SlideShare a Scribd company logo
1 of 32
CSE 622 Advanced Computer Networks
0
Surveying Cross-Layer Protocols in WSNs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
• Introduction to WSNs
• WSN Topology
• Design Factors
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
126-Apr-18
• Introduction to WSNs
• WSN Topology
• Design Factors
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• BGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
226-Apr-18
• The need for wireless sensors networks.
• Why cannot we use normal Ad-hoc networks?
• Sensor nodes are deployed densely, which makes them
hard to have a unique global identification especially
with the overhead that a packet would have.
• Sensor nodes are prone to failures so the network must
find a way to maintain its availability.
• Sensor nodes are typically very small, in the range of 1
cm3, which results in a very frequent topology change.
Introduction to WSNs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
326-Apr-18
• Introduction to WSNs
• WSN Topology
• Design Factors
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
426-Apr-18
• Densely distributed sensor nodes.
• One or more sink nodes.
WSN Topology
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
526-Apr-18
• Introduction to WSNs
• WSN Topology 
• Design Factors
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
626-Apr-18
• Fault Tolerance: Sensors in WSNs are prone to
failures due to the environment conditions or
energy limitation so the network should keep the
functionality intact even after losing some of the
nodes.
• Scalability: The network should accommodate the
addition of extra nodes in case of expanding the
network or replacing the faulty nodes.
Design Factors
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
726-Apr-18
• Production Costs: Sensors in WSNs are deployed
densely, prone to damage, and left unattended with
low possibility of maintenance so it has to be cheap,
which will be, typically, in the order of 1$.
• Power Consumption: Nodes must conserve their energy
while maintaining the minimum requirements of the
network.
That energy is driven from a small battery that would fit
with such small node.
With the possibility of no energy harvesting, power
consumption becomes one of the most critical points in
a protocol.
Design Factors Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
826-Apr-18
• Hardware Constraints: WSN nodes are mainly composed of four mandatory components and can
have multiple attached peripherals.
• The main components are:
• Sensing unit, which is composed of the sensor unit and an ADC.
• A processing unit to process the data.
• A transceiver unit for communication.
• A power unit.
• These sub units may be needed to fit in a matchbox-sized module and sometimes smaller than a
cubic centimetre to stay suspended in air.
Design Factors Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
926-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1026-Apr-18
Protocol Stack of WSNs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1126-Apr-18
• Physical layer:
• Responsible for frequency selection, carrier frequency generation, signal detection,
modulation, and data encryption.
• Data link layer:
• Responsible for the multiplexing of data streams, data frame detection, medium access, and
error control.
• MAC:
• Establish communication links for data transfer.
• Fairly and efficiently share communication resources between sensor nodes.
• Error Control:
• ARQ (Automatic Repeat Request) is limited by the additional retransmission
energy cost and overhead.
• FEC (Forward Error Correction): The decoding complexity is greater so that
additional processing power is needed.
Protocol Stack of WSNs Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1226-Apr-18
• Network layer:
• Special multi-hop wireless routing protocols between the sensor nodes and the sink node are needed.
• Power efficiency is always an important consideration.
• Sensor networks are mostly data-centric.
• Flooding: Each node receives data, repeats it by broadcasting unless a maximum number of hops for the
packet is reached.
• Provide internetworking with external networks such as other sensor networks, command and control
systems, and the Internet.
• Transport layer:
• This layer is especially needed when the system is planned to be accessed through the Internet or other
external networks.
• Unlike protocols such as TCP, the end-to-end communication schemes in sensor networks are not based on
global addressing. These schemes must consider that addressing based on data or location is used to
indicate the destinations of the data packets.
• Transport layer protocols are required for two main functionalities: reliability and congestion control.
• Factors such as power consumption and scalability and characteristics like data-centric routing, mean
sensor networks need different handling in the transport layer.
Protocol Stack of WSNs Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1326-Apr-18
• Application layer:
• Responsible for traffic management and provide software for different applications that translate the data in an
understandable form or send queries to obtain certain information.
• Three possible application layer protocols: Sensor Management Protocol (SMP), Task Assignment and Data Advertisement
Protocol (TADAP), and Sensor Query and Data Dissemination Protocol (SQDDP).
• SMP (Sensor Management Protocol):
• Management protocol that provides the software operations needed to perform the following administrative tasks:
• Introducing the rules related to data aggregation, attribute-based naming, and clustering to the sensor nodes.
• Exchanging data related to the location finding algorithms.
• Time synchronization of the sensor nodes.
• Moving sensor nodes.
• Turning sensor nodes on and off.
• Querying the sensor network configuration and the status of nodes and reconfiguring the sensor network.
• Authentication, key distribution, and security in data communications.
Protocol Stack of WSNs Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1426-Apr-18
• Power management plane:
• Manages how a sensor node uses its power.
• For example, the sensor node may turn off its receiver after receiving a message from one of
its neighbours. This is to avoid getting duplicated messages.
• Also, when the power level of the sensor node is low, the sensor node broadcasts to its
neighbours that it is low in power and cannot participate in routing messages. The
remaining power is reserved for sensing.
• Mobility management plane:
• Detects and registers the movement of sensor nodes so the sensor nodes can keep track of
who their neighbour sensor nodes are.
• By knowing who the neighbour sensor nodes are, the sensor nodes can balance their power
and task usage.
• Task management plane:
• Balances and schedules the sensing tasks given to a specific region.
• Not all sensor nodes in that region are required to perform at the same time.
Protocol Stack of WSNs Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1526-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1626-Apr-18
• The non-adjacent layers can interact with each other to share the information in
order to enhance the performance of the network.
• For example, the application layer can interact with the MAC layer to share the
QoS requirements to allow and help the MAC layer to achieve better scheduling.
• On the other hand, the physical layer can send the Channel Status Information
(CSI) to the network layer so it can adjust its routing paths to avoid the paths that
are not in a good state.
Cross-Layer Protocols in WSNs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1726-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1826-Apr-18
• Non-Manager Method.
• Manager Method.
Classifications of Cross-Layer Designs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1926-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2026-Apr-18
• The Energy Diffserv Application-Aware Scheduling (EDAS) algorithm has been
proposed to allow the MAC layer to take the energy efficiency, QoS
requirements, and fairness into consideration to increase the quality of the
received videos.
• It includes some mechanisms to achieve that goal:
• For example, the admission control mechanism is used to provide the
needed QoS to all video flows.
• It also includes channel time partition mechanism, an application-aware
dynamic channel time allocation algorithm, and it provides energy-
differentiated service to the devices based on the energy levels that they
have.
• The experimental results showed that this technique has reached 30% reduction
in energy consumption by compressing the videos with low quality.
EDAS
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2126-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS 
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2226-Apr-18
• The application layer in the Directional Geographical
Routing (DGR) relies on the information from the lower
layers in order to construct multiple paths, instead of
using single route, to transmit parallel H.26L real-time
video streams.
• This will help to achieve better load balancing,
bandwidth utilization, and fast packet delivery, which
will help in achieving lower delays, longer network
lifetime, and better video quality.
• The experimental results showed that this technique
has improved the average video Peak Signal-to-Noise
Ratio (PSNR) by 3 dB.
DGR
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2326-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS 
• BGR 
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2426-Apr-18
• The application layer in the Multi-Level Rate Routing (MLPR) relies on
the information from lower layers (e.g., the distance between the sensor
nodes) to reduce the number of the transmitted bits by each node.
• The reason is that the nodes close to each other, probably, will measure
values similar to each other so it is not needed to send the whole sensed
data by each node.
• However, the Data Source Coding (DSC) algorithm is used to encode the
data by the application layer before sending so the number of the
transmitted bits will be less and the bandwidth will be utilized in a better
way.
• After that, it will be the responsibility of the sink node to combine the
received data from different sensor nodes to construct the original
sensed value again.
MLRR
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2526-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS 
• BGR 
• MLRR 
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2626-Apr-18
• The functionality of the network layer in the Grid-based
Routing and Aggregator Selection Scheme (GRASS) has been
extended to include the aggregation capability, where the
cluster heads will aggregate the data coming from the sensor
nodes.
• Also, the cluster heads will, based on some algorithms, try to
find the minimum number of the aggregation points that the
packets need to travel before reaching their destinations at
the sink to maximize the lifetime of the network and
minimize the latency.
• The experimental results showed that the lifetime of the
network has been increased by 35% when using that
approach.
GRASS
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2726-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS 
• BGR 
• MLRR 
• GRASS 
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2826-Apr-18
• The network layer in the Cell-based Energy Density-
aware (CEDA) relies on one of the Channel Status
Information (CSI) parameters from the lower layers,
which is the energy level by adding it as a variable
in the routing tables.
• This parameter will serve as a weighting factor
when routing the data to avoid using the paths that
contains nodes with less remaining energy.
CEDA
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2926-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs 
• Classification of Cross-Layer Designs 
• EDAS 
• BGR 
• MLRR 
• GRASS 
• CEDA 
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
3026-Apr-18
CSE 622 Advanced Computer Networks
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
3126-Apr-18

More Related Content

What's hot

A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocoljaimin_m_raval
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
 
Wireless sensor network by abhishek mahajan
Wireless sensor network by abhishek mahajanWireless sensor network by abhishek mahajan
Wireless sensor network by abhishek mahajanAbhishek Mahajan
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsneSAT Journals
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent dataeSAT Publishing House
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc networkAshish Prajapat
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road AheadURLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road AheadMehdi Bennis
 

What's hot (19)

A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Transmission efficient ppt
Transmission efficient pptTransmission efficient ppt
Transmission efficient ppt
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Wireless sensor network by abhishek mahajan
Wireless sensor network by abhishek mahajanWireless sensor network by abhishek mahajan
Wireless sensor network by abhishek mahajan
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road AheadURLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road Ahead
 

Similar to Surveying cross layer protocols in ws ns

Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxRahulBhole12
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Aravindsikharam
AravindsikharamAravindsikharam
Aravindsikharamsikharam99
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.pptTekle12
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxIrawanAbiyantoro1
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxBinyamBekeleMoges
 
wireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxwireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxmayurbankar2
 
Mobile Computing - SARASWATHI RAMALINGAM
Mobile Computing - SARASWATHI RAMALINGAMMobile Computing - SARASWATHI RAMALINGAM
Mobile Computing - SARASWATHI RAMALINGAMSaraswathiRamalingam
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksparuvathavardhinipra
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothidivyajyothi405
 

Similar to Surveying cross layer protocols in ws ns (20)

Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptx
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Aravindsikharam
AravindsikharamAravindsikharam
Aravindsikharam
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
wireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxwireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptx
 
Mobile Computing - SARASWATHI RAMALINGAM
Mobile Computing - SARASWATHI RAMALINGAMMobile Computing - SARASWATHI RAMALINGAM
Mobile Computing - SARASWATHI RAMALINGAM
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 
adhoc applications.pptx
adhoc applications.pptxadhoc applications.pptx
adhoc applications.pptx
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothi
 
5G Enabled Vehicular Networks
5G Enabled Vehicular Networks5G Enabled Vehicular Networks
5G Enabled Vehicular Networks
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 

More from ahmad abdelhafeez

Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...ahmad abdelhafeez
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksahmad abdelhafeez
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentationahmad abdelhafeez
 

More from ahmad abdelhafeez (20)

Service level management
Service level managementService level management
Service level management
 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
Routing
RoutingRouting
Routing
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
opnet
opnetopnet
opnet
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
 
Intrusion prevension
Intrusion prevensionIntrusion prevension
Intrusion prevension
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentation
 
pentration testing
pentration testingpentration testing
pentration testing
 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

Surveying cross layer protocols in ws ns

  • 1. CSE 622 Advanced Computer Networks 0 Surveying Cross-Layer Protocols in WSNs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering
  • 2. • Introduction to WSNs • WSN Topology • Design Factors • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 126-Apr-18
  • 3. • Introduction to WSNs • WSN Topology • Design Factors • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • BGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 226-Apr-18
  • 4. • The need for wireless sensors networks. • Why cannot we use normal Ad-hoc networks? • Sensor nodes are deployed densely, which makes them hard to have a unique global identification especially with the overhead that a packet would have. • Sensor nodes are prone to failures so the network must find a way to maintain its availability. • Sensor nodes are typically very small, in the range of 1 cm3, which results in a very frequent topology change. Introduction to WSNs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 326-Apr-18
  • 5. • Introduction to WSNs • WSN Topology • Design Factors • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 426-Apr-18
  • 6. • Densely distributed sensor nodes. • One or more sink nodes. WSN Topology Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 526-Apr-18
  • 7. • Introduction to WSNs • WSN Topology  • Design Factors • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 626-Apr-18
  • 8. • Fault Tolerance: Sensors in WSNs are prone to failures due to the environment conditions or energy limitation so the network should keep the functionality intact even after losing some of the nodes. • Scalability: The network should accommodate the addition of extra nodes in case of expanding the network or replacing the faulty nodes. Design Factors Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 726-Apr-18
  • 9. • Production Costs: Sensors in WSNs are deployed densely, prone to damage, and left unattended with low possibility of maintenance so it has to be cheap, which will be, typically, in the order of 1$. • Power Consumption: Nodes must conserve their energy while maintaining the minimum requirements of the network. That energy is driven from a small battery that would fit with such small node. With the possibility of no energy harvesting, power consumption becomes one of the most critical points in a protocol. Design Factors Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 826-Apr-18
  • 10. • Hardware Constraints: WSN nodes are mainly composed of four mandatory components and can have multiple attached peripherals. • The main components are: • Sensing unit, which is composed of the sensor unit and an ADC. • A processing unit to process the data. • A transceiver unit for communication. • A power unit. • These sub units may be needed to fit in a matchbox-sized module and sometimes smaller than a cubic centimetre to stay suspended in air. Design Factors Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 926-Apr-18
  • 11. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1026-Apr-18
  • 12. Protocol Stack of WSNs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1126-Apr-18
  • 13. • Physical layer: • Responsible for frequency selection, carrier frequency generation, signal detection, modulation, and data encryption. • Data link layer: • Responsible for the multiplexing of data streams, data frame detection, medium access, and error control. • MAC: • Establish communication links for data transfer. • Fairly and efficiently share communication resources between sensor nodes. • Error Control: • ARQ (Automatic Repeat Request) is limited by the additional retransmission energy cost and overhead. • FEC (Forward Error Correction): The decoding complexity is greater so that additional processing power is needed. Protocol Stack of WSNs Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1226-Apr-18
  • 14. • Network layer: • Special multi-hop wireless routing protocols between the sensor nodes and the sink node are needed. • Power efficiency is always an important consideration. • Sensor networks are mostly data-centric. • Flooding: Each node receives data, repeats it by broadcasting unless a maximum number of hops for the packet is reached. • Provide internetworking with external networks such as other sensor networks, command and control systems, and the Internet. • Transport layer: • This layer is especially needed when the system is planned to be accessed through the Internet or other external networks. • Unlike protocols such as TCP, the end-to-end communication schemes in sensor networks are not based on global addressing. These schemes must consider that addressing based on data or location is used to indicate the destinations of the data packets. • Transport layer protocols are required for two main functionalities: reliability and congestion control. • Factors such as power consumption and scalability and characteristics like data-centric routing, mean sensor networks need different handling in the transport layer. Protocol Stack of WSNs Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1326-Apr-18
  • 15. • Application layer: • Responsible for traffic management and provide software for different applications that translate the data in an understandable form or send queries to obtain certain information. • Three possible application layer protocols: Sensor Management Protocol (SMP), Task Assignment and Data Advertisement Protocol (TADAP), and Sensor Query and Data Dissemination Protocol (SQDDP). • SMP (Sensor Management Protocol): • Management protocol that provides the software operations needed to perform the following administrative tasks: • Introducing the rules related to data aggregation, attribute-based naming, and clustering to the sensor nodes. • Exchanging data related to the location finding algorithms. • Time synchronization of the sensor nodes. • Moving sensor nodes. • Turning sensor nodes on and off. • Querying the sensor network configuration and the status of nodes and reconfiguring the sensor network. • Authentication, key distribution, and security in data communications. Protocol Stack of WSNs Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1426-Apr-18
  • 16. • Power management plane: • Manages how a sensor node uses its power. • For example, the sensor node may turn off its receiver after receiving a message from one of its neighbours. This is to avoid getting duplicated messages. • Also, when the power level of the sensor node is low, the sensor node broadcasts to its neighbours that it is low in power and cannot participate in routing messages. The remaining power is reserved for sensing. • Mobility management plane: • Detects and registers the movement of sensor nodes so the sensor nodes can keep track of who their neighbour sensor nodes are. • By knowing who the neighbour sensor nodes are, the sensor nodes can balance their power and task usage. • Task management plane: • Balances and schedules the sensing tasks given to a specific region. • Not all sensor nodes in that region are required to perform at the same time. Protocol Stack of WSNs Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1526-Apr-18
  • 17. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1626-Apr-18
  • 18. • The non-adjacent layers can interact with each other to share the information in order to enhance the performance of the network. • For example, the application layer can interact with the MAC layer to share the QoS requirements to allow and help the MAC layer to achieve better scheduling. • On the other hand, the physical layer can send the Channel Status Information (CSI) to the network layer so it can adjust its routing paths to avoid the paths that are not in a good state. Cross-Layer Protocols in WSNs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1726-Apr-18
  • 19. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1826-Apr-18
  • 20. • Non-Manager Method. • Manager Method. Classifications of Cross-Layer Designs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1926-Apr-18
  • 21. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2026-Apr-18
  • 22. • The Energy Diffserv Application-Aware Scheduling (EDAS) algorithm has been proposed to allow the MAC layer to take the energy efficiency, QoS requirements, and fairness into consideration to increase the quality of the received videos. • It includes some mechanisms to achieve that goal: • For example, the admission control mechanism is used to provide the needed QoS to all video flows. • It also includes channel time partition mechanism, an application-aware dynamic channel time allocation algorithm, and it provides energy- differentiated service to the devices based on the energy levels that they have. • The experimental results showed that this technique has reached 30% reduction in energy consumption by compressing the videos with low quality. EDAS Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2126-Apr-18
  • 23. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS  • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2226-Apr-18
  • 24. • The application layer in the Directional Geographical Routing (DGR) relies on the information from the lower layers in order to construct multiple paths, instead of using single route, to transmit parallel H.26L real-time video streams. • This will help to achieve better load balancing, bandwidth utilization, and fast packet delivery, which will help in achieving lower delays, longer network lifetime, and better video quality. • The experimental results showed that this technique has improved the average video Peak Signal-to-Noise Ratio (PSNR) by 3 dB. DGR Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2326-Apr-18
  • 25. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS  • BGR  • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2426-Apr-18
  • 26. • The application layer in the Multi-Level Rate Routing (MLPR) relies on the information from lower layers (e.g., the distance between the sensor nodes) to reduce the number of the transmitted bits by each node. • The reason is that the nodes close to each other, probably, will measure values similar to each other so it is not needed to send the whole sensed data by each node. • However, the Data Source Coding (DSC) algorithm is used to encode the data by the application layer before sending so the number of the transmitted bits will be less and the bandwidth will be utilized in a better way. • After that, it will be the responsibility of the sink node to combine the received data from different sensor nodes to construct the original sensed value again. MLRR Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2526-Apr-18
  • 27. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS  • BGR  • MLRR  • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2626-Apr-18
  • 28. • The functionality of the network layer in the Grid-based Routing and Aggregator Selection Scheme (GRASS) has been extended to include the aggregation capability, where the cluster heads will aggregate the data coming from the sensor nodes. • Also, the cluster heads will, based on some algorithms, try to find the minimum number of the aggregation points that the packets need to travel before reaching their destinations at the sink to maximize the lifetime of the network and minimize the latency. • The experimental results showed that the lifetime of the network has been increased by 35% when using that approach. GRASS Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2726-Apr-18
  • 29. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS  • BGR  • MLRR  • GRASS  • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2826-Apr-18
  • 30. • The network layer in the Cell-based Energy Density- aware (CEDA) relies on one of the Channel Status Information (CSI) parameters from the lower layers, which is the energy level by adding it as a variable in the routing tables. • This parameter will serve as a weighting factor when routing the data to avoid using the paths that contains nodes with less remaining energy. CEDA Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2926-Apr-18
  • 31. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs  • Classification of Cross-Layer Designs  • EDAS  • BGR  • MLRR  • GRASS  • CEDA  Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 3026-Apr-18
  • 32. CSE 622 Advanced Computer Networks Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 3126-Apr-18