFD nodes (ho and ) transmit short beacons without any ayload most of the time, which results in energy savings both during recetion and transmission. During recetion, however, a major art of energy consumtion comes from active listening during the CAP of each coordinator so this effect is masked (cf. Fig. 8(b)). Note that in Fig. 8(a), the consumtion of RFDs is zero as there is no alication traffic in the network. Also, during the steady state, the recetion consumtion of FFDs (ho and ) is the same, as devices remain active during the same amount of time (CAP duration). Energy consumtion in TX [mj] 7 6 SBP ho SBP ho DIO ho DIO ho (a) Energy sent in transmission, in mj. (b) Energy sent in recetion, in J. Energy consumtion in RX [J] SBP ho SBP ho SBP ho DIO ho DIO ho DIO ho Fig. 8: Results from emulation during 6 min. of steady state. VI. RELATED WORK The erformance of multi-ho IEEE 8.. networks has been well studied during the last years both using robabilistic aroaches [] and simulations []. Energy consumtion introduced during the scan eriod is widely recognized as a

7 significant roblem. The recent work of Karowski et al. [9] lowered this cost by otimizing the number of slots to listen over different channels. Romaniello et al. [6] roosed the Multichannel Beacon Train Protocol for faster discovery over multile channels in the resence of varying beacon intervals. Kohvakka et al. discussed a rotocol that carries the time offset and the frequency channel in beacons to ease the scanning rocess for the joining node []. It is imortant to stress that our work in this aer is agnostic of the scanning rocess. Namely, the solicitation scheme we roose starts once a node has discovered all neighboring coordinators. As the de-facto standard for routing in IP-based WSN, RPL has been extensively studied in terms of convergence delays, route otimality, ath availability, and incurred overheads [7], [8]. Couled with the common wisdom that cross-layer signaling is necessary for a successful oeration of a routing rotocol in low ower and lossy networks, this fact rovides a strong suort to the aroach resented in our aer. The work of Pavković et al. is closely related to ours []. The authors roosed the adatations to the IEEE 8.. standard to integrate its oeration with RPL. Moreover, they roosed an oortunistic version of RPL to imrove the delivery of time-sensitive traffic and evaluated the roosal in terms of acket delivery ratio and delay. In recent work [], they discussed the RPL erformance benefits of modifying the IEEE 8.. cluster-tree structure into a cluster-dag. Our work was basically motivated by the same roblem the incomatibility of two structures, the 8.. clustertree and the DODAG. While the aroach of Pavković et al. resents erformance imrovement, its main drawback is the need for modifications of two standards, RPL and IEEE 8... We have addressed the same roblem from a different ersective instead of modifying the standards, we rovide a means for constructing the RPL DODAG and forming the cluster-tree as its subset. As a consequence, we obtain full comliance with both standards. VII. CONCLUSION We have resented a scheme that allows couling beaconenabled IEEE 8.. with the RPL routing rotocol. The scheme does not require any modification to both standards. We rovide a means for RPL to ass the routing information to Layer before the 8.. toology is created by encasulating RPL DIO messages in beacon frames. The scheme takes advantage of 8.. command frames to solicit DIO messages. The effect of the command frames is to reset the Trickle timer that governs sending of DIO messages. We have evaluated the roosed scheme using the Contiki oerating system for constrained nodes and the instructionlevel Cooja simulator. The results show energy savings during the toology construction hase and in the steady state. To isolate evaluation, we have disabled the RPL suort for downward traffic (DAO messages). We lan to evaluate its behavior when running on to of the IEEE 8.. clustertree as a art of the future work. We also lan to consider an otimal L mechanism that will allow the selection of an alternate coordinator from the DODAG in case of link failures. ACKNOWLEDGMENTS Many thanks to Jean-Batiste Guet and Chi-Anh La for the develoment of tools that we used during this work, and to Martin Heusse and anonymous reviewers for comments that imroved the quality of the aer. The work of O. Alhand, F. Rousseau, and A. Duda was artially suorted by the French National Research Agency (ANR) roject IRIS under contract ANR--INFR-6 and the Euroean Commission FP7 roject CALIPSO under contract The work reflects only the authors views; the Euroean Community is not liable for any use that may be made of the information contained herein. REFERENCES [] IEEE Std 8..- (Revision of 6),.,. [] M. Vučinić, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and R. Guizzetti, OSCAR: Object Security Architecture for the Internet of Things, in WoWMoM. IEEE,. [] M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, and M. Dohler, Standardized Protocol Stack for the Internet of (Imortant) Things, Communications Surveys Tutorials, IEEE, vol., no.,. 89 6,. [] T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J. Vasseur, and R. Alexander, RPL: IPv6 Routing Protocol for Low ower and Lossy Networks, IETF, RFC 6, March. [] B. Pavković, A. Duda, W.-J. Hwang, and F. Theoleyre, Efficient Toology Construction for RPL over IEEE 8.. in Wireless Sensor Networks, Ad Hoc Networks, Elsevier,. [6] P. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: a Self-Regulating Algorithm for Code Proagation and Maintenance in Wireless Sensor Networks, in NSDI, vol.. USENIX Association,,.. [7] A. Triathi, J. de Oliveira, and J. Vasseur, Performance Evaluation of Routing Protocol for Low Power and Lossy Networks, IETF, RFC 6687,. [8] O. Alhand, E. Duble, A. Duda, M. Favre, R. Guizzetti, M. Heusse, and F. Rousseau, GreenNet: a Wireless Sensor Network for Harvested Nodes, Grenoble Informatics Laboratory, Tech. Re.,. [9] N. Karowski, A. Viana, and A. Wolisz, Otimized Asynchronous Multichannel Discovery of IEEE 8..-Based Wireless Personal Area Networks, Transactions on Mobile Comuting, IEEE, vol., no., ,. [] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, Cross- Level Sensor Network Simulation with COOJA, in Local Comuter Networks. IEEE, 6, [] M. Kohvakka, J. Suhonen, M. Kuorilehto, V. Kaseva, M. Hännikäinen, and T. D. Hämäläinen, Energy-Efficient Neighbor Discovery Protocol for Mobile Wireless Sensor Networks, Ad Hoc Networks, Elsevier, vol. 7, no.,., 9. [] B. Pavković, F. Theoleyre, and A. Duda, Multiath Oortunistic RPL Routing over IEEE 8.., in Proceedings of the MSWiM Conference. ACM,, [] Z. Yiming, Y. Xianglong, G. Xishan, Z. Mingang, and W. Liren, A Design of Greenhouse Monitoring Control System Based on ZigBee Wireless Sensor Network, in WiCom, 7, [] J. Misic, S. Shafi, and V. Misic, Performance of a beacon enabled IEEE 8.. cluster with downlink and ulink traffic, Parallel and Distributed Systems, IEEE Transactions on, vol. 7, no., 6. [] G. Anastasi, M. Conti, M. Di Francesco, and V. Neri, Reliability and energy efficiency in multi-ho ieee 8../zigbee wireless sensor networks, in ISCC. IEEE,,. 6. [6] G. Romaniello, E. Potetsianakis, O. Alhand, R. Guizzetti, and A. Duda, Fast and Energy-Efficient Toology Construction in Multi-Ho Multi- Channel 8.. Networks, in WiMob. IEEE,. [7] M. Vučinić, B. Tourancheau, and A. Duda, Performance Comarison of the RPL and LOADng Routing Protocols in a Home Automation Scenario, in WCNC. IEEE, Aril, [8] H. Kermajani and C. Gomez, Route change latency in low-ower and lossy wireless networks using rl and 6lowan neighbor discovery, in ISCC. IEEE,,

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks Otimal -ersistent MAC algorithm for event-driven Wireless Sensor Networks J. Vales-Alonso,E.Egea-Lóez, M. V. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro Deartment of Information Technologies and

More information

Evaluation of the 6TiSCH Network Formation

Evaluation of the 6TiSCH Network Formation Evaluation of the 6TiSCH Network Formation Dario Fanucchi 1 Barbara Staehle 2 Rudi Knorr 1,3 1 Department of Computer Science University of Augsburg, Germany 2 Department of Computer Science University

More information

Prediction Efficiency in Predictive p-csma/cd

Prediction Efficiency in Predictive p-csma/cd Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, 30-059 Kraów, Poland misow@agh.edu.l Abstract. Predictive

More information

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,

More information

Energy Consumption and Performance of IEEE e TSCH and DSME

Energy Consumption and Performance of IEEE e TSCH and DSME Energy Consumption and Performance of IEEE 2.15.e TSCH and DSME Iacob Juc, Olivier Alphand, Roberto Guizzetti, Michel Favre, Andrzej Duda To cite this version: Iacob Juc, Olivier Alphand, Roberto Guizzetti,

More information

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract

More information

Properties of Mobile Tactical Radio Networks on VHF Bands

Properties of Mobile Tactical Radio Networks on VHF Bands Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a

More information

Low-Power Interoperability for the IPv6 Internet of Things

Low-Power Interoperability for the IPv6 Internet of Things for the IPv6 Adam Dunkels, Joakim Eriksson, Nicolas Tsiftes Swedish Institute of Computer Science Presenter - Bob Kinicki Fall 2015 Introduction The is a current buzz term that many see as the direction

More information

Analysis of Mean Access Delay in Variable-Window CSMA

Analysis of Mean Access Delay in Variable-Window CSMA Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,

More information

FOUNTAIN codes [1], [2] have been introduced to achieve

FOUNTAIN codes [1], [2] have been introduced to achieve Controlled Flooding of Fountain Codes Waqas bin Abbas, Paolo Casari, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE Abstract We consider a multiho network where a source node must reliably deliver a

More information

Random Access Compressed Sensing in Underwater Sensor Networks

Random Access Compressed Sensing in Underwater Sensor Networks Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:

More information

Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency

Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency Practical Evaluation of Cooerative Communication for Ultra-Reliability and Low-Latency Martin Serror, Sebastian Vaaßen, Klaus Wehrle, James Gross Chair of Communication and Distributed Systems, RWTH Aachen

More information

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi

More information

GLM700ASB family. Tooth sensor module with integrated magnet DATA SHEET

GLM700ASB family. Tooth sensor module with integrated magnet DATA SHEET The sensor modules of the GLM700ASB-Ax family are designed for use with assive measurement scales. The modules combine a GiantMagnetoResistive (GMR) tooth sensor with an integrated bias magnet in a comact

More information

University of Twente

University of Twente University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:

More information

and assigned priority levels in accordance with the QoS requirements of their applications.

and assigned priority levels in accordance with the QoS requirements of their applications. Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco Quintyne *, Adrian Als Deartment of Comuter Science, Physics and Mathematics University of the West Indies

More information

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game A Pricing-Based Cooerative Sectrum Sharing Stackelberg Game Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, and Fadel F. Digham? Wireless Intelligent Networks Center (WINC), Nile University, Smart Village,

More information

Chapter 7 Local Navigation: Obstacle Avoidance

Chapter 7 Local Navigation: Obstacle Avoidance Chater 7 Local Navigation: Obstacle Avoidance A mobile robot must navigate from one oint to another in its environment. This can be a simle task, for examle, if a robot can follow an unobstructed line

More information

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks Journal of Comuter Science 3 (5: 353-360, 2007 ISSN 1549-3636 2007 Science Publications A Novel Image Comonent Transmission Aroach to Imrove Image Quality and nergy fficiency in Wireless Sensor Networks

More information

CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller

CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY 5. INTRODUCTION The Internal Model Control (IMC) based aroach for PID controller design can be used to control alications in industries. It is because, for ractical

More information

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes 22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National

More information

An Overview of Substrate Noise Reduction Techniques

An Overview of Substrate Noise Reduction Techniques An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo

More information

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor

More information

Initial Ranging for WiMAX (802.16e) OFDMA

Initial Ranging for WiMAX (802.16e) OFDMA Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,

More information

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network Send Orders for Rerints to rerints@benthamscienceae 690 The Oen Cybernetics & Systemics Journal, 05, 9, 690-698 Oen Access The Otimization Model and Algorithm for Train Connection at Transfer Stations

More information

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ Rong Lin y Koji Nakano z Stehan Olariu x Albert Y. Zomaya Abstract We roose an efficient reconfigurable arallel refix counting

More information

Computer Networks 56 (2012) Contents lists available at SciVerse ScienceDirect. Computer Networks

Computer Networks 56 (2012) Contents lists available at SciVerse ScienceDirect. Computer Networks Comuter Networks 56 (2012) 2221 2236 Contents lists available at SciVerse ScienceDirect Comuter Networks journal homeage: www.elsevier.com/locate/comnet Queen-MAC: A quorum-based energy-efficient medium

More information

ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM

ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM Kaushal Patel 1 1 M.E Student, ECE Deartment, A D Patel Institute of Technology, V. V. Nagar, Gujarat, India ABSTRACT Today, in

More information

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which

More information

Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks

Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO., DECEMBER 365 Primary User Enters the Game: Performance of Dynamic Sectrum Leasing in Cognitive Radio Networks Gonzalo Vazquez-Vilar, Student Member,

More information

Random Access Compressed Sensing for Energy-Efficient Underwater Sensor Networks

Random Access Compressed Sensing for Energy-Efficient Underwater Sensor Networks Random Access Comressed Sensing for Energy-Efficient Underwater Sensor Networks Fatemeh Fazel, Maryam Fazel and Milica Stojanovic Abstract Insired by the theory of comressed sensing and emloying random

More information

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER Introduction:

More information

State-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie

State-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie State-of-the-Art Verification of the Hard Driven GTO Inverter Develoment for a 100 MVA Intertie P. K. Steimer, H. Grüning, J. Werninger R&D Drives and Power Electronics ABB Industrie AG CH-5300 Turgi,

More information

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment

More information

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Abdelmalik Bachir, Martin Heusse, and Andrzej Duda Grenoble Informatics Laboratory, Grenoble, France Abstract. In preamble

More information

A Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics

A Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics A Genetic Algorithm Aroach for Sensorless Seed Estimation by using Rotor Slot Harmonics Hayri Arabaci Abstract In this aer a sensorless seed estimation method with genetic algorithm for squirrel cage induction

More information

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University

More information

Reliability and Criticality Analysis of Communication Networks by Stochastic Computation

Reliability and Criticality Analysis of Communication Networks by Stochastic Computation > EPLACE HIS LINE WIH YOU PAPE IDENIFICAION NUMBE (DOUBLE-CLICK HEE O EDI) < 1 eliability and Criticality Analysis of Communication Networks by Stochastic Comutation Peican Zhu, Jie Han, Yangming Guo and

More information

Mathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks

Mathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks Mathematical and Comuter Modelling 53 (2011) 2093 2107 Contents lists available at ScienceDirect Mathematical and Comuter Modelling journal homeage: www.elsevier.com/locate/mcm On the characterization

More information

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach Adative Switching between Satial Diversity and ultilexing: a Cross-layer Aroach José Lóez Vicario and Carles Antón-Haro Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) c/ Gran Caità -4, 08034

More information

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Matti Hämäläinen, Raffaello Tesi, Veikko Hovinen, Niina Laine, Jari Iinatti Centre for Wireless Communications, University

More information

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:

More information

Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks

Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks Yoav Sasson David Cavin André Schier {yoav.sasson,david.cavin,andre.schier}@efl.ch École Polytechnique Fédérale de Lausanne (EPFL)

More information

Lab 4: The transformer

Lab 4: The transformer ab 4: The transformer EEC 305 July 8 05 Read this lab before your lab eriod and answer the questions marked as relaboratory. You must show your re-laboratory answers to the TA rior to starting the lab.

More information

Full Bridge Single Stage Electronic Ballast for a 250 W High Pressure Sodium Lamp

Full Bridge Single Stage Electronic Ballast for a 250 W High Pressure Sodium Lamp Full Bridge Single Stage Electronic Ballast for a 50 W High Pressure Sodium am Abstract In this aer will be reorted the study and imlementation of a single stage High Power Factor (HPF) electronic ballast

More information

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Proceedings of the World Congress on Engineering 2 Vol II WCE 2, July 6-8, 2, London, U.K. Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Yun Won Chung Abstract Energy

More information

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation 1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of

More information

Energy Efficient Configuration for QoS in Reliable Parallel Servers

Energy Efficient Configuration for QoS in Reliable Parallel Servers Proc. of the Fifth Euroean Deendable Comuting Conference, Ar. 2005 Energy Efficient Configuration for QoS in Reliable Parallel Servers Dakai Zhu 1, Rami Melhem 2, and Daniel Mossé 2 1 University of Texas

More information

Design of PID Controller Based on an Expert System

Design of PID Controller Based on an Expert System International Journal of Comuter, Consumer and Control (IJ3C), Vol. 3, No.1 (014) 31 Design of PID Controller Based on an Exert System Wei Li Abstract For the instability of traditional control systems,

More information

The Impact of Random Waypoint Mobility on Infrastructure Wireless Networks

The Impact of Random Waypoint Mobility on Infrastructure Wireless Networks The Imact of Random Wayoint Mobility on Infrastructure Wireless Networks Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications The University of New South Wales, NSW 5 Australia

More information

Active RFID System with Wireless Sensor Network for Power

Active RFID System with Wireless Sensor Network for Power 38 Active RFID System with Wireless Sensor Network for Power Raed Abdulla 1 and Sathish Kumar Selvaperumal 2 1,2 School of Engineering, Asia Pacific University of Technology & Innovation, 57 Kuala Lumpur,

More information

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page VOCAL Technologies, Ltd. Home age 802.b White Paer Table of Contents Page. 802.b Glossary... 2 2. Introduction to 802.b... 3 3. 802.b Overview... 6 4. CCK used in 802.b... 7 5. Walsh and Comlementary Codes

More information

Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video streaming systems

Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video streaming systems International Journal of Engineering Research and Develoment e-iss: 78-067X, -ISS: 78-800X, www.ijerd.com olume 0, Issue (December 04), PP.30-38 Accurate wireless channel modeling for efficient adative

More information

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,

More information

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit

More information

A toy-model for the regulation of cognitive radios

A toy-model for the regulation of cognitive radios A toy-model for the regulation of cognitive radios Kristen Woyach and Anant Sahai Wireless Foundations Deartment of EECS University of California at Berkeley Email: {kwoyach, sahai}@eecs.berkeley.edu Abstract

More information

Self-Driven Phase Shifted Full Bridge Converter for Telecom Applications

Self-Driven Phase Shifted Full Bridge Converter for Telecom Applications Self-Driven Phase Shifted Full Bridge Converter for Telecom Alications SEVILAY CETIN Technology Faculty Pamukkale University 7 Kinikli Denizli TURKEY scetin@au.edu.tr Abstract: - For medium ower alications,

More information

A Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency

A Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency IEEE TANSACTIONS ON POWE EECTONICS, VO. 18, NO. 2, MACH 2003 539 A Novel, obust DSP-Based Indirect otor Position Estimation for Permanent Magnet AC Motors Without otor Saliency i Ying and Nesimi Ertugrul,

More information

UNDERWATER sensor networks are envisioned as consisting

UNDERWATER sensor networks are envisioned as consisting 66 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 8, SEPTEMBER 2 Random Access Comressed Sensing for Energy-Efficient Underwater Sensor Networks Fatemeh Fazel, Maryam Fazel and Milica Stojanovic

More information

Computational Complexity of Generalized Push Fight

Computational Complexity of Generalized Push Fight Comutational Comlexity of Generalized Push Fight Jeffrey Bosboom Erik D. Demaine Mikhail Rudoy Abstract We analyze the comutational comlexity of otimally laying the two-layer board game Push Fight, generalized

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Multi-TOA Based Position Estimation for IR-UWB

Multi-TOA Based Position Estimation for IR-UWB Multi-TOA Based Position Estimation for IR-UWB Genís Floriach, Montse Nájar and Monica Navarro Deartment of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC), Barcelona, Sain

More information

PERFORMANCE IMPROVEMENT OF MANETS

PERFORMANCE IMPROVEMENT OF MANETS PERFORMANCE IMPROVEMENT OF MANETS WITH LINK LIFETIME Merlinda Drini, Queensborough Community College/CUNY; Tare Saadawi, City College of New Yor Abstract There are many different factors in the hysical

More information

Application Note D. Dynamic Torque Measurement

Application Note D. Dynamic Torque Measurement Page 1 of 9 Alication Note 221101D Dynamic Torque Measurement Background Rotary ower sources and absorbers have discrete oles and/or istons and/or gear meshes, etc. As a result, they develo and absorb

More information

High resolution radar signal detection based on feature analysis

High resolution radar signal detection based on feature analysis Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature

More information

Operating Characteristics of Underlay Cognitive Relay Networks

Operating Characteristics of Underlay Cognitive Relay Networks Oerating Characteristics of Underlay Cognitive Relay Networks Ankit Kaushik, Ralh Tanbourgi, Friedrich Jondral Communications Engineering Lab Karlsruhe Institute of Technology (KIT) {Ankit.Kaushik, Ralh.Tanbourgi,

More information

THE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES. x y s ABSTRACT

THE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES. x y s ABSTRACT THE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES David DUBOIS, NEXANS, (France), david.dubois@nexans.com Pierre MIREBEAU, NEXANS, (France), ierre.mirebeau@nexans.com

More information

EXTENDED BLOCK NEIGHBOR DISCOVERY PROTOCOL FOR HETEROGENEOUS WIRELESS SENSOR NETWORK APPLICATIONS

EXTENDED BLOCK NEIGHBOR DISCOVERY PROTOCOL FOR HETEROGENEOUS WIRELESS SENSOR NETWORK APPLICATIONS 31 st January 218. Vol.96. No 2 25 ongoing JATIT & LLS EXTENDED BLOCK NEIGHBOR DISCOVERY PROTOCOL FOR HETEROGENEOUS WIRELESS SENSOR NETWORK APPLICATIONS 1 WOOSIK LEE, 2* NAMGI KIM, 3 TEUK SEOB SONG, 4

More information

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation 3822 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Caacity Gain From Two-Transmitter and Two-Receiver Cooeration Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE,

More information

Data-precoded algorithm for multiple-relayassisted

Data-precoded algorithm for multiple-relayassisted RESEARCH Oen Access Data-recoded algorithm for multile-relayassisted systems Sara Teodoro *, Adão Silva, João M Gil and Atílio Gameiro Abstract A data-recoded relay-assisted (RA scheme is roosed for a

More information

JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET

JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET Deeaknath Tandur, and Marc Moonen ESAT/SCD-SISTA, KULeuven Kasteelark Arenberg 10, B-3001, Leuven-Heverlee,

More information

Modeling and simulation of level control phenomena in a non-linear system

Modeling and simulation of level control phenomena in a non-linear system www.ijiarec.com ISSN:2348-2079 Volume-5 Issue- International Journal of Intellectual Advancements and Research in Engineering Comutations Modeling and simulation of level control henomena in a non-linear

More information

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks He Ba, Ilker Demirkol, and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

INTERNET PID CONTROLLER DESIGN: M. Schlegel, M. Čech

INTERNET PID CONTROLLER DESIGN:  M. Schlegel, M. Čech INTERNET PID CONTROLLER DESIGN: WWW.PIDLAB.COM M. Schlegel, M. Čech Deartment of Cybernetics, University of West Bohemia in Pilsen fax : + 0403776350, e-mail : schlegel@kky.zcu.cz, mcech@kky.zcu.cz Abstract:

More information

MLSE Diversity Receiver for Partial Response CPM

MLSE Diversity Receiver for Partial Response CPM MLSE Diversity Receiver for Partial Resonse CPM Li Zhou, Philia A. Martin, Desmond P. Taylor, Clive Horn Deartment of Electrical and Comuter Engineering University of Canterbury, Christchurch, New Zealand

More information

Software for Modeling Estimated Respiratory Waveform

Software for Modeling Estimated Respiratory Waveform Software for Modeling Estimated Resiratory Waveform Aleksei E. Zhdanov, Leonid G. Dorosinsky Abstract In the imaging of chest or abdomen, motion artifact is an unavoidable roblem. In the radiation treatment,

More information

Series PID Pitch Controller of Large Wind Turbines Generator

Series PID Pitch Controller of Large Wind Turbines Generator SERBIAN JOURNAL OF ELECRICAL ENGINEERING Vol. 1, No., June 015, 183-196 UDC: 61.311.4:681.5 DOI: 10.98/SJEE150183M Series PID Pitch Controller of Large Wind urbines Generator Aleksandar D. Micić 1, Miroslav

More information

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation Antenna Selection Scheme for Wireless Channels Utilizing Differential Sace-Time Modulation Le Chung Tran and Tadeusz A. Wysocki School of Electrical, Comuter and Telecommunications Engineering Wollongong

More information

Multi-period Channel Assignment

Multi-period Channel Assignment Multi-eriod Channel Assignment Hakim Mabed, Alexandre Caminada and Jin-Kao Hao 2 France Télécom R&D, 6 Avenue des Usines, BP 382, 97 Belfort, France {hakim.mabed,alexandre.caminada}@francetelecm.com Tel:

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

The online muon identification with the ATLAS experiment at the LHC

The online muon identification with the ATLAS experiment at the LHC 32 he online muon identification with the ALAS exeriment at the LHC Abstract he Large Hadron Collider (LHC) at CERN is a roton-roton collider roviding the highest energy and the highest instantaneous luminosity

More information

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional

More information

THE HELMHOLTZ RESONATOR TREE

THE HELMHOLTZ RESONATOR TREE THE HELMHOLTZ RESONATOR TREE Rafael C. D. Paiva and Vesa Välimäki Deartment of Signal Processing and Acoustics Aalto University, School of Electrical Engineering Esoo, Finland rafael.dias.de.aiva@aalto.fi

More information

An Empirical Study of Harvesting-Aware Duty Cycling in Sustainable Wireless Sensor Networks

An Empirical Study of Harvesting-Aware Duty Cycling in Sustainable Wireless Sensor Networks An Empirical Study of Harvesting-Aware Duty Cycling in Sustainable Wireless Sensor Networks Pius Lee Mingding Han Hwee-Pink Tan Alvin Valera Institute for Infocomm Research (I2R), A*STAR 1 Fusionopolis

More information

Scenarios for Development, Test and Validation of Automated Vehicles

Scenarios for Development, Test and Validation of Automated Vehicles Scenarios for Develoment, Test and Validation of Automated Vehicles Till Menzel, Gerrit Bagschik and Markus Maurer Institute of Control Engineering Technische Universität Braunschweig Braunschweig, Germany

More information

Power Measurement of Ethernet Physical Layer Products

Power Measurement of Ethernet Physical Layer Products ower Measurement of Ethernet hysical Layer roducts 1.0 Introduction System designers require accurate component power consumption specifications, for the purposes of thermal management, component selection,

More information

Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Output of the Receiving Antenna

Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Output of the Receiving Antenna IEEE TANSACTIONS ON ANTENNAS AND POPAGATION 1 Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Outut of the eceiving Antenna Cezary Ziółkowski and an M. Kelner Abstract A method to

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1

IEEE/ACM TRANSACTIONS ON NETWORKING 1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 Otimal Power Allocation and Scheduling Under Jamming Attacks Salvatore D Oro, Eylem Ekici, and Sergio Palazzo Abstract In this aer, we consider a jammed wireless scenario

More information

Underwater acoustic channel model and variations due to changes in node and buoy positions

Underwater acoustic channel model and variations due to changes in node and buoy positions Volume 24 htt://acousticalsociety.org/ 5th Pacific Rim Underwater Acoustics Conference Vladivostok, Russia 23-26 Setember 2015 Underwater acoustic channel model and variations due to changes in node and

More information

Application of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods

Application of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods Alication of Notch Filtering under Low Samling Rate for Broken Rotor Bar Detection with DTFT and AR based Sectrum Methods B. Ayhan H. J. Trussell M.-Y. Chow M.-H. Song IEEE Student Member IEEE Fellow IEEE

More information

Indirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks

Indirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks Indirect Channel Sensing for Cognitive Amlify-and-Forward Relay Networs Yieng Liu and Qun Wan Abstract In cognitive radio networ the rimary channel information is beneficial. But it can not be obtained

More information

Product Accumulate Codes on Fading Channels

Product Accumulate Codes on Fading Channels Product Accumulate Codes on Fading Channels Krishna R. Narayanan, Jing Li and Costas Georghiades Det of Electrical Engineering Texas A&M University, College Station, TX 77843 Abstract Product accumulate

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS

COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS Urbano Tancredi (1), Alfredo Renga (2), and Michele Grassi (3) (1) Deartment for Technologies,

More information

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 200 IEEE. Personal use of this material is ermitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including rerinting/reublishing this material for advertising

More information

Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields

Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields AHMED R. SAYED, HUSSEIN I. ANIS Electrical Power and Machine Deartment Cairo University Giza EGYPT eng_ahmed.rabee@eng.cu.edu.eg,

More information