Opportunistic Routing in Wireless Mesh Networks

Size: px
Start display at page:

Download "Opportunistic Routing in Wireless Mesh Networks"

Transcription

1 Opportunistic Routing in Wireless Mesh Networks Amir arehshoorzadeh Llorenç Cerdá-Alabern Vicent Pla August 31, 2012 Opportunistic Routing in Wireless Mesh Networks 1 / 37

2 Outline 1 Introduction to Opportunistic Routing (OR). 2 Research directions in OR. 3 Routing metrics in OR. 4 Coordination methods in OR. 5 Candidate selection algorithms. 6 Performance evaluation. 7 Conclusions. Opportunistic Routing in Wireless Mesh Networks 2 / 37

3 Introduction to Opportunistic Routing (OR). Traditional Uni-path Routing 30% 10% 90% 90% 90% S A B Node S A B Next Hop for A B Opportunistic Routing in Wireless Mesh Networks 3 / 37

4 Introduction to Opportunistic Routing (OR). Traditional Uni-path Routing 30% 10% 90% 90% 90% S A B Node S A B Next Hop for A B For each destination selects a single next-hop forwarder. End-to-End delivery probability: Opportunistic Routing in Wireless Mesh Networks 3 / 37

5 Introduction to Opportunistic Routing (OR). Traditional Uni-path Routing 30% 10% 90% 90% 90% S A B Node S A B Next Hop for A B For each destination selects a single next-hop forwarder. End-to-End delivery probability: Lot of retransmissions. Opportunistic Routing in Wireless Mesh Networks 3 / 37

6 Introduction to Opportunistic Routing (OR). Traditional Uni-path Routing 30% 10% 90% 90% 90% S A B Node S A B Next Hop for A B For each destination selects a single next-hop forwarder. End-to-End delivery probability: Lot of retransmissions. Waste of network resources. Opportunistic Routing in Wireless Mesh Networks 3 / 37

7 Introduction to Opportunistic Routing (OR). What is Opportunistic Routing (OR)? For each destination selects an ordered set of nodes (Candidate Set). CandSet(S)={, B, A} 10% 30% 90% 90% 90% S A B Opportunistic Routing in Wireless Mesh Networks 4 / 37

8 Introduction to Opportunistic Routing (OR). What is Opportunistic Routing (OR)? For each destination selects an ordered set of nodes (Candidate Set). CandSet(S)={, B, A} 10% 30% 90% 90% 90% S A B Opportunistic Routing in Wireless Mesh Networks 4 / 37

9 Introduction to Opportunistic Routing (OR). What is Opportunistic Routing (OR)? For each destination selects an ordered set of nodes (Candidate Set). CandSet(S)={, B, A} 10% 30% 90% 90% 90% S A B Opportunistic Routing in Wireless Mesh Networks 4 / 37

10 Introduction to Opportunistic Routing (OR). What is Opportunistic Routing (OR)? For each destination selects an ordered set of nodes (Candidate Set). CandSet(S)={, B, A} The candidates that receive the packet will coordinate to determine the best one to actually forward the packet. 10% 30% 90% 90% 90% S A B Opportunistic Routing in Wireless Mesh Networks 4 / 37

11 Introduction to Opportunistic Routing (OR). What is Opportunistic Routing (OR)? For each destination selects an ordered set of nodes (Candidate Set). CandSet(S)={, B, A} The candidates that receive the packet will coordinate to determine the best one to actually forward the packet. 10% 30% 90% 90% 90% S A B Opportunistic Routing in Wireless Mesh Networks 4 / 37

12 Introduction to Opportunistic Routing (OR). What is Opportunistic Routing? S 20% 20% C 1 C 2 20% C 3 100% 20% 20% C 4 100% 100% 100% 100% End-to-End elivery Probability Uni-path Routing 20% C 5 Opportunistic Routing in Wireless Mesh Networks 5 / 37

13 Introduction to Opportunistic Routing (OR). What is Opportunistic Routing? S 20% 20% C 1 C 2 20% C 3 100% 20% 20% C 4 100% 100% 100% 100% End-to-End elivery Probability Uni-path Routing 20% OR 1 (1 20%) 5 67% C 5 OR Combines weak physical links into one stronger virtual link. Opportunistic Routing in Wireless Mesh Networks 5 / 37

14 Issues in Opportunistic Routing Issues in Opportunistic Routing Candidate selection in OR. OR metric. Candidate coordination in OR. Opportunistic Routing in Wireless Mesh Networks 6 / 37

15 Research irections in Opportunistic Routing Research irections in Opportunistic Routing Protocol Year Type Topic Metric Coord. Cand. Sel. SF 2001 S Candid. Coord ETX Ack Topology GeRaF 2003 A/S Cand. Coord Geo. RTS-CTS Location ExOR ver S Cand. Sel ETX Ack Topology ExOR ver E Cand. Coord ETX Timer Topology NA 2005 A/S Sensor networks Geo. RTS-CTS Location COPE 2005 E Network coding ETX Net. coding Topology OAPF 2006 S Cand. Sel ETX/EAX Ack Topology LCOR 2007 S Cand. Sel EAX NA Topology MORE 2007 E Network coding ETX Net. coding Topology GOR 2007 S Cand. Sel Geo. Timer Location NA 2008 A Analytical Geo. NA Location NA 2008 A/S Analytical Geo. NA Location NA 2008 E Cand. Sel ETX Ack Topology CORE 2008 S Network coding Geo. Timer Location MTS 2009 S Cand. Sel EAX Timer Topology Opportunistic Routing in Wireless Mesh Networks 7 / 37

16 Research irections in Opportunistic Routing Research irections in Opportunistic Routing Protocol Year Type Topic Metric Coord. Cand. Sel. POR 2009 S Cand. Sel Geo. Timer Location SOAR 2009 S/E Cand. Sel ETX Timer Topology Pacifier 2009 S Multicast ETX Net. coding Topology NA 2010 A Maximum performance EAX NA Location MSTOR 2010 S Multicast EAX/ETX Ack Topology MORP 2011 S Multicast ETX Ack Topology NA 2011 A Analytical/Cand. Sel ETX/EAX NA Topology Opportunistic Routing in Wireless Mesh Networks 8 / 37

17 Routing metrics in OR. Usual routing metric in OR Hop Count geographic-distance (Geo-istance) Expected Transmission Count ETX [ouglas 2003]: The average number of transmissions required to reliably send a packet across a link or route including retransmissions. p ij is the delivery probability between nodes i and j then ETX= 1 p ij Using the ETX does not give an accurate metric for OR. Expected Any-path Transmission EAX: [Zhong 2006]: is an extension of ETX and can capture the expected number of transmissions taking into account the multiple paths that can be used under OR. Opportunistic Routing in Wireless Mesh Networks 9 / 37

18 Routing metrics in OR. What is EAX? source destination q 13 = q 12 = q 23 = 0.7 node candidates to 3 1 3, q ij is the delivery probabilities from node i to node j Opportunistic Routing in Wireless Mesh Networks 10 / 37

19 Routing metrics in OR. What is EAX? source destination q 13 = q 12 = q 23 = 0.7 node candidates to 3 1 3, q ij is the delivery probabilities from node i to node j What is the expected number of transmissions from node 1 to the destination using OR (E OR 1 )? Opportunistic Routing in Wireless Mesh Networks 10 / 37

20 Routing metrics in OR. What is EAX? source destination q 13 = q 12 = q 23 = 0.7 node candidates to 3 1 3, q ij is the delivery probabilities from node i to node j What is the expected number of transmissions from node 1 to the destination using OR (E1 OR)? E1 OR= i=1 p i E i p i is the probability of node i being the next forwarder. E i is the expected number of transmissions from node i to the destination. Opportunistic Routing in Wireless Mesh Networks 10 / 37

21 Routing metrics in OR. What is EAX? source destination q 13 = q 12 = q 23 = 0.7 node candidates to 3 1 3, q ij is the delivery probabilities from node i to node j What is the expected number of transmissions from node 1 to the destination using OR (E1 OR)? E1 OR= i=1 p i E i p i is the probability of node i being the next forwarder. E i is the expected number of transmissions from node i to the destination. E 1 = (1 + p 2 E 2 )/(p 2 + p 3 ) = (1 + (1 q 13 )q 12 1/q 23 )/((1 q 13 )q 12 + q 13 ) 2.15 Opportunistic Routing in Wireless Mesh Networks 10 / 37

22 Coordination methods in OR. Coordination methods in OR. Acknowledgment-based coordination Timer-based coordination Network coding coordination (NC) RTS-CTS coordination Opportunistic Routing in Wireless Mesh Networks 11 / 37

23 Coordination methods in OR. Acknowledgment-based coordination [Biswas 2004] Propose modifying for OR coordination. S (source) C data frame B A (destination) Node S A B C Candidates for A, B, C, A, A source S A B C ata frame candidate C candidate B candidate A destination Opportunistic Routing in Wireless Mesh Networks 12 / 37

24 Coordination methods in OR. Acknowledgment-based coordination [Biswas 2004] Propose modifying for OR coordination. S (source) C ack B A (destination) Node S A B C Candidates for A, B, C, A, A source S A B C ata frame candidate C candidate B candidate A ack A destination SIFS Opportunistic Routing in Wireless Mesh Networks 12 / 37

25 Coordination methods in OR. Acknowledgment-based coordination [Biswas 2004] Propose modifying for OR coordination. S (source) ack C B A (destination) Node S A B C Candidates for A, B, C, A, A source S A B C ata frame candidate C candidate B candidate A destination SIFS ack A SIFS ack B Opportunistic Routing in Wireless Mesh Networks 12 / 37

26 Coordination methods in OR. Acknowledgment-based coordination [Biswas 2004] Propose modifying for OR coordination. S (source) ack C B A (destination) Node S A B C Candidates for A, B, C, A, A source S A B C ata frame candidate C ack A candidate B ack B SIFS candidate A ack A SIFS destination SIFS Opportunistic Routing in Wireless Mesh Networks 12 / 37

27 Coordination methods in OR. Acknowledgment-based coordination [Biswas 2004] Propose modifying for OR coordination. S (source) C source S A B C ata frame candidate C candidate B candidate A destination B SIFS ack A A data frame SIFS ack B (destination) SIFS ack A IFS+backoff ata frame Node S A B C Candidates for A, B, C, A, A Opportunistic Routing in Wireless Mesh Networks 12 / 37

28 Coordination methods in OR. Timer-based coordination {B,A} is the candidate set of S to reach. S A B Opportunistic Routing in Wireless Mesh Networks 13 / 37

29 Coordination methods in OR. Timer-based coordination {B,A} is the candidate set of S to reach. Candidates A and B receive the packet. S A B Opportunistic Routing in Wireless Mesh Networks 13 / 37

30 Coordination methods in OR. Timer-based coordination {B,A} is the candidate set of S to reach. Candidates A and B receive the packet. Candidate B forwards the packet. S A B Opportunistic Routing in Wireless Mesh Networks 13 / 37

31 Coordination methods in OR. Timer-based coordination {B,A} is the candidate set of S to reach. Candidates A and B receive the packet. Candidate B forwards the packet. If A hears B s transmissions, it simply discard the packet. S A B Opportunistic Routing in Wireless Mesh Networks 13 / 37

32 Coordination methods in OR. Network coding coordination (NC) [Michele 2003] {C 1,C 2 } is the candidates set of S to reach. C 1 a b S C 2 Opportunistic Routing in Wireless Mesh Networks 14 / 37

33 Coordination methods in OR. Network coding coordination (NC) [Michele 2003] {C 1,C 2 } is the candidates set of S to reach. S generates two coded packet. C 1 a b S p 1 p 2 a+b a b C 2 Opportunistic Routing in Wireless Mesh Networks 14 / 37

34 Coordination methods in OR. Network coding coordination (NC) [Michele 2003] {C 1,C 2 } is the candidates set of S to reach. S generates two coded packet. C 2 receives both packets while C 1 receives only one. a+b C 1 a b S p 1 p 2 a+b a b C 2 a+b a-b Opportunistic Routing in Wireless Mesh Networks 14 / 37

35 Coordination methods in OR. Network coding coordination (NC) [Michele 2003] {C 1,C 2 } is the candidates set of S to reach. S generates two coded packet. C 2 receives both packets while C 1 receives only one. Both candidates generate coded packet and broadcast them. a+b C 1 p 3 2a+2b a b S p 1 p 2 a+b a b p 4 2a C 2 a+b a-b Opportunistic Routing in Wireless Mesh Networks 14 / 37

36 Coordination methods in OR. Network coding coordination (NC) [Michele 2003] {C 1,C 2 } is the candidates set of S to reach. S generates two coded packet. C 2 receives both packets while C 1 receives only one. Both candidates generate coded packet and broadcast them. can decode and restore the original packets. a+b C 1 p 3 2a+2b a b S p 1 p 2 a+b a b a b p 4 2a C 2 a+b a-b Opportunistic Routing in Wireless Mesh Networks 14 / 37

37 Coordination methods in OR. RTS-CTS coordination [Szymon 2007] An explicit control packet(s) exchanged immediately before sending a data packet. CandSet={a, b, c} s c b a a b c RTS t Opportunistic Routing in Wireless Mesh Networks 15 / 37

38 Coordination methods in OR. RTS-CTS coordination [Szymon 2007] An explicit control packet(s) exchanged immediately before sending a data packet. CandSet={a, b, c} Candidates send CTS in time in order of their priorities. s c b a a b c RTS SIFS CTS a t Opportunistic Routing in Wireless Mesh Networks 15 / 37

39 Coordination methods in OR. RTS-CTS coordination [Szymon 2007] An explicit control packet(s) exchanged immediately before sending a data packet. CandSet={a, b, c} Candidates send CTS in time in order of their priorities. s c b a a b c RTS 2*SIFS CTS b SIFS CTS a t Opportunistic Routing in Wireless Mesh Networks 15 / 37

40 Coordination methods in OR. RTS-CTS coordination [Szymon 2007] An explicit control packet(s) exchanged immediately before sending a data packet. CandSet={a, b, c} Candidates send CTS in time in order of their priorities. Sender sends data to the candidate that sent CTS and is received. s a b c RTS SIFS ata t c b a 2*SIFS CTS b SIFS CTS a Opportunistic Routing in Wireless Mesh Networks 15 / 37

41 Coordination methods in OR. RTS-CTS coordination [Szymon 2007] An explicit control packet(s) exchanged immediately before sending a data packet. CandSet={a, b, c} Candidates send CTS in time in order of their priorities. Sender sends data to the candidate that sent CTS and is received. s c b a a b c RTS 2*SIFS CTS b SIFS CTS a SIFS ata NAV ata SIFS ACK NAV ata t Opportunistic Routing in Wireless Mesh Networks 15 / 37

42 Candidate selection algorithms. General Aim of OR To Minimize the expected number of transmissions from the source to the destination. Candidate Selection Algorithms How to select the forwarders from the neighbors? How to prioritize the selected candidates. Opportunistic Routing in Wireless Mesh Networks 16 / 37

43 Candidate selection algorithms. Extremely Opportunistic Routing (ExOR) [Biswas 2004] One of the first and most referenced OR protocols. It uses ETX metric. Shortest Path First (SPF) algorithm is used. Simple to implement. How does ExOR work? S is the source and is the destination B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 17 / 37

44 Candidate selection algorithms. Extremely Opportunistic Routing (ExOR) [Biswas 2004] One of the first and most referenced OR protocols. It uses ETX metric. Shortest Path First (SPF) algorithm is used. Simple to implement. How does ExOR work? SPF from S to is S-A- and A is selected as the candidate B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 17 / 37

45 Candidate selection algorithms. Extremely Opportunistic Routing (ExOR) [Biswas 2004] One of the first and most referenced OR protocols. It uses ETX metric. Shortest Path First (SPF) algorithm is used. Simple to implement. How does ExOR work? The edge between S and A is removed B S A Opportunistic Routing in Wireless Mesh Networks 17 / 37

46 Candidate selection algorithms. Extremely Opportunistic Routing (ExOR) [Biswas 2004] One of the first and most referenced OR protocols. It uses ETX metric. Shortest Path First (SPF) algorithm is used. Simple to implement. How does ExOR work? The new SPF is S-B- and B is selected as the candidate B S A Opportunistic Routing in Wireless Mesh Networks 17 / 37

47 Candidate selection algorithms. Extremely Opportunistic Routing (ExOR) [Biswas 2004] One of the first and most referenced OR protocols. It uses ETX metric. Shortest Path First (SPF) algorithm is used. Simple to implement. How does ExOR work? Prioritization:ETX of each candidate to the destination B S A Opportunistic Routing in Wireless Mesh Networks 17 / 37

48 Candidate selection algorithms. Extremely Opportunistic Routing (ExOR) [Biswas 2004] One of the first and most referenced OR protocols. It uses ETX metric. Shortest Path First (SPF) algorithm is used. Simple to implement. How does ExOR work? CandSet(S)= {A, B} 0.85 B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 17 / 37

49 Candidate selection algorithms. Opportunistic Any-Path Forwarding OAPF [Zhong 2006] It uses EAX. It does not select the optimum candidate set. It finds a candidate which improves the EAX of the node. Opportunistic Routing in Wireless Mesh Networks 18 / 37

50 Opportunistic Any-Path Forwarding OAPF How does OAPF work? InitCandSet(S)={A, B, } A and B must select their candidates sets before S 0.85 B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 19 / 37

51 Opportunistic Any-Path Forwarding OAPF How does OAPF work? InitCandSet(S)={A, B, } A and B must select their candidates sets before S CandSet(S)={B} Iteration Selection 1 EAX({A}, S, )=3.99, EAX({B}, S, )=3.97, EAX({}, S, )= B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 19 / 37

52 Opportunistic Any-Path Forwarding OAPF How does OAPF work? InitCandSet(S)={A, B, } A and B must select their candidates sets before S CandSet(S)={B} CandSet(S)={,A} Iteration Selection 1 EAX({A}, S, )=3.99, EAX({B}, S, )=3.97, EAX({}, S, )= EAX({A, B}, S, )= 3.64, EAX({,B}, S, )= B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 19 / 37

53 Candidate selection algorithms. Least-Cost Opportunistic Routing LCOR [ubois 2007] EAX is used. LCOR is a generalization of the well-known Bellman-Ford algorithm. It selects the optimum candidates. Exhaustive search. CandSet(S)= {, A} B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 20 / 37

54 Candidate selection algorithms. Minimum Transmission Selection MTS [Yanhua 2009] It uses EAX. Like LCOR, it selects the optimum candidates. Adding the candidates of the node with smallest EAX to the neighbors of that node. It is simpler than LCOR. Opportunistic Routing in Wireless Mesh Networks 21 / 37

55 Minimum Transmission Selection (MTS) How does MTS work? S = {S,A,B} Iteration S A B 0 {}, 6.66 {}, 2.5 {}, B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 22 / 37

56 Minimum Transmission Selection (MTS) How does MTS work? S = {S,A,B} A has the minimum EAX Iteration S A B 0 {}, 6.66 {}, 2.5 {}, B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 22 / 37

57 Minimum Transmission Selection (MTS) How does MTS work? S = {S,A,B} A has the minimum EAX Iteration S A B 0 {}, 6.66 {}, 2.5 {}, {,A}, {,A}, B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 22 / 37

58 Minimum Transmission Selection (MTS) How does MTS work? S = {S,A,B} B has the minimum EAX Iteration S A B 0 {}, 6.66 {}, 2.5 {}, {,A}, {,A}, B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 22 / 37

59 Minimum Transmission Selection (MTS) How does MTS work? S = {S,A,B} B has the minimum EAX Iteration S A B 0 {}, 6.66 {}, 2.5 {}, {,A}, {,A}, {,A,B}, B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 22 / 37

60 Minimum Transmission Selection (MTS) How does MTS work? S = {S,A,B} o the exhaustive search over founded candidates sets. Iteration S A B 0 {}, 6.66 {}, 2.5 {}, {,A}, {,A}, {,A,B}, B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 22 / 37

61 Minimum Transmission Selection (MTS) How does MTS work? S = {S,A,B} CandSet(S)= {, A}. Iteration S A B 0 {}, 6.66 {}, 2.5 {}, {,A}, {,A}, {,A,B}, B S 0.67 A Opportunistic Routing in Wireless Mesh Networks 22 / 37

62 Performance evaluation. Assumptions There is only one active connection. Perfect coordination. Independent delivery probabilities. Linear topology with evenly spaced nodes: d [m] vs N v d [m] Opportunistic Routing in Wireless Mesh Networks 23 / 37

63 Performance evaluation. Basic Model Assume that OR is used with a list of 2 candidates. We can model OR with an absorbing discrete time Markov chain, where the state is the node forwarding the packet: p 3 p p 3 p 1 p 3 1 p 1 1 vs p 2 p 2 p N-1 N v d p 2 p 2 p p p 1 3 p p1 3 p 1 3 Let p(d) be the probability of successfully delivering a packet to a node located at a distance d. Then: p 1 = p(2d) p 1 = p(d) p 2 = p(d)(1 p 1 ) p 3 = 1 p 1 p 3 = 1 (p 1 + p 2 ) Opportunistic Routing in Wireless Mesh Networks 24 / 37

64 Performance evaluation. Solution of the model The model yields a discrete phase-type distribution, for which there exists a simple equation for the distribution and moments of the first time until absorption. In our model this is the number of transmissions since the source first transmits the packet, until it is received by the destination. Extension of the model A similar chain can be easily derived for any number of candidates and arbitrary topology: With 1 candidate is equivalent to uni-path routing. We shall refer to it as c 1. We shall refer as infinite candidates, c, to the case when all possible nodes are candidates. Opportunistic Routing in Wireless Mesh Networks 25 / 37

65 Performance evaluation. Summing up: The only ingredients needed to build the transition probability matrix are: The delivery probabilities. The ordered list of candidates of each node. Propagation model We assess the delivery probability at a distance d, p(d), with a shadowing propagation model, with path loss exponent β and standard deviation σ db. We assume that a link exists only if p(d) min.dp. Opportunistic Routing in Wireless Mesh Networks 26 / 37

66 Numerical results. Evaluation Methodology Area: A square field with diagonal = 300 m Random topology. Source and destination are placed at the end points of one of the diagonals. Number of nodes is equal to 10 N 50. The delivery probabilities o the links are obtained with shadowing propagation model. min.dp = 0.1 Opportunistic Routing in Wireless Mesh Networks 27 / 37

67 Numerical results. Measures of interest Expected number of transmissions Variance of the expected number transmissions. Probability of the number of transmissions. Execution Time. Opportunistic Routing in Wireless Mesh Networks 28 / 37

68 Numerical results. Expected number of transmissions and Mean number of candidates Expected number of transmissions LCOR and MTS have exactly the same results. OAPF is only slightly larger than optimum algorithms. EAX Opt( ) < EAX Opt(3) EAX Unipath but a large number of candidates are used. =300m, β=2.7, σdb=6, min.dp=0.1 Uni-path ExOR(3) OAPF(3) LCOR(3) MTS(3) Opt( ) Mean number of candidates ExOR( ) OAPF( ) Opt( ) =300m, β=2.7, σdb=6, min.dp= Number of nodes Number of nodes Opportunistic Routing in Wireless Mesh Networks 29 / 37

69 Numerical results. Expected number of transmissions Vs Number of candidates For ncand= all algorithms have almost the same results. Limiting the maximum number of candidates makes the selection of the candidates sets more critical. =300m, beta=2.7, sigmadb=6, min.sp=0.1 =300m, beta=2.7, sigmadb=6, min.sp=0.1 Expected number of transmissions ExOR OAPF LCOR MTS Expected number of transmissions ExOR OAPF LCOR MTS ncand ncand Number of Nodes = 10 Number of Nodes = 50 Opportunistic Routing in Wireless Mesh Networks 30 / 37

70 Numerical results. Variance of expected number of transmissions The variance of the expected number of transmissions using OR is significantly reduced compared with uni-path routing. 2 or 3 is enough to attain a significant part of the potential reduction. =300m, beta=2.7, sigmadb=6, min.sp=0.1 =300m, beta=2.7, sigmadb=6, min.sp=0.1 Variance of the expected number of transmissions ExOR OAPF LCOR MTS Variance of the expected number of transmissions ExOR OAPF LCOR MTS ncand ncand Number of Nodes = 10 Number of Nodes = 50 Opportunistic Routing in Wireless Mesh Networks 31 / 37

71 Numerical results. Probability distribution of the number of transmissions The number of transmissions needed to reach the destination is significantly reduced by using OR with respect to the uni-path routing. = 300 m, β= 2.7, σdb= 6, min.dp= 0.1 = 300 m, β= 2.7, σdb= 6, min.dp= Probability Uni-path ExOR(3) OAPF(3) LCOR(3) MTS(3) Opt( ) Probability Uni-path ExOR(3) OAPF(3) LCOR(3) MTS(3) Opt( ) Number of transmissions Number of transmissions Number of Nodes = 10 Number of Nodes = 50 Opportunistic Routing in Wireless Mesh Networks 32 / 37

72 Numerical results. Execution Time The fastest algorithm is ExOR whereas LCOR is the slowest. OAPF is between the optimal algorithms and ExOR. MTS outperforms LCOR in terms of the execution time Execution time in log scale (second) =300m, β=2.7, σdb=6, min.dp= N=10 N=10 N=10 ExOR(3) OAPF(3) MTS(3) LCOR(3) Expected number of transmissions N=10 Opportunistic Routing in Wireless Mesh Networks 33 / 37

73 Conclusions and Future Research irections Conclusions We describe the meaning of Opportunistic Routing (OR). Research directions in OR. ifferent metrics in OR. Coordination in OR. Candidate selection algorithms in OR. A discrete time Markov chain to analyze the performance of OR. We have compared different candidate selection algorithms. Opportunistic Routing in Wireless Mesh Networks 34 / 37

74 Conclusions and Future Research irections Future Research irections An efficient candidate selection algorithm. A link layer implementation of the candidate coordination. Ad hoc, sensor, Vehicular ad hoc networks using Opportunistic Routing. Using Opportunistic Routing for broadcasting messages. Using Opportunistic Routing in Multi-channel multi-radio networks. Opportunistic Routing in Wireless Mesh Networks 35 / 37

75 Refrences. [ouglas 2003]. S. J. e Couto,. Aguayo, J. Bicket, and R. Morris. A high-throughput path metric for multi-hop wireless routing. In MobiCom 03: Proceedings of the 9th annual international conference on Mobile computing and networking, pages , New York, NY, USA, ACM. [Zhong 2006] Z. Zhong, J. Wang, S. Nelakuditi, and G.-H. Lu. On selection of candidates for opportunistic any-path forwarding. SIGMOBILE Mob. Comput. Commun. Rev., 10(4):1 2, [Biswas 2004] S. Biswas and R. Morris. Opportunistic routing in multi-hop wireless networks. SIGCOMM Comput. Commun. Rev., 34(1):69 74, [Szymon 2007] Szymon Chachulski, Michael Jennings, Sachin Katti, and ina Katabi. Trading structure for randomness in wireless opportunistic routing. In SIGCOMM 07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. Opportunistic Routing in Wireless Mesh Networks 36 / 37

76 Refrences. [Michele 2003] M. Zorzi and R.R. Rao. Geographic random forwarding (geraf) for ad hoc and sensor networks: multihop performance. Mobile Computing, IEEE Transactions on, 2(4): , Oct.-ec [ubois 2007] H. ubois-ferriere, M. Grossglauser, and M. Vetterli. Least-cost opportunistic routing. In Proceedings of 2007 Allerton Conference on Communication, Control, and Computing, [Yanhua 2009] Yanhua Li, Wei Chen, and Zhi-Li Zhang. Optimal forwarder list selection in opportunistic routing. In Mobile Adhoc and Sensor Systems, MASS 09. IEEE 6th International Conference on, pages , oct Opportunistic Routing in Wireless Mesh Networks 37 / 37

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th

More information

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization EE359 Course Project Mayank Jain Department of Electrical Engineering Stanford University Introduction

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO.,

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., 2010 1 Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks Kai Zeng, Member; IEEE, Zhenyu Yang, Student Member; IEEE,

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Method for discovering intra-session network coding opportunity in wireless ad hoc networks

Method for discovering intra-session network coding opportunity in wireless ad hoc networks 32 10 Vol.32 No.10 2011 10 Journal on Communications October 2011 1, 2 2 1 2 1. 210093 2. 210007 AODV AODV TN393 B 1000-436X(2011)10-0092-07 Method for discovering intra-session network coding opportunity

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

MAXIMUM TRANSMISSION DISTANCE OF GEOGRAPHIC TRANSMISSIONS ON RAYLEIGH CHANNELS

MAXIMUM TRANSMISSION DISTANCE OF GEOGRAPHIC TRANSMISSIONS ON RAYLEIGH CHANNELS MAXIMUM TRANSMISSION DISTANCE OF GEOGRAPHIC TRANSMISSIONS ON RAYLEIGH CHANNELS Tathagata D. Goswami and John M. Shea Wireless Information Networking Group, 458 ENG Building #33 P.O. Box 63 University of

More information

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

A MAC Interaction Aware Routing Metric in Wireless Networks

A MAC Interaction Aware Routing Metric in Wireless Networks A MAC Interaction Aware Routing Metric in Wireless Networks Saquib Razak 1 Vinay Kolar 1 Nael Abu-Ghazaleh 1,2 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Computer

More information

Delay and Throughput in Random Access Wireless Mesh Networks

Delay and Throughput in Random Access Wireless Mesh Networks Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY 280 bisnin@rpi.edu, abouzeid@ecse.rpi.edu Abstract Wireless mesh

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

Survey of MANET based on Routing Protocols

Survey of MANET based on Routing Protocols Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS WAFIC W. ALAMEDDINE A THESIS IN THE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING PRESENTED IN

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

Distance-Vector Routing

Distance-Vector Routing Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation

More information

Comparing the ns 3 Propagation Models

Comparing the ns 3 Propagation Models Comparing the ns 3 Propagation Models Mirko Stoffers School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, Georgia, USA Email: stoffers@gatech.edu George Riley School of

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724 ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Transmission Scheduling in Capture-Based Wireless Networks

Transmission Scheduling in Capture-Based Wireless Networks ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Masters Project Final Report Author: Madhukesh Wali Email: mwali@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu

More information

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj

More information

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks A. P. Azad and A. Chockalingam Department of ECE, Indian Institute of Science, Bangalore 5612, India Abstract Increasing

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Wavelength Assignment Problem in Optical WDM Networks

Wavelength Assignment Problem in Optical WDM Networks Wavelength Assignment Problem in Optical WDM Networks A. Sangeetha,K.Anusudha 2,Shobhit Mathur 3 and Manoj Kumar Chaluvadi 4 asangeetha@vit.ac.in 2 Kanusudha@vit.ac.in 2 3 shobhitmathur24@gmail.com 3 4

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

Prioritized Wireless Transmissions Using Random Linear Codes

Prioritized Wireless Transmissions Using Random Linear Codes Prioritized Wireless Transmissions Using Random Linear Codes Tuan Tran and Thinh Nguyen School of EECS, Oregon State University Corvallis, OR 97331, USA trantu, thinhq}@eecs.oregonstate.edu Abstract We

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates Cooperative Broadcast for Maximum Network Lifetime Ivana Maric and Roy Yates Wireless Multihop Network Broadcast N nodes Source transmits at rate R Messages are to be delivered to all the nodes Nodes can

More information

Design of Parallel Algorithms. Communication Algorithms

Design of Parallel Algorithms. Communication Algorithms + Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter

More information

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networs Siyuan Chen Minsu Huang Yang Li Ying Zhu Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1

More information

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS A Dissertation by Dan Wang Master of Science, Harbin Institute of Technology, 2011 Bachelor of Engineering, China

More information

Experimental Evaluation of Measurement-based SINR Interference Models

Experimental Evaluation of Measurement-based SINR Interference Models Experimental Evaluation of Measurement-based SINR Interference Models Wee Lum Tan, Peizhao Hu and Marius Portmann Queensland Research Lab, National ICT Australia (NICTA) School of ITEE, The University

More information

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,

More information

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Proceedings of the World Congress on Engineering 2 Vol II WCE 2, July 6-8, 2, London, U.K. Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Yun Won Chung Abstract Energy

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

The impact of different radio propagation models for Mobile Ad-hoc NETworks (MANET) in urban area environment

The impact of different radio propagation models for Mobile Ad-hoc NETworks (MANET) in urban area environment ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 5 (2009) No. 1, pp. 45-52 The impact of different radio propagation models for Mobile Ad-hoc NETworks (MANET) in urban area environment

More information

CoRoute: A New Cognitive Anypath Vehicular Routing Protocol

CoRoute: A New Cognitive Anypath Vehicular Routing Protocol : A New Cognitive Anypath Vehicular Routing Protocol Wooseong Kim, Soon Y. Oh, Mario Gerla, Kevin C. Lee Department of Computer Science, University of California, Los Angeles, USA Email: {wooseong, soonoh,

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov.

SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov. SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks COMP635 -- Paper Presentation Junhua Yan Nov. 28, 2017 1 Reliable Transmission in Wireless Network Transmit at the lowest

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Cost-Aware Route Selection in Wireless Mesh Networks

Cost-Aware Route Selection in Wireless Mesh Networks Cost-Aware Route Selection in Wireless Mesh Networks Junmo Yang 1, Kazuya Sakai 2, Bonam Kim 1, Hiromi Okada 2, and Min-Te Sun 1 1 Department of Computer Science and Software Engineering, Auburn University,

More information

On Spatial Reuse and Capture in Ad Hoc Networks

On Spatial Reuse and Capture in Ad Hoc Networks On patial Reuse and Capture in Ad Hoc Networks Naveen anthapuri University of outh Carolina Email: santhapu@cse.sc.edu rihari Nelakuditi University of outh Carolina Email: srihari@cse.sc.edu Romit Roy

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Localization in Wireless Sensor Networks

Localization in Wireless Sensor Networks Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem

More information

Cooperative Diversity Routing in Wireless Networks

Cooperative Diversity Routing in Wireless Networks Cooperative Diversity Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

ADAPTIVE ESTIMATION AND PI LEARNING SPRING- RELAXATION TECHNIQUE FOR LOCATION ESTIMATION IN WIRELESS SENSOR NETWORKS

ADAPTIVE ESTIMATION AND PI LEARNING SPRING- RELAXATION TECHNIQUE FOR LOCATION ESTIMATION IN WIRELESS SENSOR NETWORKS INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS VOL. 6, NO. 1, FEBRUARY 013 ADAPTIVE ESTIMATION AND PI LEARNING SPRING- RELAXATION TECHNIQUE FOR LOCATION ESTIMATION IN WIRELESS SENSOR NETWORKS

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Adapting to the Wireless Channel: SampleRate

Adapting to the Wireless Channel: SampleRate Adapting to the Wireless Channel: SampleRate Brad Karp (with slides contributed by Kyle Jamieson) UCL Computer Science CS M38 / GZ6 27 th January 216 Today 1. Background: digital communications Modulation

More information

Panda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman

Panda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman Panda: Neighbor Discovery on a Power Harvesting Budget Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman The Internet of Tags Small energetically self-reliant tags Enabling technologies

More information

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J

More information

Cross-layer Approach to Low Energy Wireless Ad Hoc Networks

Cross-layer Approach to Low Energy Wireless Ad Hoc Networks Cross-layer Approach to Low Energy Wireless Ad Hoc Networks By Geethapriya Thamilarasu Dept. of Computer Science & Engineering, University at Buffalo, Buffalo NY Dr. Sumita Mishra CompSys Technologies,

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

Multipath Fading Effect on Spatial Packet Loss Correlation in Wireless Networks

Multipath Fading Effect on Spatial Packet Loss Correlation in Wireless Networks Multipath Fading Effect on Spatial Packet Loss Correlation in Wireless Networks Hamid R. Tafvizi, Zhe Wang, Mahbub Hassan and Salil S. Kanhere School of Computer Science and Engineering The University

More information

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Muhammad Irfan Rafique, Marco Porsch, Thomas Bauschert Chair for Communication Networks, TU Chemnitz irfan.rafique@etit.tu-chemnitz.de

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol

WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol S. Mahlknecht, M. Spinola Durante Institute of Computer Technology Vienna University of Technology Vienna, Austria {mahlknecht,spinola}@ict.tuwien.ac.at

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks

Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks J Comb Optim 2015) 29:815 835 DOI 10.1007/s10878-013-9623-y Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks Zhipeng Cai Yueming Duan Anu G. Bourgeois Published

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

Project. Title. Submitted Sources: {se.park,

Project. Title. Submitted Sources:   {se.park, Project Title Date Submitted Sources: Re: Abstract Purpose Notice Release Patent Policy IEEE 802.20 Working Group on Mobile Broadband Wireless Access LDPC Code

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

Localization for Large-Scale Underwater Sensor Networks

Localization for Large-Scale Underwater Sensor Networks Localization for Large-Scale Underwater Sensor Networks Zhong Zhou 1, Jun-Hong Cui 1, and Shengli Zhou 2 1 Computer Science& Engineering Dept, University of Connecticut, Storrs, CT, USA,06269 2 Electrical

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Closing the loop around Sensor Networks

Closing the loop around Sensor Networks Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley Chess Review May 11, 2005 Berkeley, CA Conceptual Issues Given a certain wireless sensor

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)

More information

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin

More information

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic

More information

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Shanshan Wu, Wenguang Mao, and Xudong Wang UM-SJTU Joint Institute, Shanghai Jiao Tong University, Shanghai, China Email:

More information

An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction

An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction , pp.319-328 http://dx.doi.org/10.14257/ijmue.2016.11.6.28 An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction Xiaoying Yang* and Wanli Zhang College of Information Engineering,

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

Wireless Networks Do Not Disturb My Circles

Wireless Networks Do Not Disturb My Circles Wireless Networks Do Not Disturb My Circles Roger Wattenhofer ETH Zurich Distributed Computing www.disco.ethz.ch Wireless Networks Geometry Zwei Seelen wohnen, ach! in meiner Brust OSDI Multimedia SenSys

More information

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of MANET Using Quality of Service Metrics Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,

More information

MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012

MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012 Location Management for Mobile Cellular Systems MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Cellular System

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information