Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Size: px
Start display at page:

Download "Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR"

Transcription

1 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden Leif Axelsson - Ericsson Microwave Systems, Sweden Andrew McCabe BAE SYSTEMS ATC, UK Alan Cullen - BAE SYSTEMS ATC, UK The authors gratefully acknowledge the support of their colleagues in BAE SYSTEMS plc, Ericsson Microwave Systems AB and Ericsson Telebit A/S, and the support from the UK, Swedish and Danish MoDs under the EUCLID/Eurofinder programme, Project RTP6.22 (B2NCW). BAE Systems and Ericsson All rights reserved 1

2 Contents Goals OLSR/DSR Recap (key points) Modelling Overview Node Model Simulation Scenarios Radio model Jamming model Simulation results Visualisation of jamming Additional investigations / protocol optimisations Conclusions BAE Systems and Ericsson All rights reserved 2

3 Goals To carry out vulnerability modelling of two contrasting ad hoc routing protocols, one reactive (DSR), and one proactive (OLSR) In particular, to investigate the effect a jammer has on a network of static sensors in the following scenarios: Different network sizes: 30 nodes and 70 nodes Different jamming powers and duty cycles Different jammer positions (Central and corner locations) Medium radio transmit power (~10% packet lost at 250 units) BAE Systems and Ericsson All rights reserved 3

4 OLSR Refresher (key points) OLSR is a proactive protocol: Routing messages are sent at regular intervals, regardless of user traffic: All nodes broadcast HELLO messages. Only a subset of the nodes (the MPR nodes) flood TC messages. Only the MPR nodes may relay user traffic. Different message periods may be used => trade-off between responsiveness and overheads. Option to use link quality information (link layer notifications) from the lower layer, to prevent the use of poor quality links. Routing messages may be brought forward (sent immediately) when topology change is detected (e.g. due to mobility, or during startup) BAE Systems and Ericsson All rights reserved 4

5 DSR Refresher (key points) Reactive (on-demand) routing protocol Routing information only exchanged when data is sent Main mechanisms: route discovery and route maintenance Known routes are cached locally in each node (route cache). If a valid route does not exist in the local cache, a route discovery packet is flooded across the network. Wait for route reply. User packets include source route and maintenance overheads All user packets carry a full source route as overhead. Optionally route maintenance can be applied to each packet. Route maintenance detects broken links If a packet cannot be forwarded (broken route) a route error packet is sent back to the packet source node. Node that detects the broken link tries to salvage the packet. BAE Systems and Ericsson All rights reserved 5

6 OLSR & DSR: OPNET Implementation Results produced using OPNET Modeller environment OLSR Proprietary implementation (platform independent C++ code) Interfaced to OPNET 10.5A (PL3) via a custom wrapper process Fully compatible with RFC 3626 Includes an implementation option to enforce a minimal intervals between successive messages. DSR Using the standard DSR model supplied with OPNET 10.5A (PL1) (this model not 100% compliant with DSR draft 9) BAE Systems and Ericsson All rights reserved 6

7 Modelling Overview Node model Ad-hoc Nodes contain: Ad Hoc Routing protocol (OLSR or DSR) Application process (source/sink of user traffic) IP stack Radio communications Jammer Node contains: Packet generator Radio transmitter Pulse length Duty cycle Jammer Power Jammer Node Packet generator Tx APP OLSR UDP DSR IP ARP MAC Rx Tx Statistics collected on: The percentage of user packets sent by each node that are successfully delivered to their intended destination Average hop counts for delivered user packets Routing overhead transmitted onto the network BAE Systems and Ericsson All rights reserved 7

8 Modelled Scenarios: Ad hoc nodes, randomly positioned within 500 x 500 world multiple simulation runs: different node positions and user traffic Number of nodes: 30, 70 No mobility (nodes assumed stationary) Medium radio power used for ad-hoc transmissions Jammer node placed at: centre of world one corner of world 3 different jammer power used 10%, 100%, 1000% (relative to ad hoc node transmit power) Various jammer pulse lengths and duty cycles User Traffic: Each node sends one 1024-bit user packet per sec to a random destination Used only to monitor traffic route-ability/connection Not concerned with collision/congestion etc (implementationspecific) 30 nodes, central jammer (LLN links) 70 nodes, corner jammer (LLN links) BAE Systems and Ericsson All rights reserved 8

9 Propagation Model T 2 T 3 2 λ PathLoss = π D BandwidthOverlap RxPower = TxPower TxAGain PathLoss RxAGain TxBandwidth RxSignalPower SNR = 10Log10 InterferenceNoise + BackgroundNoise BER = Function of {modulation type, SNR} T 1 Wanted signal dist-n R Jamming Interference dist-j J Packet Loss Rate = Function of {BER, no of bits} Background Noise Expected Packet Loss Rate Medium Power - No Jamming 1384 bits 584 bits Old Model 1 Model takes account of how much of the packet is jammed: SNR-based propagation model Packet reception probability depends on: Distance of transmitter from receiver Distance of jammer from receiver => same for T1, T2 and T3 Loss rate SNR 0.1(no Jamming) -> BER -> Pr{packet error} SNR (jamming) -> BER -> Pr{packet error} SNR SNR1 -> BER1 SNR2 -> BER2 SNR2 SNR Propagation Distance BAE Systems and Ericsson All rights reserved 9

10 Simulation Results: User Traffic: Percentage successfully delivered User Traffic: Average hop count Routing overhead: Messages transmitted per node OLSR, DSR, Comparisons Jammer Effectiveness / Figure of Merit Visualisation of jamming Additional investigations / optimisations: Summary / Conclusions BAE Systems and Ericsson All rights reserved 10

11 User Packets delivered: 30 Nodes, Centre Jammer User data delivered successfully (30 nodes, jammer in centre) 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% DSR 10% DSR 10% 100% DSR 10% 100% DSR 10% 100% 1000% OLSR DSR 10% 1000% OLSR DSR 100% 10% DSR OLSR baseline 100% 10% OLSR OLSR 1000% 100% 10% OLSR baseline OLSR OLSR 1000% 100% OLSR baseline OLSR 1000% 100% OLSR baseline OLSR 1000% baseline OLSR OLSR 1000% baseline OLSR OLSR baseline OLSR baseline 10% 0% 50us / 500us 50us / 5ms 50us / 50ms 5ms / 50ms 5ms / 500ms 5ms / 5s 0.5s / 5s 0.5s / 50s 0.5s / 500s Continuous Proportion delivered Burst type [10% 1% 0.1%] [10% 1% 0.1%] [10% 1% 0.1%] [100%] BAE Systems and Ericsson All rights reserved 11

12 User Packet Hop Counts (30 Nodes, Centre Jammer) Hop counts (30 nodes, jammer in centre) % DSR % DSR DSR baseline 10% 1000% OLSR DSR 10% OLSR 100% DSR baseline OLSR OLSR 100% OLSR baseline 1000% 10% OLSR OLSR 1000% OLSR OLSR 100% OLSR baseline OLSR baseline 1000% OLSR OLSR baseline us / 500us 50us / 5ms 50us / 50ms 5ms / 50ms 5ms / 500ms 5ms / 5s 0.5s / 5s 0.5s / 50s 0.5s / 500s Continuous Hop count Burst type [10% 1% 0.1%] [10% 1% 0.1%] [10% 1% 0.1%] [100%] BAE Systems and Ericsson All rights reserved 12

13 Routing Messages Transmitted (30Nodes, Centre Jammer) Routing Messages Transmitted (30 Nodes, jammer in centre) % DSR 100% DSR % 1000% OLSR DSR 100% DSR baseline OLSR 1000% 10% OLSR OLSR OLSR 100% OLSR baseline 1000% OLSR OLSR baseline 50us 50us / 500us 500us 50us 50us / 5ms 5ms 50us / 50ms 5ms / 50ms 5ms / 500ms 5ms / 5s 0.5s / 5s 0.5s / 50s 0.5s / 500s Continuous Messages transmitted per node per sec 0 Burst type [10% 1% 0.1%] [10% 1% 0.1%] [10% 1% 0.1%] [100%] BAE Systems and Ericsson All rights reserved 13

14 Jammer Effectiveness (30 Nodes, Centre Jammer) Jammer Effectiveness 30 Nodes : Central Jammer OLSR DSR 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% NoJamming 50us / 50ms : 10% JPwr, 0.01% avg pwr 5ms / 5s : 10% JPwr, 0.01% avg pwr 50us / 5ms : 10% JPwr, 0.1% avg pwr 5ms / 500ms : 10% JPwr, 0.1% avg pwr 0.5s / 50s : 10% JPwr, 0.1% avg pwr 50us / 50ms : 100% JPwr, 0.1% avg pwr 5ms / 5s : 100% JPwr, 0.1% avg pwr 50us / 500us : 10% JPwr, 1% avg pwr 5ms / 50ms : 10% JPwr, 1% avg pwr 0.5s / 5s : 10% JPwr, 1% avg pwr 50us / 5ms : 100% JPwr, 1% avg pwr 5ms / 500ms : 100% JPwr, 1% avg pwr 0.5s / 50s : 100% JPwr, 1% avg pwr 50us / 50ms : 1000% JPwr, 1% avg pwr 5ms / 5s : 1000% JPwr, 1% avg pwr Continuous : 10% JPwr, 10% avg pwr 50us / 500us : 100% JPwr, 10% avg pwr 5ms / 50ms : 100% JPwr, 10% avg pwr 0.5s / 5s : 100% JPwr, 10% avg pwr 50us / 5ms : 1000% JPwr, 10% avg pwr 5ms / 500ms : 1000% JPwr, 10% avg pwr 0.5s / 50s : 1000% JPwr, 10% avg pwr Continuous : 100% JPwr, 100% avg pwr 50us / 500us : 1000% JPwr, 100% avg pwr 5ms / 50ms : 1000% JPwr, 100% avg pwr 0.5s / 5s : 1000% JPwr, 100% avg pwr Continuous : 1000% JPwr, 1000% avg pwr user packets delivered BAE Systems and Ericsson All rights reserved 14

15 Jammer Figure of Merit (30 Nodes, Centre Jammer) Jammer Figure of Merit 30 Nodes : Central Jammer 50us / 50ms : 10% JPwr, 0.01% avg pwr 5ms / 5s : 10% JPwr, 0.01% avg pwr 50us / 5ms : 10% JPwr, 0.1% avg pwr 5ms / 500ms : 10% JPwr, 0.1% avg pwr 0.5s / 50s : 10% JPwr, 0.1% avg pwr 50us / 50ms : 100% JPwr, 0.1% avg pwr 5ms / 5s : 100% JPwr, 0.1% avg pwr 50us / 500us : 10% JPwr, 1% avg pwr 5ms / 50ms : 10% JPwr, 1% avg pwr 0.5s / 5s : 10% JPwr, 1% avg pwr 50us / 5ms : 100% JPwr, 1% avg pwr 5ms / 500ms : 100% JPwr, 1% avg pwr 0.5s / 50s : 100% JPwr, 1% avg pwr 50us / 50ms : 1000% JPwr, 1% avg pwr 5ms / 5s : 1000% JPwr, 1% avg pwr Continuous : 10% JPwr, 10% avg pwr 50us / 500us : 100% JPwr, 10% avg pwr 5ms / 50ms : 100% JPwr, 10% avg pwr 0.5s / 5s : 100% JPwr, 10% avg pwr 50us / 5ms : 1000% JPwr, 10% avg pwr 5ms / 500ms : 1000% JPwr, 10% avg pwr 0.5s / 50s : 1000% JPwr, 10% avg pwr Continuous : 100% JPwr, 100% avg pwr 50us / 500us : 1000% JPwr, 100% avg pwr 5ms / 50ms : 1000% JPwr, 100% avg pwr 0.5s / 5s : 1000% JPwr, 100% avg pwr Continuous : 1000% JPwr, 1000% avg pwr (% user packets lost) / (avge jammer power) This Figure of Merit emphasises packets lost per unit of jamming power OLSR DSR BAE Systems and Ericsson All rights reserved 15

16 Simulation Results: Traffic delivered Hop count Routing messages transmitted Comparisons / Figure of Merit Visualisation of jamming Additional investigations / optimisations: Summary / Conclusions BAE Systems and Ericsson All rights reserved 16

17 Probability of packet loss under Jamming 0.0%-20.0% 20.0%-40.0% 40.0%-60.0% 60.0%-80.0% 80.0%-100.0% Probability of packet loss: Packet Size: 1384 bits; Jammer Power 1000% 500 Probability of packet loss: Packet Size: 1384 bits; Jammer Power 100% 500 Probability of packet loss: Packet Size: 1384 bits; Jammer Power 10% Node Separation Node Separation Background noise asymptote Node Separation Jammer Distance Jammer Distance Jammer Distance Depends on: Jammer Tx Power (relative to ad-hoc node transmit power) : Relative distance of jammer and source node from the receiving node (key factor) : Packet size (weak dependence). Note the narrow transition region - due to the rapid BER vs SNR falloff BAE Systems and Ericsson All rights reserved 17

18 Visualisation of Jamming in a 30 node Network Centre Jammer 10% jammer power 100% jammer power 1000% jammer power Green links: (good) have better than 50% success in both directions. Red Links: (asymmetric)have better than 50% success in only one direction, worse than 50% success in other direction. Yellow Links: (bad) worse than 50% delivered in both directions * Only showing LLN links here * (not so easy to draw for non-lln case) BAE Systems and Ericsson All rights reserved 18

19 Simulation Results: Traffic delivered Hop count Routing messages transmitted Comparisons / Figure of Merit Visualisation of jamming Additional investigations / optimisations: Summary / Conclusions BAE Systems and Ericsson All rights reserved 19

20 Additional investigations / optimisations 70 node networks Jammer in corner/centre OLSR minimal intervals Pulsed jamming can lead to significant increases in the OLSR routing overhead transmitted onto the network. This can be countered by enforcing a minimum interval between successive OLSR transmissions. Minimum intervals up to the default message intervals have little adverse effect on user traffic delivery. OLSR Link Layer Notification Hop counts higher when LLNs used User packet delivery better when LLNs are used Routing overhead higher when LLNs are used (more MPRs, more hops) DSR Route Maintenance, salvaging and retransmissions User packet delivery better when salvaging is used User packet delivery also better when retransmissions are used Routing overhead higher when salvaging and/or retransmission are used Route maintenance increases the routing overhead but also increases user packet delivery BAE Systems and Ericsson All rights reserved 20

21 Simulation Results: Traffic delivered Hop count Routing messages transmitted Comparisons / Figure of Merit Visualisation of jamming Additional investigations / optimisations: Summary / Conclusions BAE Systems and Ericsson All rights reserved 21

22 Summary & Conclusions: Generalities Long distance links are more susceptible to jamming than short links. During jamming, an ideal routing protocol would aim to use a route with many short hops in preference to a route with a few long hops. Both protocols tended to use shorter hops when the jamming was continuous (i.e. when it was clear that certain links were non-operational) Neither protocol succeeded in converging towards shorter hops in the presence of pulsed jamming In general, OLSR packet delivery rates were better than DSR Mainly due to OLSR s use of Link Layer Notifications (LLNs) OLSR selected shorter hops which are more robust to jamming However DSR has salvaging No benefits over OLSR under severe jamming, where frequently no alternative route would be available. Succeeded in a few cases of less severe jamming. BAE Systems and Ericsson All rights reserved 22

23 Summary & Conclusions: Routing Overhead OLSR With OLSR s responsiveness to topology changes constrained by enforcing minimum intervals between successive transmissions: The overhead increase during jamming is relatively small (typically <30%). During severe jamming, the overhead falls due to network fragmentation. When shorter OLSR minimum intervals were used The routing overhead increased significantly (by OOM for fast pulsed jamming) Little change in user traffic delivery performance. DSR Under some jamming conditions there were repeated unsuccessful searches for unreachable destinations - this causing up to a factor of 10 increase in overhead Familiar weakness with reactive protocols Serious problem due to additional network load and power consumption BAE Systems and Ericsson All rights reserved 23

24 Summary & Conclusions (cont) Hop counts Higher for OLSR than DSR during jamming Mainly due to OLSR s use of LLNs, resulting in OLSR using shorter links but needing more hops. Jammer duty cycles Matching the jamming cycles to the OLSR HELLO or TC default message intervals did not provide any additional jammer advantage. OLSR s message jitter helps to mitigate against this type of attack Synchronising jamming to actual OLSR emissions would most likely provide a jammer advantage - not tested as part of this work DSR does not emit routing messages to a fixed cycle time and is therefore not additionally susceptible to any specific cycle. BAE Systems and Ericsson All rights reserved 24

25 Summary & Conclusions (cont) A possible enhancement to DSR is to flood the route error message locally, rather than sending it right back to the source, so that nodes around a failing link are notified sooner. Jammer planning A jammer placed at the geographical centre is more disruptive than a jammer placed at the corner of the network (as expected). Using multiple low power jammers is more a power efficient way of disrupting a network than using a single high power jammer. BAE Systems and Ericsson All rights reserved 25

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif Link Duration, Path Stability and Comparesion of MANET Routing Protcols Sanjay Kumar, Haresh Kumar and Zahid Yousif A Bachelor thesis submitted to the Department of Electrical Engineering COMSATS Institute

More information

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks Laura Marie Feeney Swedish Institute of Computer Science http://www.sics.se/~lmfeeney Overview mobile ad hoc networks routing protocols communication

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks Renato Lo Cigno www.disi.unitn.it/locigno/teaching Part of this material (including some pictures) features and are freely reproduced from: Ian F.Akyildiz, Xudong Wang,Weilin Wang,

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

Configuring OSPF. Information About OSPF CHAPTER

Configuring OSPF. Information About OSPF CHAPTER CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The

More information

Interlayer routing issues for wireless networks

Interlayer routing issues for wireless networks NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved

More information

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj

More information

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE 802.11S WIRELESS MESH NETWORK Aneri Fumtiwala 1, Himani Modi 2, Pinal Patel 3, Mrs.Payal T. Mahida 4 1,2,3,4 Department of Computer Science & Engineering

More information

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey

More information

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks Analysis and Design of Link Metrics for Quality Routing PhD Thesis Defense by Nadeem JAVAID Dec 15, 2010 Thesis Director Prof. Karim DJOUANI Jury : Rapporteur B.J. VAN WYK Prof. Tshwane University of Technology

More information

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 CSE Department, SBSCET Ferozepur, Punjab Email: kanubala89@gmail.com 1, monika.sal@rediffmail.com 2 Abstract MANET stands

More information

Modeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University

Modeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Modeling Infrared LANs in GloMoSim Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Talk Outline Motivation and Applications for Infrared Wireless

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 399-404 International Research Publications House http://www. irphouse.com /ijict.htm Exhaustive

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks

Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Dongjin Son, Bhaskar Krishnamachari and John Heidemann Presented by Alexander Lash CS525M Introduction

More information

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th

More information

Introduction to Mesh

Introduction to Mesh Introduction to Mesh ICTP School on Radio-based Computer Networking February 24 th 2005 Tomas B. Krag wire.less.dk What is Mesh? "A mesh network is a network that employs one of two connection arrangements,

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig OLSR-L 1 2 3 4 2 ROULA OLSR OLSR ROULA ROULA OLSR OLSR-L Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig Kazuyoshi Soga, 1 Tomoya Takenaka, 2 Yoshiaki Terashima,

More information

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn: Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com

More information

Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Energy-Efficient Communication Protocol for Wireless Microsensor Networks Energy-Efficient Communication Protocol for Wireless Microsensor Networks Wendi Rabiner Heinzelman Anatha Chandrasakan Hari Balakrishnan Massachusetts Institute of Technology Presented by Rick Skowyra

More information

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT by Yi Zhu A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science

More information

Experimental evaluation of IEEE s path selection protocols in a mesh testbed

Experimental evaluation of IEEE s path selection protocols in a mesh testbed University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Experimental evaluation of IEEE 802.11s path selection protocols

More information

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

Performance Comparison of AODV, DSDV and ZRP Routing Protocols Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department

More information

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

Link-state protocols and Open Shortest Path First (OSPF)

Link-state protocols and Open Shortest Path First (OSPF) Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Wireless in the Real World. Principles

Wireless in the Real World. Principles Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724 ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets

More information

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi OLSR Standards Emmanuel BACCELLI INRIA / Hitachi Main Topics Standardization of OSLR Where are we at? What are we dealing with? The IETF. The future of OLSR Standards and Concepts. Example: MANET WG (Mobile

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Communication Networks. Braunschweiger Verkehrskolloquium

Communication Networks. Braunschweiger Verkehrskolloquium Simulation of Car-to-X Communication Networks Braunschweiger Verkehrskolloquium DLR, 03.02.2011 02 2011 Henrik Schumacher, IKT Introduction VANET = Vehicular Ad hoc NETwork Originally used to emphasize

More information

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks The InsTITuTe for systems research Isr TechnIcal report 2009-9 Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks Kiran Somasundaram Isr develops, applies and

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. by Umang Sureshbhai Patel

A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. by Umang Sureshbhai Patel ABSTRACT PATEL, UMANG SURESHBHAI. A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. (Under the direction of Dr. Rudra Dutta.) Wireless networks are susceptible to radio jamming

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs( WPANs) Title: [IMEC UWB PHY Proposal] Date Submitted: [4 May, 2009] Source: Dries Neirynck, Olivier Rousseaux (Stichting

More information

WiMOD LR Base Plus Firmware

WiMOD LR Base Plus Firmware WiMOD LR Base Plus Firmware Feature Specification Version 1.0 Document ID: 4000/40140/0137 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Overview Document Information File name WiMOD_LR_Base_Plus_Feature_Spec.docx

More information

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS Juan Carlos García, Mari-Carmen Bañuls, Pablo Galdámez and Rubén Quintero Instituto Tecnológico de Informática, Universidad

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS Puneet Mittal, Paramjeet Singh* and Shaveta Rani** Dept. of Computer Engg. Govt. Poly. College, Bathinda,

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS 1 ALOK KUMAR JAGADEV, 2 BINOD KUMAR PATTANAYAK *, 3 AJIT KUMAR NAYAK, 4 MANOJRANJAN NAYAK Institute Of Technical Education And Research,

More information

RECOMMENDATION ITU-R BS

RECOMMENDATION ITU-R BS Rec. ITU-R BS.1350-1 1 RECOMMENDATION ITU-R BS.1350-1 SYSTEMS REQUIREMENTS FOR MULTIPLEXING (FM) SOUND BROADCASTING WITH A SUB-CARRIER DATA CHANNEL HAVING A RELATIVELY LARGE TRANSMISSION CAPACITY FOR STATIONARY

More information

Weather Disruption-Tolerant Self-Optimising Millimeter Mesh Networks: Architecture, Routing Protocols, Performance

Weather Disruption-Tolerant Self-Optimising Millimeter Mesh Networks: Architecture, Routing Protocols, Performance Weather Disruption-Tolerant Self-Optimising Millimeter Mesh Networks: Architecture, Routing Protocols, Performance James P.G. Sterbenz, Abdul Jabbar, Justin Rohrer, Egemen Çetinkaya, Bharatwajan Raman,

More information

WirelessHART Modeling and Performance Evaluation

WirelessHART Modeling and Performance Evaluation WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, 2013 1 / 21 WirelessHART [www.hartcomm.org] A.

More information

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of MANET Using Quality of Service Metrics Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,

More information

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications The first Nordic Workshop on Cross-Layer Optimization in Wireless Networks at Levi, Finland Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications Ahmed M. Masri

More information

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Multi-hop Networks with Cooperative Relaying Assisted Links

Multi-hop Networks with Cooperative Relaying Assisted Links c IEEE, 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Enforcer 32WE-APP. The control panel Enforcer 32WE-APP is certified to EN50131 Grade 2 and offers a wide range of certified wireless accessories.

Enforcer 32WE-APP. The control panel Enforcer 32WE-APP is certified to EN50131 Grade 2 and offers a wide range of certified wireless accessories. Enforcer 32WE-APP Enforcer 32WE-APP Enforcer 32WE is the first wireless system on the market that is capable to guarantee high performance maximum security wireless protection via the advanced two way

More information

Survey of MANET based on Routing Protocols

Survey of MANET based on Routing Protocols Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization EE359 Course Project Mayank Jain Department of Electrical Engineering Stanford University Introduction

More information

Information Theory at the Extremes

Information Theory at the Extremes Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.

More information

Secure Ad-Hoc Routing Protocols

Secure Ad-Hoc Routing Protocols Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol

More information

On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using and p

On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using and p 1 On Probability of Link Availability in Original and AODV, FSR and OLSR Using 82.11 and 82.11p S. Sagar, N. Javaid, J. Saqib, Z. A. Khan $, U. Qasim, M. A. Khan arxiv:1212.4244v1 [cs.ni] 18 Dec 212 COMSATS

More information

A Consolidated Analysis of MANET Routing Protocols

A Consolidated Analysis of MANET Routing Protocols A Consolidated Analysis of MANET Routing Protocols Leelavathi School of IT, SEGI University leelavathiraj@segi.edu.my Raja Mohan School of IT, SEGI University rajamohanp@segi.edu.my Thinaharan.R School

More information