Energy-Efficient Protocol for Cooperative Networks.

Slides:



Advertisements
Similar presentations
Bandwidth Estimation for IEEE Based Ad Hoc Networks.
Advertisements

ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
ABSTRACT Due to the Internets sheer size, complexity, and various routing policies, it is difficult if not impossible to locate the causes of large volumes.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Transmission Power Control in Wireless Sensor Networks CS577 Project by Andrew Keating 1.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
Ad Hoc Wireless Routing COS 461: Computer Networks
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
CIS 725 Wireless networks. Low bandwidth High error rates.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Layered Approach using Conditional Random Fields For Intrusion Detection.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Low-Power Wireless Sensor Networks
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Wireless Sensor Networks COE 499 Energy Aware Routing
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
Energy-Efficient Protocol for Cooperative Networks IEEE/ACM Transactions on Networking, Apr Mohamed Elhawary, Zygmunt J. Haas Yong Zhou
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Tufts University. EE194-WIR Wireless Sensor Networks. March 3, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
A Power Assignment Method for Multi-Sink WSN with Outage Probability Constraints Marcelo E. Pellenz*, Edgard Jamhour*, Manoel C. Penna*, Richard D. Souza.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Abstract We propose two novel energy-aware routing algorithms for wireless ad hoc networks, called reliable minimum energy cost routing (RMECR) and reliable.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power.
CSR: Cooperative Source Routing Using Virtual MISO in Wireless Ad hoc Networks IEEE WCNC 2011 Yang Guan, Yao Xiao, Chien-Chung Shen and Leonard Cimini.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
Cascading : An Overview of the Strategy Yujie Zhu and Raghupathy Sivakumar GNAN Research Group, Georgia Tech Energy-Efficient Communication Strategy for.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
IOS Network Model 2nd semester
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Protocols.
Protocols.
Presentation transcript:

Energy-Efficient Protocol for Cooperative Networks

 Abstract  Introduction  Scope  Purpose  Existing System  Disadvantages.  Proposed System  Advantages  System Requirements

 Modules  Algorithms  Architecture.  UML(Unified Modeling Language)  DFD(Data Flow Diagram).  Screen Shots  Conclusion

Abstract:  In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to assist in communication.  We model a cooperative transmission link in wireless networks as a transmitter cluster and a receiver cluster.  We then propose a cooperative communication protocol for establishment of these clusters and for cooperative transmission of data.  The analysis results are used to compare the energy savings and the end-to-end robustness of our protocol with two non-cooperative schemes, as well as to another cooperative protocol published in the technical literature.  The reduction in error rate and the energy savings translate into increased lifetime of cooperative sensor networks.

 In Wireless sensor networks, nodes have limited energy resources and, consequently, protocols designed for sensor networks should be energy-efficient.  In cooperative transmission, multiple nodes simultaneously receive, decode, and retransmit data packets.  We use a cooperative communication model with multiple nodes on both ends of a hop and with each data packet being transmitted only once per hop.  The classical route from a source node to a sink node is replaced with a multi hop cooperative path, and the classical point-to-point communication is replaced with many-to-many cooperative communication. 5

 The main novelty of our paper the “recruiting- and-transmitting” Phase is done dynamically per hop, starting from the source node and progressing, hop by hop, as the packet moves along the path to the sink node.  Once a data packet is received at a receiving cluster of the previous hop along the path, the receiving cluster now becomes the sending cluster, and the new receiving cluster will start forming.  The receiving cluster is formed by the cluster head recruiting neighbor nodes through exchange of short control packets.

The routing phase of the protocol, which is responsible for finding a “one-node-thick” route from the source node to the sink node, could be implemented using one of the many previously published routing protocols. For the purpose of performance evaluation, we chose to implement this phase using the Ad hoc On- demand Distance-Vector routing protocol (AODV) with some modifications and with the links’ transmissions energy used as the links’ cost.

 Existing methods focus on MAC layer design for networks with cooperative transmission.  When no acknowledgement is received from the destination after timeout, the cooperative nodes, which correctly received the data, retransmit it. . Only one cooperative node retransmits at any time, and the other cooperative nodes flush their copy once they hear the retransmission.  Hence, this work focuses on reducing the transmission errors, without benefiting from the energy savings of simultaneous transmissions.

 Existing methods focus on MAC layer design for networks with cooperative transmission.  When no acknowledgement is received from the destination after timeout, the cooperative nodes, which correctly received the data, retransmit it.  Only one cooperative node retransmits at any time

 We propose a cooperative communication model with multiple nodes on both ends of a hop and with each data packet being transmitted only once per hop.  In our model of cooperative transmission, every node on the path from the source node to the destination node becomes a cluster head, with the task of recruiting other nodes in its neighborhood and coordinating their transmissions.  Every node in the receiving cluster receives from every node in the sending cluster.  Sending nodes are synchronized, and the power level of the received signal at a receiving node is the sum of all the signal powers coming from all the sender nodes.

 A cooperative communication model with multiple nodes on both ends of a hop and with each data packet being transmitted only once per hop.  Every node in the receiving cluster receives from every node in the sending cluster.  This reduces the likelihood of a packet being received in error.

HARDWARE REQUIREMENTS  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Color.  Mouse : Logitech.  Ram : 512 MB.

 Operating System : Windows xp, Linux  Language : Java1.4 or more  Technology : Swing, AWT  IDE : Net Beans 6.8

 1. Recruiting, Transmitting & receiving  2. Route Construction  3. Data transmission using CANs  4. Message details with Route paths

 Our cooperative transmission protocol consists of two phases. 1. The routing phase. 2. The “recruiting-and-transmitting” phase.  In the routing phase, the initial path between the source and the sink nodes is discovered as an underlying “one-node-thick” path.  The path undergoes a thickening process in the “recruiting-and-transmitting” phase. In this phase, the nodes on the initial path become cluster heads, which recruit additional adjacent nodes from their neighborhood.  Once this recruiting is completed and the receiving cluster is established, the packet is transmitted from the sending cluster to the newly established receiving cluster.

 Upon receiving the CL packet from node 5, node 2 sends a confirm (CF) packet to the nodes in its sending cluster (nodes 1 and 3) to synchronize their transmission of the data packet.  The CF packet contains the waiting-time-to- send and the transmission power level.  The transmission power level is the total transmission power (a protocol-selectable parameter) divided by the number of the nodes in the sending cluster.

 The capacity of the CAN protocol degrades with an increase in the transmission range, as a transmission on one hop blocks a large number of nodes from transmitting other packets, and hence the network can only carry lower load.  In the CAN protocol, failure to receive a packet results in a large reduction in the success probability on the next hop.

 The work in proposes and evaluates the performance of a cross-layer framework that uses virtual multiple- input–single- output (MISO) links for MANET.  This model is totally different from our model, where we use MISO system with orthogonal transmissions. On the MAC layer, relies on the knowledge of the neighbors to select the cooperating nodes.

 Energy-Efficient approximation algorithms:

 Use Case Diagram  Sequence Diagram  Collaboration Diagram  State Chat Diagram  Activity Diagram  Component Diagram  Deployment Diagram  DFD

 We proposed an energy-efficient cooperative protocol, and we analyzed the robustness of the protocol to data packet loss. When the nodes are placed on a grid and as compared to the disjoint-paths scheme,  We showed that our cooperative protocol reduces the probability of failure to deliver a packet to destination by a factor of up to 100, depending on the values of considered Parameters.  Compared to the CAN protocol and to the one- path scheme, this reduction amounts to a factor of up to Our study also analyzed the capacity upper bound of our protocol, showing improvement over the corresponding values of the other three protocols. Conclusions