5 research outputs found

    A Performance Comparison of Virtual Backbone Formation Algorithms for Wireless Mesh Networks

    Get PDF
    Currently wireless networks are dominant by star topology paradigm. Its natural the evolution is towards wireless mesh multi-hop networks. This article compares the performance of several algorithms for virtual backbone formation in ad hoc mesh networks both theoretically and through simulations. Firstly, an overview of the algorithms is given. Next, the results of the algorithm simulations made with the program Dominating Set Simulation Suite (DSSS) are described and interpreted. We have been extended the simulator to simulate the Mobile Backbone Network Topology Synthesis Algorithm. The results show that this algorithm has the best combination of performance characteristics among the compared algorithms

    ENERGY CONSERVATION FOR WIRELESS AD HOC ROUTING

    Get PDF
    Self-configuring wireless ad hoc networks have attracted considerable attention in the last few years due to their valuable civil and military applications. One aspect of such networks that has been studied insufficiently is the energy efficiency. Energy efficiency is crucial to prolong the network lifetime and thus make the network more survivable.Nodes in wireless ad hoc networks are most likely to be driven by battery and hence operate on an extremely frugal energy budget. Conventional ad hoc routing protocols are focused on handling the mobility instead of energy efficiency. Energy efficient routing strategies proposed in literature either do not take advantage of sleep modes to conserve energy more efficiently, or incur much overhead in terms of control message and computing complexity to schedule sleep modes and thus are not scalable.In this dissertation, a novel strategy is proposed to manage the sleep of the nodes in the network so that energy can be conserved and network connectivity can be kept. The novelty of the strategy is its extreme simplicity. The idea is derived from the results of the percolation theory, typically called gossiping. Gossiping is a convenient and effective approach and has been successfully applied to several areas of the networking. In the proposed work, we will developa sleep management protocol from gossiping for both static and mobile wireless ad hoc networks. Then the protocol will be extended to the asynchronous network, where nodes manage their own states independently. Analysis and simulations will be conducted to show thecorrectness, effectiveness and efficiency of the proposed work. The comparison between analytical and simulation results will justify them for each other. We will investigate the most important performance aspects concerning the proposed strategy, including the effect ofparameter tuning and the impacts of routing protocols. Furthermore, multiple extensions will be developed to improve the performance and make the proposed strategy apply to different network scenarios

    Generalized Domination in Graphs with Applications in Wireless Networks

    Get PDF
    The objective of this research is to study practical generalization of domination in graphs and explore the theoretical and computational aspects of models arising in the design of wireless networks. For the construction of a virtual backbone of a wireless ad-hoc network, two different models are proposed concerning reliability and robustness. This dissertation also considers wireless sensor placement problems with various additional constraints that reflect different real-life scenarios. In wireless ad-hoc network, a connected dominating set (CDS) can be used to serve as a virtual backbone, facilitating communication among the members in the network. Most literature focuses on creating the smallest virtual backbone without considering the distance that a message has to travel from a source until it reaches its desired destination. However, recent research shows that the chance of loss of a message in transmission increases as the distance that the message has to travel increases. We propose CDS with bounded diameter, called dominating s-club (DsC) for s ≥ 1, to model a reliable virtual backbone. An ideal virtual backbone should retain its structure after the failure of a certain number of vertices. The issue of robustness under vertex failure is considered by studying k-connected m-dominating set. We describe several structural properties that hold form ≥ k, but fail when m < k. Three different formulations based on vertex-cut inequalities are shown depending on the value of k and m. The computational results show that the proposed lazy-constraint approach compares favorably with existing methods for the minimum connected dominating set problem (for k = m = 1). The experimental results for k = m = 2, 3, 4 are presented as well. In the wireless sensor placement problem, the objective is often to place a minimum number of sensors while monitoring all sites of interest, and this can be modeled by dominating set. In some practical situations, however, there could be a location where a sensor cannot be placed because of environmental restrictions. Motivated by these practical scenarios, we introduce varieties of dominating set and the corresponding optimization problems. For these new problems, we consider the computational complexity, mathematical programming formulation, and analytical bounds on the size of structures of interest. We solve these problems using a general commercial solver and compare its performance with that of simulated annealing

    THE EFFECT OF INTERACTIONS BETWEEN PROTOCOLS AND PHYSICAL TOPOLOGIES ON THE LIFETIME OF WIRELESS SENSOR NETWORKS

    Get PDF
    Wireless sensor networks enable monitoring and control applications such weather sensing, target tracking, medical monitoring, road monitoring, and airport lighting. Additionally, these applications require long term and robust sensing, and therefore require sensor networks to have long system lifetime. However, sensor devices are typically battery operated. The design of long lifetime networks requires efficient sensor node circuits, architectures, algorithms, and protocols. In this research, we observed that most protocols turn on sensor radios to listen or receive data then make a decision whether or not to relay it. To conserve energy, sensor nodes should consider not listening or receiving the data when not necessary by turning off the radio. We employ a cross layer scheme to target at the network layer issues. We propose a simple, scalable, and energy efficient forwarding scheme, which is called Gossip-based Sleep Protocol (GSP). Our proposed GSP protocol is designed for large low-cost wireless sensor networks with low complexity to reduce the energy cost for every node as much as possible. The analysis shows that allowing some nodes to remain in sleep mode improves energy efficiency and extends network lifetime without data loss in the topologies such as square grid, rectangular grid, random grid, lattice topology, and star topology. Additionally, GSP distributes energy consumption over the entire network because the nodes go to sleep in a fully random fashion and the traffic forwarding continuously via the same path can be avoided
    corecore