TL;DR: The simulation results show that the shadowing phenomena, by destroying the regularity of the network, reduce the mean distance among nodes and at the same time increase the interference level and the latency of packet transmission.
Abstract: In this paper, we consider the behavior of a wireless sensor network for TwoRayGround and Shadowing radio models for the case of mobile event. By means of simulations, we analyse the performance of AODV protocol. In the previous work, we considered that the event node is stationary in the observation field. In this work, we want to investigate how the sensor network performs in the case when the event node moves. The simulation results show that the shadowing phenomena, by destroying the regularity of the network, reduce the mean distance among nodes and at the same time increase the interference level and the latency of packet transmission. We found that for mobile event, the Goodput and routing efficiency of TwoRayGround is better than Shadowing, but the Depletion of Shadowing is better than TwoRayGround.
In recent years, technological advances have lead to the emergence of distributed Wireless Sensor Networks (WSNs) which are capable of observing the physical world, processing the data, making decisions based on the observations and performing appropriate actions.
Also, the goodput for the mobile event node case does not change too much compared with the stationary event case using AODV and Shadowing model, but the goodput is not good when the number of nodes is increased.
When source node wants 1By using the theorem in [8], the authors can say that a simple 2 regular network is almost surely strongly 2 connected.
Source node broadcasts Route Request (RREQ) packet to its neighbors.
2.3. Propagation Radio Model
In order to simulate the detection of a natural event, the authors used the libraries from Naval Research Laboratory (NRL) [10].
The transmission range of Shadowing model is random.
The energy model concerns the dynamics of energy consumption of the sensor.
It is intuitive that in a more realistic scenario, where many phenomena trigger many events, the traffic load can be higher, and then the interference will worsen the performance with respect to that the authors study here.
Where Nr(τ) is the number of received packet at the sink, and the Ns(τ) is the number of packets sent by sensor nodes which detected the phenomenon.
5 Simulation Results
For AODV routing protocol, the sample averages of Eqs. (5), (6) and (8) are computed over 20 simulation runs, and they are plotted in Fig. 6 ∼ Fig. 11, with respect to the particular radio model used.
At a particular value of Tr (∼ 1pps), the Goodput arise abruptly, because the network has reached the maximum capacity.
Intuitively one can say that in the case of Shadowing the on-demand routing protocols are affected by the presence of shadowing-induced unidirectional links.the authors.
On the other hand, exploiting such links is possible but the performance gains are quite low.
Thus, given a fixed detection interval, Nr can be much lower than its value in the case of ideal radio model, i.e. the Two-Rays-Ground model, where the discovered paths do not change over time6.
6. Conclusions
The authors presented the implementation of a simulation system for WSNs using ns-2.
The authors used AODV protocol and carried out the simulations for mobile event considering two cases: TwoRayGround and Shadowing.
When the number of nodes increases the RE of TwoRayGround is better than Shadowing.
The authors also would like to carry out simulations for sensor and actor networks.
TL;DR: The types of topologies: Bus, ring, star and its evaluation in terms of receiving energy, Residual energy, Idle-state energy, number of packets sent or received in the network are presented.
Abstract: The network technologies development made wireless sensor network (WSN) to have many ways in reducing the complexity, cost and in improving reliability. The objective of this paper is to provide an effective topology modeling to conserve the energy of individual nodes in wireless sensor network and preserving its coverage maintenance and graph connectivity. This paper presents the types of topologies: Bus, ring, star and its evaluation in terms of Receiving energy, Residual energy, Idle-state energy, number of packets sent or received in the network.
8 citations
Cites background from "Performance Evaluation of Wireless ..."
...The consumed energy could be reduced in a large scale sensor network by considering a mobile sink node [6] in the observing area [7]....
TL;DR: It is shown that the non-determinism present in some radio propagation models induce randomness which may compromise the performance of many protocols.
Abstract: The deployment of mobile ad hoc networks is dicult in a re- search environment and therefore the performance of protocols for these networks has been mostly evaluated on simulators. A simulator must replicate realistic conditions and one of the most dicult a spects is the radio signal propagation model. The literature shows that many perfor- mance evaluations were conducted using propagation models that are not realistic for the expected application scenarios. This paper shows that the non-determinism present in some radio propagation models induce randomness which may compromise the performance of many protocols. To demonstrate the problem, this paper compares and discusses the per- formance of some routing protocols under dierent propagat ion models.
2 citations
Cites methods or result from "Performance Evaluation of Wireless ..."
...The authors continued their work and presented a similar study for Mobile Event using AODV [11]....
[...]
...Surprisingly, routing protocol metrics (like those used by AODV, DSR and DSDV) tend to favour routes that include weak links as they are expected to have a lower number of hops (thus reducing cost) and to be discovered faster (which is interpreted as a sign of lower congestion)....
[...]
...6(b) is bellow 60% for AODV, 50% for DSDV and 30% for DSR....
[...]
...AODV purges from the routing table routes that have not been used for a predefined time....
[...]
...One aspect of AODV very relevant for this paper is that every node replies only once to the same route request....
TL;DR: This book aims to provide a chronology of key events and individuals involved in the development of microelectronics technology over the past 50 years and some of the individuals involved have been identified and named.
Abstract: Alhussein Abouzeid Rensselaer Polytechnic Institute Raviraj Adve University of Toronto Dharma Agrawal University of Cincinnati Walid Ahmed Tyco M/A-COM Sonia Aissa University of Quebec, INRSEMT Huseyin Arslan University of South Florida Nallanathan Arumugam National University of Singapore Saewoong Bahk Seoul National University Claus Bauer Dolby Laboratories Brahim Bensaou Hong Kong University of Science and Technology Rick Blum Lehigh University Michael Buehrer Virginia Tech Antonio Capone Politecnico di Milano Javier Gómez Castellanos National University of Mexico Claude Castelluccia INRIA Henry Chan The Hong Kong Polytechnic University Ajit Chaturvedi Indian Institute of Technology Kanpur Jyh-Cheng Chen National Tsing Hua University Yong Huat Chew Institute for Infocomm Research Tricia Chigan Michigan Tech Dong-Ho Cho Korea Advanced Institute of Science and Tech. Jinho Choi University of New South Wales Carlos Cordeiro Philips Research USA Laurie Cuthbert Queen Mary University of London Arek Dadej University of South Australia Sajal Das University of Texas at Arlington Franco Davoli DIST University of Genoa Xiaodai Dong, University of Alberta Hassan El-sallabi Helsinki University of Technology Ozgur Ercetin Sabanci University Elza Erkip Polytechnic University Romano Fantacci University of Florence Frank Fitzek Aalborg University Mario Freire University of Beira Interior Vincent Gaudet University of Alberta Jairo Gutierrez University of Auckland Michael Hadjitheodosiou University of Maryland Zhu Han University of Maryland College Park Christian Hartmann Technische Universitat Munchen Hossam Hassanein Queen's University Soong Boon Hee Nanyang Technological University Paul Ho Simon Fraser University Antonio Iera University "Mediterranea" of Reggio Calabria Markku Juntti University of Oulu Stefan Kaiser DoCoMo Euro-Labs Nei Kato Tohoku University Dongkyun Kim Kyungpook National University Ryuji Kohno Yokohama National University Bhaskar Krishnamachari University of Southern California Giridhar Krishnamurthy Indian Institute of Technology Madras Lutz Lampe University of British Columbia Bjorn Landfeldt The University of Sydney Peter Langendoerfer IHP Microelectronics Technologies Eddie Law Ryerson University in Toronto
TL;DR: It is proved that, with appropriate bounds on node density and intracluster and intercluster transmission ranges, HEED can asymptotically almost surely guarantee connectivity of clustered networks.
Abstract: Topology control in a sensor network balances load on sensor nodes and increases network scalability and lifetime. Clustering sensor nodes is an effective topology control approach. We propose a novel distributed clustering approach for long-lived ad hoc sensor networks. Our proposed approach does not make any assumptions about the presence of infrastructure or about node capabilities, other than the availability of multiple power levels in sensor nodes. We present a protocol, HEED (Hybrid Energy-Efficient Distributed clustering), that periodically selects cluster heads according to a hybrid of the node residual energy and a secondary parameter, such as node proximity to its neighbors or node degree. HEED terminates in O(1) iterations, incurs low message overhead, and achieves fairly uniform cluster head distribution across the network. We prove that, with appropriate bounds on node density and intracluster and intercluster transmission ranges, HEED can asymptotically almost surely guarantee connectivity of clustered networks. Simulation results demonstrate that our proposed approach is effective in prolonging the network lifetime and supporting scalable data aggregation.
4,889 citations
"Performance Evaluation of Wireless ..." refers background in this paper
...These networks can be an integral part of systems such as battle-field surveillance and microclimate control in buildings, nuclear, biological and chemical attack detection, home automation and environmental monitoring [1, 2 ]....
TL;DR: A survey of state-of-the-art routing techniques in WSNs is presented and the design trade-offs between energy and communication overhead savings in every routing paradigm are studied.
Abstract: Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols in WSNs might differ depending on the application and network architecture. In this article we present a survey of state-of-the-art routing techniques in WSNs. We first outline the design challenges for routing protocols in WSNs followed by a comprehensive survey of routing techniques. Overall, the routing techniques are classified into three categories based on the underlying network structure: flit, hierarchical, and location-based routing. Furthermore, these protocols can be classified into multipath-based, query-based, negotiation-based, QoS-based, and coherent-based depending on the protocol operation. We study the design trade-offs between energy and communication overhead savings in every routing paradigm. We also highlight the advantages and performance issues of each routing technique. The article concludes with possible future research areas.
4,701 citations
"Performance Evaluation of Wireless ..." refers background in this paper
...We found that for mobile event, the Goodput and routing efficiency of TwoRayGround is better than Shadowing, but the Depletion of Shadowing is better than TwoRayGround....
TL;DR: This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks that enables low-duty-cycle operation in a multihop network and reveals fundamental tradeoffs on energy, latency and throughput.
Abstract: This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining largely inactive for long time, but becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802.11 in several ways: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses a few novel techniques to reduce energy consumption and support self-configuration. It enables low-duty-cycle operation in a multihop network. Nodes form virtual clusters based on common sleep schedules to reduce control overhead and enable traffic-adaptive wake-up. S-MAC uses in-channel signaling to avoid overhearing unnecessary traffic. Finally, S-MAC applies message passing to reduce contention latency for applications that require in-network data processing. The paper presents measurement results of S-MAC performance on a sample sensor node, the UC Berkeley Mote, and reveals fundamental tradeoffs on energy, latency and throughput. Results show that S-MAC obtains significant energy savings compared with an 802.11-like MAC without sleeping.
Q1. What are the future works in "Performance evaluation of wireless sensor networks for different radio models considering mobile event" ?
In the future, the authors would like to carry out more extensive simulations for mobile sensor nodes and mobile sink.
Q2. What are the contributions in "Performance evaluation of wireless sensor networks for different radio models considering mobile event" ?
In this paper, the authors consider the behavior of a wireless sensor network for TwoRayGround and Shadowing radio models for the case of mobile event. By means of simulations, the authors analyse the performance of AODV protocol. In the previous work, the authors considered that the event node is stationary in the observation field. In this work, the authors want to investigate how the sensor network performs in the case when the event node moves.