The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
In IEEE 802.11 based wireless mesh network (WMN), a mesh client often finds multiple access points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is proven inefficient as it does not consider many important factors such as channel conditions, AP load, etc. Many alternate solutions have been proposed so far in the literature, but they are all focused on wireless local area network (WLAN) environment. As there are significant differences between WLAN and WMN, all these proposed association mechanisms must be redesigned to fit into WMN environment. This paper studies the AP selection problem in the context of WMN. We critically analyze the existing work and identify technical challenges involved in AP selection problem. This paper also provides directions to design the metrics of AP selection method in WMN.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
In recent years, a wireless sensor network is gaining much more importance due to its immense
contribution in numerous applications. Deployment of sensor nodes that would reduce computation,
minimize cost and gaining high degree of network connectivity is an challenging task. Random deployment
of sensor nodes causes the wireless sensor networks to face topological weaknesses such as communication
bottlenecks, network partitions and sensing holes. These problems lead to uneven energy utilization,
reduction in reliability of network and reduction in network lifetime. Bottleneck detection algorithm is
proposed to identify bottleneck and minimal bottleneck zones in network. Additional sensor node
deployment strategy is used in bottleneck detection algorithm to extend network lifetime. Random
additional sensor node deployment and Targeted additional sensor node deployment are proposed to
enhance network lifetime. Deployment strategies are compared with respect to network parameters such as
throughput, packet delivery fraction and network lifetime.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
In IEEE 802.11 based wireless mesh network (WMN), a mesh client often finds multiple access points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is proven inefficient as it does not consider many important factors such as channel conditions, AP load, etc. Many alternate solutions have been proposed so far in the literature, but they are all focused on wireless local area network (WLAN) environment. As there are significant differences between WLAN and WMN, all these proposed association mechanisms must be redesigned to fit into WMN environment. This paper studies the AP selection problem in the context of WMN. We critically analyze the existing work and identify technical challenges involved in AP selection problem. This paper also provides directions to design the metrics of AP selection method in WMN.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
In recent years, a wireless sensor network is gaining much more importance due to its immense
contribution in numerous applications. Deployment of sensor nodes that would reduce computation,
minimize cost and gaining high degree of network connectivity is an challenging task. Random deployment
of sensor nodes causes the wireless sensor networks to face topological weaknesses such as communication
bottlenecks, network partitions and sensing holes. These problems lead to uneven energy utilization,
reduction in reliability of network and reduction in network lifetime. Bottleneck detection algorithm is
proposed to identify bottleneck and minimal bottleneck zones in network. Additional sensor node
deployment strategy is used in bottleneck detection algorithm to extend network lifetime. Random
additional sensor node deployment and Targeted additional sensor node deployment are proposed to
enhance network lifetime. Deployment strategies are compared with respect to network parameters such as
throughput, packet delivery fraction and network lifetime.
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...chokrio
Radio frequency identification (RFID) and wireless sensor networks are two important wireless technologies which have a wide variety of applications in current and in future systems. By integration of these technologies, it is
feasible to improve the operating functionalities. In the heterogeneous network, the need to apply the balancing of
energy consumption across all nodes is very important to prevent the death of those nodes and thereafter increase the lifetime of the network .The most part of the network energy is consumed in the localization and in the communication stages, when nodes are sending HELLO packet, this energy can be recovered by implementing a passive RFID circuit in each node. This approach extends the network lifetime and increase the number of packet messages sent to the base station. Computer simulation in MATLAB with different scenarios comparison shows that the proposed method presents an efficient solution to enhance the energy network performance.
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
Bump localization of wireless sensor network is a hot topic, but present algorithms of 3D wireless sensor node localization arenot accurate enough. In this paper, the DR-MDS algorithm is proposed, DR-MDS algorithm mainly calibrates the coordinatesof nodes and the ranging of nodes based on multidimensional scaling, it calculates the distance between any nodes exactlyaccording to the hexahedral measurement, introducing a modification factor to calibrate the measuring distance by ReceivedSignal Strength Indicator (RSSI). Results of simulation show that DR-MDS algorithm has significant improvement inlocalization accuracy compare with MDS-MAP algorithm.
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...chokrio
The major challenge for wireless sensor networks is energy consumption minimization. Wireless transmission consumes much more of energy. In the clustered network, a few nodes become cluster heads which causes the energetic heterogeneity. Therefore the behavior of the sensor network becomes very unstable. Hence, the need to apply the balancing of energy consumption across all nodes of the heterogeneous network is very important to prevent the death of those nodes and thereafter increase the
lifetime of the network. DEEC (Distributed Energy Efficient Clustering) is one of routing protocols
designed to extend the stability time of the network by reducing energy consumption. A disadvantage of
DEEC, which doesn’t takes into account the cluster size and the density of nodes in this cluster to elect the
cluster heads. When multiple cluster heads are randomly selected within a small area, a big extra energy
loss occurs. The amount of lost energy is approximately proportional to the number of cluster heads in this
area. In this paper, we propose to improve DEEC by a modified energy efficient algorithm for choosing
cluster heads that exclude a number of low energy levels nodes due to their distribution density and their
dimensions area. We show by simulation in MATLAB that the proposed approach increases the number of
received messages and prolong the lifetime of the network compared to DEEC. We conclude by studying
the parameters of heterogeneity that proposed technique provides a longer stability period which increases
by increasing the number of nodes which are excluded from the cluster head selection.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONIAEME Publication
Secured communications in the presence of eavesdropper node is grave for the successful operations in the wireless relay networks. In the proposed work, choose two hop wireless relay networks to enhance security against the eavesdropper node. This paper considers four node networks, they are one source, and three decode and forward relay, one destination and one eavesdropper node. To transmit the information from source to relay node, eavesdropper interrupt and try to capture that relay node messages. To prevent the eavesdropper interception, destination sends artificial jamming noise to the relay node. This jamming noise has the ability to jam the eavesdropper node. According to the channel state information present at the destination, the four types of jamming power allocation methods are introduced; (i) Fixed jamming power allocation, (ii) Rate optimal power allocation, (iii) Outage optimal power allocation, (iv) Statistical optimal power allocation method. The maximum achievable data rate at the destination is also estimated.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
A wireless sensor network consists of severalsensor nodes. Sensor nodes collaborate to collect meaningful environmental information and send them to the base station. During these processes, nodes are prone to failure, due to the energy depletion, hardware or software failure, etc. Therefore, fault tolerance and energy efficiency are two important objectives for reliable packet delivery. To address these objectives a novel method called fuzzy informer homed routing protocol is introduced. The proposed method tries to distribute the workload between every sensor node. A fuzzy logic approach is used to handle uncertainties in cluster head communication range estimation. The simulation results show that the proposed method can significantly reduce energy consumption as compared with IHR and DHR protocols. Furthermore, results revealed that it performs better than IHR and DHR protocols in terms of first node dead and half of the nodes alive, throughput and total remaining energy. It is concluded that the proposed protocol is a stable and energy efficient fault tolerance algorithm for wireless sensor networks.
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...ijgca
In order to effectively analyze or evaluate the performance of Wireless Local Area Networks (WLANs), it is important to identify what types of network settings can cause bad performance in the network when analyzing poor network performance, there is an important factor which is responsible for poor performance is when a number of users may obtain a much larger share of the available bandwidth in access point in a limited boundary as provided in the concept of cell breathing technique. In this paper, we proposed a new concept in which we can set bandwidth limitation so that no user can access data more than the specified limit for a particular access point. In this way the different users will get an efficient access over the network.
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
In this article, we employ two distinct methods to derive simple closed-form approximations for the
statistical expectations of the positive integer powers of Gaussian probability integral Eg [Qp ( bWg )]
with
respect to its fading signal-to-noise ratio (SNR) g random variable. In the first approach, we utilize the
shifting property of Dirac delta function on three tight bounds/approximations for Q(.) to circumvent the
need for integration.
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...IJCNC
Network configuration is the assignment of network parameters necessary for a device to integrate the
network, examples being: an IP address, netmask, the IP address of the gateway, etc ... In the case of
Mobile Ad hoc NETworks (MANETs), the connectivity of nodes is highly dynamic and a central
administration or configuration by the user is very difficult. This paper presents an autoconfiguration
solution for ad hoc networks running the widely implemented version of OLSR routing protocol, the 2003
RFC 3626 [1]. This solution is based on an efficient Duplicate Address Detection (DAD) algorithm,
which takes advantage of the genuine optimization of the OLSR routing protocol. The proposed
autoconfiguration algorithm is proved to operate correctly in a multiple interfaces OLSR network.
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...chokrio
Radio frequency identification (RFID) and wireless sensor networks are two important wireless technologies which have a wide variety of applications in current and in future systems. By integration of these technologies, it is
feasible to improve the operating functionalities. In the heterogeneous network, the need to apply the balancing of
energy consumption across all nodes is very important to prevent the death of those nodes and thereafter increase the lifetime of the network .The most part of the network energy is consumed in the localization and in the communication stages, when nodes are sending HELLO packet, this energy can be recovered by implementing a passive RFID circuit in each node. This approach extends the network lifetime and increase the number of packet messages sent to the base station. Computer simulation in MATLAB with different scenarios comparison shows that the proposed method presents an efficient solution to enhance the energy network performance.
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
Bump localization of wireless sensor network is a hot topic, but present algorithms of 3D wireless sensor node localization arenot accurate enough. In this paper, the DR-MDS algorithm is proposed, DR-MDS algorithm mainly calibrates the coordinatesof nodes and the ranging of nodes based on multidimensional scaling, it calculates the distance between any nodes exactlyaccording to the hexahedral measurement, introducing a modification factor to calibrate the measuring distance by ReceivedSignal Strength Indicator (RSSI). Results of simulation show that DR-MDS algorithm has significant improvement inlocalization accuracy compare with MDS-MAP algorithm.
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...chokrio
The major challenge for wireless sensor networks is energy consumption minimization. Wireless transmission consumes much more of energy. In the clustered network, a few nodes become cluster heads which causes the energetic heterogeneity. Therefore the behavior of the sensor network becomes very unstable. Hence, the need to apply the balancing of energy consumption across all nodes of the heterogeneous network is very important to prevent the death of those nodes and thereafter increase the
lifetime of the network. DEEC (Distributed Energy Efficient Clustering) is one of routing protocols
designed to extend the stability time of the network by reducing energy consumption. A disadvantage of
DEEC, which doesn’t takes into account the cluster size and the density of nodes in this cluster to elect the
cluster heads. When multiple cluster heads are randomly selected within a small area, a big extra energy
loss occurs. The amount of lost energy is approximately proportional to the number of cluster heads in this
area. In this paper, we propose to improve DEEC by a modified energy efficient algorithm for choosing
cluster heads that exclude a number of low energy levels nodes due to their distribution density and their
dimensions area. We show by simulation in MATLAB that the proposed approach increases the number of
received messages and prolong the lifetime of the network compared to DEEC. We conclude by studying
the parameters of heterogeneity that proposed technique provides a longer stability period which increases
by increasing the number of nodes which are excluded from the cluster head selection.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONIAEME Publication
Secured communications in the presence of eavesdropper node is grave for the successful operations in the wireless relay networks. In the proposed work, choose two hop wireless relay networks to enhance security against the eavesdropper node. This paper considers four node networks, they are one source, and three decode and forward relay, one destination and one eavesdropper node. To transmit the information from source to relay node, eavesdropper interrupt and try to capture that relay node messages. To prevent the eavesdropper interception, destination sends artificial jamming noise to the relay node. This jamming noise has the ability to jam the eavesdropper node. According to the channel state information present at the destination, the four types of jamming power allocation methods are introduced; (i) Fixed jamming power allocation, (ii) Rate optimal power allocation, (iii) Outage optimal power allocation, (iv) Statistical optimal power allocation method. The maximum achievable data rate at the destination is also estimated.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
A wireless sensor network consists of severalsensor nodes. Sensor nodes collaborate to collect meaningful environmental information and send them to the base station. During these processes, nodes are prone to failure, due to the energy depletion, hardware or software failure, etc. Therefore, fault tolerance and energy efficiency are two important objectives for reliable packet delivery. To address these objectives a novel method called fuzzy informer homed routing protocol is introduced. The proposed method tries to distribute the workload between every sensor node. A fuzzy logic approach is used to handle uncertainties in cluster head communication range estimation. The simulation results show that the proposed method can significantly reduce energy consumption as compared with IHR and DHR protocols. Furthermore, results revealed that it performs better than IHR and DHR protocols in terms of first node dead and half of the nodes alive, throughput and total remaining energy. It is concluded that the proposed protocol is a stable and energy efficient fault tolerance algorithm for wireless sensor networks.
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...ijgca
In order to effectively analyze or evaluate the performance of Wireless Local Area Networks (WLANs), it is important to identify what types of network settings can cause bad performance in the network when analyzing poor network performance, there is an important factor which is responsible for poor performance is when a number of users may obtain a much larger share of the available bandwidth in access point in a limited boundary as provided in the concept of cell breathing technique. In this paper, we proposed a new concept in which we can set bandwidth limitation so that no user can access data more than the specified limit for a particular access point. In this way the different users will get an efficient access over the network.
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
In this article, we employ two distinct methods to derive simple closed-form approximations for the
statistical expectations of the positive integer powers of Gaussian probability integral Eg [Qp ( bWg )]
with
respect to its fading signal-to-noise ratio (SNR) g random variable. In the first approach, we utilize the
shifting property of Dirac delta function on three tight bounds/approximations for Q(.) to circumvent the
need for integration.
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...IJCNC
Network configuration is the assignment of network parameters necessary for a device to integrate the
network, examples being: an IP address, netmask, the IP address of the gateway, etc ... In the case of
Mobile Ad hoc NETworks (MANETs), the connectivity of nodes is highly dynamic and a central
administration or configuration by the user is very difficult. This paper presents an autoconfiguration
solution for ad hoc networks running the widely implemented version of OLSR routing protocol, the 2003
RFC 3626 [1]. This solution is based on an efficient Duplicate Address Detection (DAD) algorithm,
which takes advantage of the genuine optimization of the OLSR routing protocol. The proposed
autoconfiguration algorithm is proved to operate correctly in a multiple interfaces OLSR network.
Improving Quality of Service and Reducing Power Consumption with WAN accele...IJCNC
The widespread use of cloud computing services is expected to deteriorate a Quality of Service and
toincrease the power consumption of ICT devices, since the distance to a server becomes longer than
before. Migration of virtual machines over a wide area can solve many problems such as load balancing
and power saving in cloud computing environments
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
The trust and reputation models were introduced to restrain the impacts caused by rational but selfish
peers in P2P streaming systems. However, these models face with two major challenges from dishonest
feedback and strategic altering behaviors. To answer these challenges, we present a global trust model
based on network community, evaluation correlations, and punishment mechanism. We also propose a
two-layered overlay to provide the function of peers’ behaviors collection and malicious detection.
Furthermore, we analysis several security threats in P2P streaming systems, and discuss how to defend
with them by our trust mechanism. The simulation results show that our trust framework can successfully
filter out dishonest feedbacks by using correlation coefficients. It can effectively defend against the
security threats with good load balance as well.
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
Personalization and adaptation to the user profile capability are the hottest issues to ensure ambient
assisted living and context awareness in nowadays environments. With the growing healthcare and
wellbeing context aware applications, modeling security policies becomes an important issue in the
design of future access control models. This requires rich semantics using ontology modeling for the
management of services provided to dependant people. However, current access control models remain
unsuitable due to lack of personalization, adaptability and smartness to the handicap situation.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
A Review Paper on Energy Capable Routing in Wireless Sensor Networkijtsrd
This day’s wireless sensor networks draw the attention of researchers more due to their admired applications in environment monitoring systems, radiation uses and nuclear threat detection applications weapon sensors for ships battlefield reconnaissance and surveillance military power, control mechanism, intelligence centre, communications and targeting systems and biomedical applications. Wireless sensor network provides cheap cost solution to various world problems. Sensors are low cost devices with limited storage, computational power systems. Several security mechanisms for sensor network must be energy efficient as security is the major concerned when they will be used in large scale as sensors have limited power and computational capability and should not be computational intensive. In this review paper we study the various energy efficient secure routing methods for WSN. Prof. Pooja | Prof. Sakena Benazer. S | Prof. Ajay Kumar "A Review Paper on Energy Capable Routing in Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49546.pdf Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/49546/a-review-paper-on-energy-capable-routing-in-wireless-sensor-network/prof-pooja
The performance of wireless sensor network (WSN)
can be effect by interference. The many devices in network
capable of causing interference and this can cause dropping
packets or block the transmission channel. In this paper we study
how manage the interference in WSN. This managing can be
done by flow control and power level control. We used
heterogeneous collaborative network nodes like PIC
microcontroller, ARM microcontroller and Personal Computer
(PC) to build our network. Also we assign priority level for each
node to allow the node with high priority to manage the flow and
power level of other node within same network and same used
channel. The time synchronization required due to different
nodes used. The protocol used for time synchronization is
Timing-sync Protocol for Sensor Networks (TPSN).
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...ijmnct
Wireless Sensor Networks are consist of small battery powered devices with limited energy resources.Once
deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy
source is not feasible. Hence, one of the most important issues that need to be enhanced in order to
improve the life span of the network is energy efficiency. to overcome this demerit many research have
been done. The clustering is the one of the representative approaches. In this paper, we introduce a
dynamic clustering algorithm using Fuzzy Logic and genetic algorithm. In fact, using fuzzy system design
and system optimization by genetic algorithm is presented approach to select the best cluster head in
sensor networks. Using random data set has been addressed to evaluate of fuzzy-genetic system presented
in this paper and finally, MSE rate or mean error of sending the messages using proposed fuzzy system in
comparison with LEACH method is calculated in select the cluster head. The results of evaluations is
representative of a reduction the MSE metric in proposed method in comparison with LEACH method for
select the cluster head. Reduce of MSE directly is effective on energy consumption and lifetime of wireless
sensor network and can cause the reduce energy consumption and increase network lifetime.
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksIJRES Journal
In this paper, we focus on improving wireless networks survivability in terms of increasing network lifetime and its energy efficiency via clustering the network in an efficient way. Clustering the network is the procedure of partitioning it into groups, where each of them is known as a cluster. Each cluster elects the station with the highest power to be a cluster head. The remaining stations follow the nearest cluster head. Instead of having each station sends its packets to a remote receiver, the cluster head receives packets from all stations within its cluster, aggregates them, and forwards the resulting packets to the remote receiver. The most significant benefit of clustering the network that we focus on is to decrease distances between sending and receiving stations, which in turn reduces the transmission energy. This reduction in the energy yields an increase in the network lifetime and its survivability.
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
The Wireless Sensor Networks (WSN) is
considered to be one of the most promising emerging
technologies. However one of the main constraints which
is holding back its wide range of applications is the
battery life of the sensor node and thus effecting the
network life. A new approach to this problem has been
presented in this paper. The proposed method is suitable
for event driven applications where the event occurrence
is very rare. The system uses spread spectrum as a means
of communication.
Scheduling different types of packets, such as
real-time and non-real-time data packets, at sensor nodes with
resource constraints in Wireless Sensor Networks (WSN) is of
vital importance to reduce sensors’ energy consumptions and endto-end
data transmission delays. Most of the existing packetscheduling
mechanisms of WSN use First Come First Served
(FCFS), non pre-emptive priority and pre-emptive priority
scheduling algorithms. These algorithms incur a high processing
overhead and long end-to-end data transmission delay due to the
FCFS concept, starvation of high priority real-time data packets
due to the transmission of a large data packet in non pre-emptive
priority scheduling, starvation of non-real-time data packets due
to the probable continuous arrival of real-time data in preemptive
priority scheduling, and improper allocation of data
packets to queues in multilevel queue scheduling algorithms.
Moreover, these algorithms are not dynamic to the changing
requirements of WSN applications since their scheduling policies
are predetermined.
In the Advanced Multilevel Priority packet scheduling
scheme, each node except those at the last level has three levels of
priority queues. According to the priority of the packet and
availability of the queue, node will schedule the packet for
transmission. Due to separated queue availability, packet
transmission delay is reduced. Due to reduction in packet
transmission delay, node can goes into sleep mode as soon as
possible. And Expired packets are deleted at the particular node
at itself before reaching the base station, so that processing
burden on the node is reduced. Thus, energy of the node is saved.
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKSIJCNC
Most studies define a common duty cycle value throughout the wireless sensor networks (WSNs) to
achieve synchronization among the nodes. On the other hand, a few studies proposed adaptation of the
duty cycle according to uniform traffic conditions to decrease the energy consumption and latency. In
this paper, the lifetime of the nodes based on overall energy consumption are estimated and the effect of
duty cycle on expected energy consumption is studied. The proposed scheme is compared with a standard
scheme and is shown to perform significantly better for sufficient node density.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Bottleneck Detection Algorithm to Enhance Lifetime of WSNjosephjonse
In recent years, a wireless sensor network is gaining much more importance due to its immense contribution in numerous applications. Deployment of sensor nodes that would reduce computation, minimize cost and gaining high degree of network connectivity is an challenging task. Random deployment of sensor nodes causes the wireless sensor networks to face topological weaknesses such as communication bottlenecks, network partitions and sensing holes. These problems lead to uneven energy utilization, reduction in reliability of network and reduction in network lifetime. Bottleneck detection algorithm is proposed to identify bottleneck and minimal bottleneck zones in network. Additional sensor node deployment strategy is used in bottleneck detection algorithm to extend network lifetime. Random additional sensor node deployment and Targeted additional sensor node deployment are proposed to enhance network lifetime. Deployment strategies are compared with respect to network parameters such as throughput, packet delivery fraction and network lifetime.
Bottleneck Detection Algorithm to Enhance Lifetime of WSNjosephjonse
In recent years, a wireless sensor network is gaining much more importance due to its immense contribution in numerous applications. Deployment of sensor nodes that would reduce computation, minimize cost and gaining high degree of network connectivity is an challenging task. Random deployment of sensor nodes causes the wireless sensor networks to face topological weaknesses such as communication bottlenecks, network partitions and sensing holes. These problems lead to uneven energy utilization, reduction in reliability of network and reduction in network lifetime. Bottleneck detection algorithm is proposed to identify bottleneck and minimal bottleneck zones in network. Additional sensor node deployment strategy is used in bottleneck detection algorithm to extend network lifetime. Random additional sensor node deployment and Targeted additional sensor node deployment are proposed to enhance network lifetime. Deployment strategies are compared with respect to network parameters such as throughput, packet delivery fraction and network lifetime.
Similar to PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGBEE WIRELESS SENSOR NETWORKS (20)
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGBEE WIRELESS SENSOR NETWORKS
1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
PREDICTING COMMUNICATION DELAY AND
ENERGY CONSUMPTION FOR IEEE
802.15.4/ZIGBEE WIRELESS SENSOR NETWORKS
Sofiane Ouni1 and Zayneb Trabelsi Ayoub2
1
National Institute of Applied Sciences and Technology (INSAT),Tunisia
Sofiane.ouni@insat.rnu.tn
2
University of Manouba, National School of Computer Science (ENSI), RAMSIS-
CRISTAL, Tunisia
trabelsizayneb@yahoo.fr
ABSTRACT
The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
KEYWORDS
Wireless Sensor Networks, IEEE 802.15.4, ZigBee, energy consumption, communication delay.
1. INTRODUCTION
Wireless Sensor Network (WSN) is deployed in many fields such as health care, environment
control, intelligent, buildings, etc. It consists of a set of small and low-power devices called
sensor nodes which interacts with their environment to sense physical phenomena. After being
deployed on the area to monitor, these nodes are capable of local processing, communication
and self-organization. In fact, they collect environmental information and work together to
transmit the data to one or more collection points (sinks) in an autonomous manner. The IEEE
802.15.4/Zigbee standard [14] aims to allow the interconnection of wireless devices with low
autonomy (battery powered) and does not require high bit rate, this standard represents an ideal
candidate for wireless sensor networks.
WSNs must operate at least for a given mission time, and simultaneously replacing nodes’
batteries is often impossible. Hence, the lifetime prediction for WSNs becomes a major concern.
For a reliable lifetime prediction, a complete energy consumption analysis is necessary.
Accordingly, it should consider the most important sources of energy consumption, namely
transmitting and receiving data packets, listening to the channel, transmitting, receiving control
packets and receiving packets from neighbours.
DOI : 10.5121/ijcnc.2013.5110 141
2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
Furthermore, applying Wireless Sensor Networks in real-time context needs to predict the
communication delay to meet given real-time constraints.
In this paper, we propose an analytical model based on IEEE 802.15.4 WSNs parameters. The
energy consumption and the communication delay analysis are developed to predict the lifetime
and the real-time constraints respect. Our model aims to give a realistic analysis in order to
predict the network validity.
The reminder of the paper is organized as follows. Section 2 briefly describes IEEE 802.15.4
networks. In Section 3, we present the main related works according to energy consumption and
communication delay analysis. Then, our proposed analytical model is presented in Section 4,
where we give a complete and detailed energy consumption analysis. In Section 5, we present
our analysis to determine the communication delay. The performance evaluation is given in
Section 6. In the final section, we present the conclusions.
2. IEEE 802.15.4 NETWORKS
The IEEE 802.15.4 standard [7] was originally designed for personal area networks. Its
application fields expand and diversify to touch wireless sensor networks thanks to several
features. In fact, the IEEE 802.15.4 defines characteristics of the physical and data link layers
for LR-WPAN (Low Rate Wireless Personal Area Network). The standard aims to allow the
interconnection of wireless devices with low autonomy (battery powered) and does not require
high bit rate.
2.1. Devices
There are essentially two types of device that can participate in IEEE 802.15.4 based networks
which are the FFDs (Full-Function Devices) and the RFDs (Reduced-Function Devices). The
FFD can operate in three modes serving as a personal area network coordinator (PAN
coordinator), a coordinator, or a device. While a RFD can only be terminal equipment because it
does not accept the association of other network devices and is usually placed at the end of the
network. The PAN coordinator might often be mains powered, while the devices will most
likely be battery powered.
2.2. Network topologies
The IEEE 802.15.4 based networks can operate in two topologies: the star topology or peer-to-
peer topology. In the star topology, the communication is established between devices and a
single central controller, called the PAN coordinator (considered as sink node). In peer-to-peer
topology, nodes can communicate directly without going through the PAN coordinator. This
topology allows for more complex networks because it allows the interconnection of multiple
networks.
An example of the use of the peer-to-peer communications topology is the cluster tree which is
used primarily in wireless sensor networks. In a cluster tree network, most devices are FFDs and
only the leaf devices at the ends of the network are RFDs. The PAN coordinator forms the first
cluster by choosing an unused PAN identifier then starts broadcasting beacon frames to its
neighbours. By receiving the beacon frame, a candidate device wishing to join the network
sends an association request to the PAN coordinator. If he accepts, he will add the new device
as his child in its neighbours list. Therefore, the new device adds the PAN coordinator as his
parent in its neighbour list. As the PAN coordinator, the new joined device begins transmitting
periodic beacons and receiving association requests to allow other nodes to associate and to join
the network.
142
3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
3. RELATED WORKS: ENERGY CONSUMPTION AND DELAY
ANALYSIS
Extending the network lifetime is a common objective of sensor networks research, since a
sensor node has usually a limited energy source and is assumed to be disposed once it’s out of
battery.
The authors in [1, 2, 4, 6] analyzed the network lifetime for wireless sensor networks. The
authors in [1, 6] considered that the energy cost of a node is the ratio of the total energy
consumed over the initial battery energy. Thus, the total energy consumed by a node during the
network lifetime should be less than its initial energy. According to this model, the total energy
consumed includes the energy spent in transmission and reception of packets, sleeping and
sensing. Thereby, they ignored significant sources of energy waste such as packet control
overhead and collisions due to interference. The authors in [2, 4] considered that the lifetime of
a node is the ratio of the initial amount of energy over the total consumed energy. Thus,
maximizing the network lifetime means maximizing the lifetime of the greediest node in the
network in term of energy consumption. However, the model proposed in [2] didn’t take into
account the amount of energy spent in retransmission of unsuccessful packets, which is a very
important source of energy waste especially in the case of heavy traffic. The model proposed in
[4] considered the energy waste due to retransmissions but didn’t propose an analytical model to
calculate the probability of unsuccessful transmission. Furthermore, the above mentioned
studies didn’t consider neither the amount of energy spent in overhearing nor the specificity of
IEEE 802.15.4 sensor networks.
Concerning the communication delay analysis and prediction, most of the works [17, 18]
interested on the GTS mode to predict the communication delay. So, in [17] use the (guaranteed
time slots) GTS mode to get a stochastic model for guaranteed communication delay. Being
optional, it is activated upon request from a node to the PAN Coordinator for allocating
Guaranteed Time Slots (GTS) depending on the node's requirements. The inconvenient of this
mode is the limit number of slots to reserve and it is a centralized medium access with high
latency. For the CSMA/CA medium access, works are incomplete to get realistic context. For
example, the paper [16] gives a simple analysis which not considers the interferences and
transmission errors. It defines the transmission delay according to the frames lengths without
the medium access control latency.
Hence, we are interested to propose a realistic analytical model to predict lifetime and
communication delay in IEEE 802.15.4 sensor networks with better consideration to the
networks and protocols features.
4. ENERGY ANALYTICAL MODEL
The main sources of energy consumption for a sensor node are:
• Transmitting and receiving packets.
• Overheads due to control packets: since control packets don’t contain data, they are
considered as overheads.
• Collisions: if a collision occurs, nodes must retransmit the same data so they consume
more energy.
• Overhearing: when a node picks up packets that are destined to other nodes, it
consumes more energy.
• Idle listening: listening to receive possible traffic can increase energy consumption.
• Depending on these resources, we get the parameters to estimate the delay and the
energy.
143
4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
4.1. Energy consumption and lifetime
Actually, the definition of the network lifetime depends on the application at hand. Indeed, it
can be considered as [9]:
• The time until the first node fails (runs out of energy).
• The time until the network is disconnected in two or more partitions.
• The time until 50% of failed nodes.
• The moment when the first time a point in the observed area is no longer covered by at
least a sensor node.
In all these cases, the lifetime is strongly dependent on residual energy. Accordingly, we focus
on the energy consumption of nodes to evaluate their lifetime and consequently network
lifetime. In our model, we assume the following properties:
1) Based on [6], the energy cost Ci (t) of a node Ni at time t is the ratio of the total energy
consumed at time t over the initial battery energy. It can be expressed as follows:
Consumed _ Energy(t )
Ci (t ) = (1)
Initial _ Energy
2) Since energy levels are initially given with different values, we would like to normalize the
calculation of the energy cost in the interval [0, 1]:
• Ci (t ) = 0 means that the battery of the node Ni at time t is full.
• Ci (t ) = 1 means that the battery of the node Ni at time t is depleted.
3) If the energy cost of the greediest node in term of energy reaches the value 1 at time t, we
note that its battery is exhausted and this moment represents the network lifetime:
Lifetime = t / Max (Ci (t )) = 1 (2)
i∈network _ nodes
In what follows, we will present our analytical model to predict the network lifetime. First, we
will give energy consumption basic equations. Second, to propose a more realistic analytical
model, we will consider an unreliable network. Third, we will consider, in our analysis, the
main sources of energy consumption, namely overheads, idle-listening and overhearing.
4.2. Energy consumption basic equations
We consider that total energy consumed in unit time (equation 3) includes the energy spent in
transmission (noted: Etx) and reception (noted: Erx) of data packets, in transmission and
reception of control packets (noted: Eoverhead), in listening to the channel (noted: Eidle) and in
reception of neighbours’ packets (noted: Eoverhearing).
Consumed _ Energy = Etx + Erx + Eoverhead + Eidle + Eoverhrearing (3)
Since each sensor node can generate its own traffic and forward traffic of other nodes, the
energy spent by a node Ni in packet transmission in time interval [0, t] can be computed as the
sum of the amount of energy consumed in sending its own traffic, in forwarding traffic of other
nodes and in sending acknowledgements related to received packets to be forwarded (4).
(
Etxi (t ) = t ⋅ P ⋅ (TtransPkt ⋅ ( gi + fi ) ) + (TtransAck ⋅ fi )
tx ) (4)
where Ptx is the power consumption in transmitting one packet, TtransPkt is the transmission
time of a data packet, TtransAck is the transmission time of an acknowledgement, gi is the
packet generation rate (packet/second) for a node Ni and fi is the packet forwarding rate
(packet/second) by a node Ni. Similarly, the energy spent by a node Ni in packet reception in
time interval [0, t] can be expressed as follows:
144
5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
(
Erxi (t) = t ⋅ P ⋅ (TtransPkt ⋅ fi ) + (TtransAck ⋅ ( gi + fi ) )
rx ) (5)
where Ptx is the power consumption in receiving one packet, TtransPkt is the transmission time
of a data packet, TtransAck is the transmission time of an acknowledgement, gi is the packet
generation rate (packet/second) for a node Ni and fi is the packet forwarding rate
(packet/second) by a node Ni.
4.3. Unreliable network issue
In CSMA/CA based networks, the packet transmission may fail due to several factors such as
collisions, channel errors, etc. Therefore, we assume that we have Nc which is the average
number of failed transmissions of a packet before being successfully transmitted. For IEEE
802.15.4, a maximum of retransmission is defined to be under aMaxFrameRetries after which
the protocol terminates and a communications failure is issued [7]. Based on [4], the number
Nc for a node Ni can be expressed as follows:
β ( Ni )
Nc( N i ) = (6)
1 − β ( Ni )
Where β ( N i ) denotes the probability of unsuccessful transmission for a node Ni. To
compute β ( N i ) , we should consider the collision probability noted Pcollision ( N i ) and the packet
error probability noted Perror ( Ni ) for a node Ni (7).
β ( N i ) = Pcollision ( Ni ) + Perror ( N i ) (7)
The collision probability for a node Ni is essentially due to interference from other nodes. If we
define by H(Ni) the set of nodes located in the neighbourhood of the node Ni. We prove that the
interference probability for this node Ni with its neighbours is:
pcollision (Ni ) =1− (1−TtransPkti ⋅ (gi + fi ) + ∑ TtransPkt j ⋅ (g j + f j ))2 (8)
j∈H(i )
Where TtransPkti is the transmission time of a data packet sent by a node Ni, gi is the packet
generation rate (packet/second) for a node Ni, fi is the packet forwarding rate (packet/second)
by a node Ni. As for the packet error probability for a node Ni, it can be expressed as follows:
Perror ( Ni ) = BER ⋅ PKt size (9)
Where BER (Bit Error Rate) value is roughly 10-4 [5] and PKtsize is the size of the considered
packet. Hence, considering the average number of failed transmissions ( Nc ), the expression (4)
of the energy spent in packet transmission in time interval [0, t] becomes:
(( )
Etxi (t ) = t ⋅ P ⋅ Nc( Ni ) + 1 ⋅ (TtransPkt ⋅ ( gi + fi ) ) + (TtransAck ⋅ fi ) )
tx (10)
Similarly, the expression (5) of the energy spent in packet reception in time interval [0, t]
becomes:
(( ) )
Erxi (t ) = t ⋅ Prx ⋅ Nc( Ni ) + 1 ⋅ (TtransPkt ⋅ fi ) + (TtransAck ⋅ ( gi + fi ) ) (11)
4.4. Overheads issue
In addition to the energy spent in transmitting and receiving data packets, the sensor node
consumes energy by sending and receiving control packets such as beacons and command
frames.
Considering that OverheadRate is the average rate of control packets generation, TtransOvPkt is
the transmission time of a control packet, Ptx is the power consumption in transmitting one
145
6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
packet and Prx is the power consumption in receiving one packet, the amount of energy spent
due to overheads in time interval [0, t] can be expressed as follows:
Eoverheadi (t ) = t ⋅ ( OverheadRate ⋅ TtransOvPkt ⋅ ( Ptx + Prx ) ) (12)
4.5. Idle listening issue
The energy spent in listening to the channel is due to the waiting access channel periods.
We adapt listening to the channel equation of [4], which is intended for sensor networks based
on IEEE 802.11 standard, to IEEE 802.15.4 standard. So the expression of the energy spent in
listening to the channel in time interval [0, t] will be:
Eidlei (t ) = NumberPkti (t ) ⋅ CCA ⋅ Pidle ⋅ tslot (13)
Where Pidle is the power consumption in idle state, tslot is the time of a slot, NumberPkt (t ) is the
number of packets arriving before the time t, and CCA is clear channel assessment used by the
station after the backoff to verify if the channel is clear or busy .
4.6. Overhearing issue
It is common that any packet transmitted by a node is received by all its neighbours even though
only one of them is the intended receiver. This phenomenon is called overhearing. So the energy
spent in overhearing depends on the traffic generation and forwarding rates (gk,fk) of neighbours
(H’(Ni)). Thus, from (11) we have:
Eoverhearing (t ) = t ⋅ Prx ⋅ ∑ ( ( Nc( N
k ∈H ′ ( N i )
k ) +1) ⋅ (TtransPKt ⋅ ( g k + f k ) ) + (TtransAck ⋅ f k ) ) (14)
where H’(Ni) is the set of nodes located in the neighbourhood of the node Ni and transmitting
traffic destined to other nodes, Prx is the power consumption in receiving one packet, TtransPkt
is the transmission time of a data packet, TtransAck is the transmission time of an
acknowledgement, gk is the packet generation rate (packet/second) for a node Nk and fk is the
packet forwarding rate (packet/second) by a node Nk.
5. DELAY ANALYTICAL MODEL
In this section, we use a holistic analysis [12, 13, 14, 15] in order to determine the
communication delay or the response time in one hop (noted: Ri for message mi) of the traffics.
The response time is the accumulation of the waiting time in the queue (noted: Wi) and the
service time (noted Ci). Hence:
Ri = C i + Wi (15)
In a network, a message mi waits in the queue during Wi and then will be transmitted according
to medium access protocol duration (as service time) of a Ci time. This response time (noted:
Rik) of message mi is determined according to a node Nk . We can deduce the global response
time (noted: GRik ) of message mi from the node Nk to the sink by the path pathi (set of nodes) :
GRik = Ril ∑
Nl ∈ pathi
(16)
5.1. Basic equations for reliable networks
We assume that all messages have the same size and consequently the same time service.
According to the IEEE 802.15.4 standard [7], the MAC sub-layer needs a period of time to
process data received by the physical layer. To permit this, two successive frames transmitted
from a node must be separated by at least one IFS period. The length of the IFS period depends
on the size of the frame that has just been transmitted. Frames having lengths of up to
146
7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
aMaxSIFSFrameSize shall be followed by a SIFS (short inter-frame spacing) period. Frames
with lengths greater than aMaxSIFSFrameSize shall be followed by a LIFS (long inter-frame
spacing) period. Also according to the standard, the backoff algorithm of the access method
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) has some parameters
fixed by MIB (MAC Information Base). Each node maintains these parameters for each
transmission attempt. The CW (contention window length) is the most important parameter. It
defines the number of backoff periods that need to be clear of activity before the transmission
can begin.
The service time is the sum of the times of backoff, the clear channel assessment (CCA), frame
transmission and reception of acknowledgment after the inter-fame spacing IFS:
C = Tbackoff0 + CCA + TtransPKt + TtransAck + IFS (17)
The average time of the backoff is the half value of the contention window CW to get the
medium access :
CWi
Tbackoffi = ⋅ aUnitBackoffPeriod (18)
2
Where CWi = 2 BE −1 , BEi = macMinBE + i and BEi ≤ aMaxBE the number of backoff stages in the
i
IEEE 802.15.4 standard [7].
For Wk(t) the waiting time in the queue for a message at the instant t, it is defined to be the
cumulative workload for the previous traffics in the queue of the node. So:
W k (t ) = C ⋅ NumberPktk (t ) (19)
Where NumberPkt (t ) is the number of packets arriving before the time t and it depends on the
traffic generation and forwarding rates (gk, fk) at the node Nk of the message mi.
NumberPktk (t ) = t ⋅ g k + δ ( g k ) +
∑
i∈ forwarded _ trafficsk
( t ⋅ f + δ ( f ))
k
i
i (20)
Where δ ( x) is equal to zero if x is equal to zero, otherwise it is equal to 1. f ki is the
traffic forwarded by the node Nk and generated by the source node Ni.
forwarded _ trafficsk is the set of traffics forwarded by the node Nk.
The Wi(t) is a sequence which converges when Wi(l) = l [12] , so Wi = l. At this instant, we can
conclude that the sequence converges and the cumulative workload is finished. A necessary
condition of convergence is:
C ⋅ gk +
∑ f ki ≤ 1
(21)
i∈ forwarded _ trafficsk
5.2. Equations for non reliable networks
In non reliable networks, transmission errors can take place. So, we based our analysis on
the Nc which is the average number of failed transmissions of a packet before being successfully
transmitted (computed from the equation 6). Thus, the service time, the medium access protocol
duration is:
C = TransmissionTime + RetransmissionTime (22)
We consider Nc failed retransmission. So, in each time, the node will spend a backoff of CWi
2
(in average) and wait for the acknowledgement until the time limits macAckWaitDuration [7]
before retransmission.
147
8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
Nc CW
RetransmissionTime = ∑ i
i =0 2
⋅UnitBackoffPeriod + Nc ⋅ macAckWaitDuration (23)
We compute the transmission time as the service time with a backoff related to the Nc
retransmission:
TransmissionTime = Tbackoff Nc + CCA + TtransPKt + TtransAck + IFS (24)
6. PERFORMANCE EVALUATION
Our proposed model is evaluated by using NS-2.31. In our simulations, we consider a network
composed of 16 sensor nodes and 1 sink (PAN coordinator). The nodes are distributed on a 70 x
70 m grid. All sensor nodes are FFDs (Full-Function Devices) except the leaf nodes are RFD
(Reduced-Function Devices). The root of the tree is the PAN coordinator (sink) located in the
upper left corner of the grid (Fig. 1). We also considered a direct transmission mode from leaf
nodes to the sink and a CBR (Constant Bit Rate) traffic with a traffic load up to 1pps (IEEE
802.15.4 maintains a high packet delivery ratio for application traffic up to 1pps [10]). We
considered that the leaf nodes don’t begin their transmissions simultaneously and that they
transmit packets with the same length and with the same rate.
We also considered that the values of power consumption in idle, transmit and receive state are
respectively 712 µW, 31.32 mW and 35.28 mW (according to the study results of Chipcon
CC2420 [3] [8]).
6.1. Network lifetime prediction
According to related works, we define four analysis classes with different assumptions. The first
is the complete analysis model (noted AM). The second is the analysis model not considering
overhearing energy waste (noted: AMwithoutOverhear) which is a similar approach to [2, 4]
works. The third is the analysis model not considering collision due to interference energy waste
(noted AMwithoutInterf). The last is the analysis model not considering overhearing and
collision due to interference energy waste (noted AMwithoutOverInterf) which is a similar
approach to [1, 6] works.
Figure 1. Simulated network tree topology.
The Figure 2 indicates that there is a slight difference between network lifetime predicted by our
analytical model (AM) and that found by NS-2 simulator. This difference is due to the
estimation of different unpredictable overheads. The impact of this phenomenon decreases as
the traffic generated increases, because in the case of heavy traffic, the amount of energy spent
in sending and receiving data packets becomes important relatively to overheads. Hence, more
traffic is increasing more our analytical model (AM) is able to better predict the network
lifetime; such as in the case of a packet generation rate of 1 pps.
148
9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
The Figure 2 indicates also that our complete analytical model (AM) offers better network
lifetime prediction compared with that ignoring overhearing and interference energy waste
(AMwithoutOverInterf) which is a similar approach to [1, 6] works. In addition, our complete
analytical model (AM) predicts network lifetime better than model not considering overhearing
energy waste (AMwithoutOverhear) which is a similar approach to [2, 4] works.
To prove the importance of collision probability due to interference and overhearing energy
consumption in our analytical model, we analyzed the variation of these parameters according to
inter-node distance and packet generation rate (Fig. 3 and Fig. 4) for the greediest node in term
of energy consumption (node 4).
Figure 2. Variation of network lifetime according to packet generation rate.
Fig. 3 (a) shows that the collision probability is important when inter-node distance is reduced.
Indeed, when we reduce inter-node distance, the number of node’s neighbours becomes
important and consequently collision probability rises due to interference between these
neighbours. Fig. 3 (b) shows that collision probability increases relatively to traffic load.
(a)
(b)
Figure 3. Variation of collision probability for the node 4 according to inter-node distance (a)
and packet generation rate (b).
The figure 4 (a) shows that the overhearing energy waste is important when inter-node distance
is reduced. In fact, when nodes are closer to each other, the neighbours’ number of the node 4
149
10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
increases and consequently the amount of energy spent by the node 4 in receiving packets
destined to other nodes grows.
The figure 4 (b) indicates that the overhearing energy waste increases according to the packet
generation rate. Indeed, when the neighbours of the node 4 generate more packets, this node
consumes more energy in receiving these undesirable packets.
(a) (b)
Figure 4. Variation of overhearing energy consumption for the node 4 according to inter-node
distance (a) and packet generation rate (b).
6.2. Communication delay prediction
In this section, we maintained the same simulation parameters mentioned above and we varied
the packet generation rate.
In Table 1, we present the difference between the simulation and the analytical results of
average communication delay according to various packet generation rates and bit error rates
(BER). Table 1 shows that our analytical model results are close to simulation results. We can
also observe that the difference between the simulation and the analytical results of average
delay tends to zero when the BER decreases. This is due essentially to the reduced iner-node
distance used in simulation ensuring a low BER. Table 1 indicates also that our analytical model
results are close to simulation results if the packet generation rate increases. This interpretation
proves that our analytical model considers well the time in the queue which will be correctly
estimated for heavy traffic.
Table 1. |AnalyticalDelay-SimulationDelay| according to packet generation rate and BER.
Packet generation rate (pps) 1/10 1/9 1/8
BER
0 0,019363 s 0,017394 s 0,009457 s
0,0001 0,0529 s 0,051 s 0,024 s
0,0007 0,87 s 0,8681 s 0,841258 s
0,0008 1,111 s 1,109 s 1,082518 s
7. CONCLUSION
Wireless sensor networks should maintain a balance between the network lifetime and the real-
time requirements. In this paper, we proposed a complete analytical model to predict the
lifetime and the communication delay for IEEE 802.15.4 wireless sensor networks. In fact, our
model considers the most important sources of energy waste and communication latency,
150
11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
namely packet retransmissions, overhearing, collisions due to interference, idle listening and
overheads. We computed the average number of failed transmissions according to collision and
packet error probabilities. The overhearing was estimated relatively to the sum of neighbours’
traffics. The idle listening was computed to be the energy spent in backoff and inter-frame
spacing waiting periods. The overheads are globally estimated according to the average rate
generation of control packets. All these parameters contribute to a realistic prediction of the
network lifetime and the delay.
Based on NS-2 simulations, performance evaluation shows that our energy analytical model
predicts the network lifetime better than other approaches ignoring the energy waste caused by
overhearing and collisions due to interference. Our analysis proves also the importance of these
two parameters especially in the case of small inter-node distance and heavy traffic cases. In
communication delay concern, performance evaluation proves that our delay analytical model
gives a reliable prediction of the average delay especially in the case of an increasing packet
generation rate and a low bit error rate.
REFERENCES
[1] Sofiane Ouni, Salsabil Gherairi, Farouk Kamoun, “Real-time quality of service with delay guarantee
in sensor networks”, International Journal of Sensor Networks, Volume 9 Issue 1, 2011.
[2] F. Bouabdallah, N. Bouabdallah, “The Tradeoff Between Maximizing the Sensor Network Lifetime
and the Fastest Way to Report Reliably an Event Using Reporting Nodes’ Selection”, Computer
Communications Journal (Elsevier), Vol. 31, Issue 9, pp. 1763 – 1776, June 2008.
[3] B. Gao, C. He, “An Individual Beacon Order Adaptation Algorithm for IEEE 802.15.4 Networks”,
in Proceedings of IEEE International Conference on Communications Systems, November 2008.
[4] F. Othman, N. Bouabdallah, R. Boutaba, “Load-Balanced Routing Scheme for Energy-Efficient
Wireless Sensor Networks”, IEEE GLOBECOM 2008, New Orleans, LA, USA, December 2008.
[5] K. Shuaib, M. Alnuaimi, M. Boulmalf, I. Jawhar, F. Sallabi, A. Lakas, “Performance Evaluation of
IEEE 802.15.4: Experimental and Simulation Results,” Journal of Communications, V2, No.4, pp.
29-37, June 2007.
[6] S. C. Ergen, P. Varaiya, “Energy Efficient Routing with Delay Guarantee for Sensor Networks”,
ACM Wireless Networks Journal, 13(5):679-690, October 2007.
[7] IEEE-TG15.4 (2006), “Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer
(PHY) specifications for low-rate Wireless Personal Area Networks (LR-WPANs)”, IEEE standard
for information technology, 2006.
[8] B. Bougard, F. Catthoor, D. C. Daly, A. Chandrakasan, and W. Dehaene, “Energy Efficiency of the
IEEE 802.15.4 Standard in Dense Wireless Microsensor Networks: Modeling and Improvement
Perspectives”, in Proc. Design, Autom., and Test in Euro. Conf. and Exhib. (DATE’05), pp.196-201,
March 2005.
[9] H. Karl, A. Willig, “Protocols and architectures for Wireless Sensor Networks”, Wiley, 2005.
[10] J. Zheng, M.J. Lee, “A Comprehensive Performance Study of IEEE 802.15.4”, In: Sensor Network
Operations, pp. 218-237. IEEE Press, Los Alamitos 2004.
[11] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ISO/IEC
IEEE 802.11 Standard, 1999.
[12] J.A. Stankovic, M. Spuri, K. Ramamritham, G.C. Buttazzo, Deadline Scheduling for Real-Time
Systems, Kluwer Academic Publisher, 1998.
[13] K. Tindell, J. Clark, “Holistic Schedulability Analysis for Distributed Hard Real-Time Systems”,
Microprocessing & Microprogramming, Vol. 50, Nos. 2-3, 1994.
151
12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
[14] N. Audsley, A. Burns, et. al., “Fixed Priority Preemptive Scheduling: An Historical Perspective”,
Real-Time Systems, 8(2/3), 1995.
[15] N. Audsley, K. Tindell, A. et. al., “The End of Line for Static Cyclic Scheduling?”, 5th Euromicro
Works. on Real-Time Systems, 1993.
[16] Benoît Latré, Pieter De Mil, Ingrid Moerman, Bart Dhoedt and Piet Demeester , “Throughput and
Delay Analysis of Unslotted IEEE 802.15.4”, JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY
2006.
[17] Yu-Kai Huang, Chin-Fu Kuo, Ai-Chun Pang, and Weihua Zhuang,“Stochastic Delay Guarantees in
ZigBee Cluster-Tree Networks”, IEEE International Conference on Communications (ICC) 2012.
[18] Anis Koubaa, Mário Alves, Eduardo Tovar, André Cunha: An implicit GTS allocation mechanism
in IEEE 802.15.4 for time-sensitive wireless sensor networks: theory and practice. Real-Time
Systems 39(1-3): 169-204 (2008).
Authors
Sofiane Ouni received his Engineer, Master degree and PhD in Computer
Science from Ecole Nationale des Sciences de l'Informatique (ENSI) of
Tunisia in 2004. He is currently Associate Professor at the Department of
Computer Science and Mathematics, at INSAT, Tunisia.
The current research interest of Dr. Sofiane Ouni includes Wireless, Ad Hoc
and sensor Networks with Hard Real time guarantee. He has several published
refereed articles in international journals and proceedings of international
conferences. He is reviewer and organizer of International conferences on
computer networks and embedded systems.
Zayneb Trabelsi Ayoub is a PhD student at University of Manouba, working
on real-time communication over IEEE 802.15.4/ZigBee Wireless Sensor
Networks. She received her Engineering degree in Computer Networks and
Telecommunications (2009) from INSAT Tunisia and her MSc degree in
Electronic Systems and Communication Networks (2010) from EPT Tunisia.
She is an IEEE member.
She is currently Assistant Professor at the Department of Computer Science at
Higher Institute of Computer Sciences (ISI Tunisia).
152