SlideShare a Scribd company logo
CSE 622 Advanced Computer Networks
0
Surveying Cross-Layer Protocols in WSNs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
• Introduction to WSNs
• WSN Topology
• Design Factors
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
126-Apr-18
• Introduction to WSNs
• WSN Topology
• Design Factors
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• BGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
226-Apr-18
• The need for wireless sensors networks.
• Why cannot we use normal Ad-hoc networks?
• Sensor nodes are deployed densely, which makes them
hard to have a unique global identification especially
with the overhead that a packet would have.
• Sensor nodes are prone to failures so the network must
find a way to maintain its availability.
• Sensor nodes are typically very small, in the range of 1
cm3, which results in a very frequent topology change.
Introduction to WSNs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
326-Apr-18
• Introduction to WSNs
• WSN Topology
• Design Factors
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
426-Apr-18
• Densely distributed sensor nodes.
• One or more sink nodes.
WSN Topology
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
526-Apr-18
• Introduction to WSNs
• WSN Topology 
• Design Factors
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
626-Apr-18
• Fault Tolerance: Sensors in WSNs are prone to
failures due to the environment conditions or
energy limitation so the network should keep the
functionality intact even after losing some of the
nodes.
• Scalability: The network should accommodate the
addition of extra nodes in case of expanding the
network or replacing the faulty nodes.
Design Factors
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
726-Apr-18
• Production Costs: Sensors in WSNs are deployed
densely, prone to damage, and left unattended with
low possibility of maintenance so it has to be cheap,
which will be, typically, in the order of 1$.
• Power Consumption: Nodes must conserve their energy
while maintaining the minimum requirements of the
network.
That energy is driven from a small battery that would fit
with such small node.
With the possibility of no energy harvesting, power
consumption becomes one of the most critical points in
a protocol.
Design Factors Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
826-Apr-18
• Hardware Constraints: WSN nodes are mainly composed of four mandatory components and can
have multiple attached peripherals.
• The main components are:
• Sensing unit, which is composed of the sensor unit and an ADC.
• A processing unit to process the data.
• A transceiver unit for communication.
• A power unit.
• These sub units may be needed to fit in a matchbox-sized module and sometimes smaller than a
cubic centimetre to stay suspended in air.
Design Factors Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
926-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1026-Apr-18
Protocol Stack of WSNs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1126-Apr-18
• Physical layer:
• Responsible for frequency selection, carrier frequency generation, signal detection,
modulation, and data encryption.
• Data link layer:
• Responsible for the multiplexing of data streams, data frame detection, medium access, and
error control.
• MAC:
• Establish communication links for data transfer.
• Fairly and efficiently share communication resources between sensor nodes.
• Error Control:
• ARQ (Automatic Repeat Request) is limited by the additional retransmission
energy cost and overhead.
• FEC (Forward Error Correction): The decoding complexity is greater so that
additional processing power is needed.
Protocol Stack of WSNs Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1226-Apr-18
• Network layer:
• Special multi-hop wireless routing protocols between the sensor nodes and the sink node are needed.
• Power efficiency is always an important consideration.
• Sensor networks are mostly data-centric.
• Flooding: Each node receives data, repeats it by broadcasting unless a maximum number of hops for the
packet is reached.
• Provide internetworking with external networks such as other sensor networks, command and control
systems, and the Internet.
• Transport layer:
• This layer is especially needed when the system is planned to be accessed through the Internet or other
external networks.
• Unlike protocols such as TCP, the end-to-end communication schemes in sensor networks are not based on
global addressing. These schemes must consider that addressing based on data or location is used to
indicate the destinations of the data packets.
• Transport layer protocols are required for two main functionalities: reliability and congestion control.
• Factors such as power consumption and scalability and characteristics like data-centric routing, mean
sensor networks need different handling in the transport layer.
Protocol Stack of WSNs Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1326-Apr-18
• Application layer:
• Responsible for traffic management and provide software for different applications that translate the data in an
understandable form or send queries to obtain certain information.
• Three possible application layer protocols: Sensor Management Protocol (SMP), Task Assignment and Data Advertisement
Protocol (TADAP), and Sensor Query and Data Dissemination Protocol (SQDDP).
• SMP (Sensor Management Protocol):
• Management protocol that provides the software operations needed to perform the following administrative tasks:
• Introducing the rules related to data aggregation, attribute-based naming, and clustering to the sensor nodes.
• Exchanging data related to the location finding algorithms.
• Time synchronization of the sensor nodes.
• Moving sensor nodes.
• Turning sensor nodes on and off.
• Querying the sensor network configuration and the status of nodes and reconfiguring the sensor network.
• Authentication, key distribution, and security in data communications.
Protocol Stack of WSNs Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1426-Apr-18
• Power management plane:
• Manages how a sensor node uses its power.
• For example, the sensor node may turn off its receiver after receiving a message from one of
its neighbours. This is to avoid getting duplicated messages.
• Also, when the power level of the sensor node is low, the sensor node broadcasts to its
neighbours that it is low in power and cannot participate in routing messages. The
remaining power is reserved for sensing.
• Mobility management plane:
• Detects and registers the movement of sensor nodes so the sensor nodes can keep track of
who their neighbour sensor nodes are.
• By knowing who the neighbour sensor nodes are, the sensor nodes can balance their power
and task usage.
• Task management plane:
• Balances and schedules the sensing tasks given to a specific region.
• Not all sensor nodes in that region are required to perform at the same time.
Protocol Stack of WSNs Cont.
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1526-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1626-Apr-18
• The non-adjacent layers can interact with each other to share the information in
order to enhance the performance of the network.
• For example, the application layer can interact with the MAC layer to share the
QoS requirements to allow and help the MAC layer to achieve better scheduling.
• On the other hand, the physical layer can send the Channel Status Information
(CSI) to the network layer so it can adjust its routing paths to avoid the paths that
are not in a good state.
Cross-Layer Protocols in WSNs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1726-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1826-Apr-18
• Non-Manager Method.
• Manager Method.
Classifications of Cross-Layer Designs
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
1926-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2026-Apr-18
• The Energy Diffserv Application-Aware Scheduling (EDAS) algorithm has been
proposed to allow the MAC layer to take the energy efficiency, QoS
requirements, and fairness into consideration to increase the quality of the
received videos.
• It includes some mechanisms to achieve that goal:
• For example, the admission control mechanism is used to provide the
needed QoS to all video flows.
• It also includes channel time partition mechanism, an application-aware
dynamic channel time allocation algorithm, and it provides energy-
differentiated service to the devices based on the energy levels that they
have.
• The experimental results showed that this technique has reached 30% reduction
in energy consumption by compressing the videos with low quality.
EDAS
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2126-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS 
• DGR
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2226-Apr-18
• The application layer in the Directional Geographical
Routing (DGR) relies on the information from the lower
layers in order to construct multiple paths, instead of
using single route, to transmit parallel H.26L real-time
video streams.
• This will help to achieve better load balancing,
bandwidth utilization, and fast packet delivery, which
will help in achieving lower delays, longer network
lifetime, and better video quality.
• The experimental results showed that this technique
has improved the average video Peak Signal-to-Noise
Ratio (PSNR) by 3 dB.
DGR
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2326-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS 
• BGR 
• MLRR
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2426-Apr-18
• The application layer in the Multi-Level Rate Routing (MLPR) relies on
the information from lower layers (e.g., the distance between the sensor
nodes) to reduce the number of the transmitted bits by each node.
• The reason is that the nodes close to each other, probably, will measure
values similar to each other so it is not needed to send the whole sensed
data by each node.
• However, the Data Source Coding (DSC) algorithm is used to encode the
data by the application layer before sending so the number of the
transmitted bits will be less and the bandwidth will be utilized in a better
way.
• After that, it will be the responsibility of the sink node to combine the
received data from different sensor nodes to construct the original
sensed value again.
MLRR
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2526-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS 
• BGR 
• MLRR 
• GRASS
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2626-Apr-18
• The functionality of the network layer in the Grid-based
Routing and Aggregator Selection Scheme (GRASS) has been
extended to include the aggregation capability, where the
cluster heads will aggregate the data coming from the sensor
nodes.
• Also, the cluster heads will, based on some algorithms, try to
find the minimum number of the aggregation points that the
packets need to travel before reaching their destinations at
the sink to maximize the lifetime of the network and
minimize the latency.
• The experimental results showed that the lifetime of the
network has been increased by 35% when using that
approach.
GRASS
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2726-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs
• Classification of Cross-Layer Designs 
• EDAS 
• BGR 
• MLRR 
• GRASS 
• CEDA
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2826-Apr-18
• The network layer in the Cell-based Energy Density-
aware (CEDA) relies on one of the Channel Status
Information (CSI) parameters from the lower layers,
which is the energy level by adding it as a variable
in the routing tables.
• This parameter will serve as a weighting factor
when routing the data to avoid using the paths that
contains nodes with less remaining energy.
CEDA
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
2926-Apr-18
• Introduction to WSNs 
• WSN Topology 
• Design Factors 
• Protocol Stack of WSNs 
• Cross-Layer Protocols in WSNs 
• Classification of Cross-Layer Designs 
• EDAS 
• BGR 
• MLRR 
• GRASS 
• CEDA 
Agenda
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
3026-Apr-18
CSE 622 Advanced Computer Networks
Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik
Ain Shams University - Faculty of Engineering
3126-Apr-18

More Related Content

What's hot

A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
Ayman Adel
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
Kathirvel Ayyaswamy
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
sashar86
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Darpan Dekivadiya
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Transmission efficient ppt
Transmission efficient pptTransmission efficient ppt
Transmission efficient ppt
Devdutta Chakrabarti
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
jaimin_m_raval
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
Pawan Kumar Tiwari
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
IRJET Journal
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
Braj Raj Singh
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
Tal Lavian Ph.D.
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
Darpan Dekivadiya
 
Wireless sensor network by abhishek mahajan
Wireless sensor network by abhishek mahajanWireless sensor network by abhishek mahajan
Wireless sensor network by abhishek mahajan
Abhishek Mahajan
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
eSAT Journals
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
eSAT Publishing House
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
Ashish Prajapat
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
ArunChokkalingam
 
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road AheadURLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road Ahead
Mehdi Bennis
 

What's hot (19)

A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Transmission efficient ppt
Transmission efficient pptTransmission efficient ppt
Transmission efficient ppt
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Wireless sensor network by abhishek mahajan
Wireless sensor network by abhishek mahajanWireless sensor network by abhishek mahajan
Wireless sensor network by abhishek mahajan
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road AheadURLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road Ahead
 

Similar to Surveying cross layer protocols in ws ns

Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptx
RahulBhole12
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Aravindsikharam
AravindsikharamAravindsikharam
Aravindsikharam
sikharam99
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
Tekle12
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
IrawanAbiyantoro1
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
SuganthiN2
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
Monodip Singha Roy
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
devika g
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Rajesh Karumanchi
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
915086731
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
BinyamBekeleMoges
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
nooralleema
 
wireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxwireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptx
mayurbankar2
 
Mobile Computing - SARASWATHI RAMALINGAM
Mobile Computing - SARASWATHI RAMALINGAMMobile Computing - SARASWATHI RAMALINGAM
Mobile Computing - SARASWATHI RAMALINGAM
SaraswathiRamalingam
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
paruvathavardhinipra
 
adhoc applications.pptx
adhoc applications.pptxadhoc applications.pptx
adhoc applications.pptx
paruvathavardhinij
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothi
divyajyothi405
 
5G Enabled Vehicular Networks
5G Enabled Vehicular Networks5G Enabled Vehicular Networks
5G Enabled Vehicular Networks
Md. Towhidul Islam Chowdhury
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
Pawan Kumar Tiwari
 

Similar to Surveying cross layer protocols in ws ns (20)

Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptx
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Aravindsikharam
AravindsikharamAravindsikharam
Aravindsikharam
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
wireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxwireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptx
 
Mobile Computing - SARASWATHI RAMALINGAM
Mobile Computing - SARASWATHI RAMALINGAMMobile Computing - SARASWATHI RAMALINGAM
Mobile Computing - SARASWATHI RAMALINGAM
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 
adhoc applications.pptx
adhoc applications.pptxadhoc applications.pptx
adhoc applications.pptx
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothi
 
5G Enabled Vehicular Networks
5G Enabled Vehicular Networks5G Enabled Vehicular Networks
5G Enabled Vehicular Networks
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 

More from ahmad abdelhafeez

Service level management
Service level managementService level management
Service level management
ahmad abdelhafeez
 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes
ahmad abdelhafeez
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ahmad abdelhafeez
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
ahmad abdelhafeez
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
ahmad abdelhafeez
 
Routing
RoutingRouting
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
ahmad abdelhafeez
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
ahmad abdelhafeez
 
opnet
opnetopnet
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
ahmad abdelhafeez
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
ahmad abdelhafeez
 
Intrusion prevension
Intrusion prevensionIntrusion prevension
Intrusion prevension
ahmad abdelhafeez
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
ahmad abdelhafeez
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
ahmad abdelhafeez
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
ahmad abdelhafeez
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
ahmad abdelhafeez
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentation
ahmad abdelhafeez
 
pentration testing
pentration testingpentration testing
pentration testing
ahmad abdelhafeez
 

More from ahmad abdelhafeez (20)

Service level management
Service level managementService level management
Service level management
 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
Routing
RoutingRouting
Routing
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
opnet
opnetopnet
opnet
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
 
Intrusion prevension
Intrusion prevensionIntrusion prevension
Intrusion prevension
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentation
 
pentration testing
pentration testingpentration testing
pentration testing
 

Recently uploaded

一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
rameshqapcba
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
nonods
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
DharmaBanothu
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 

Recently uploaded (20)

一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 

Surveying cross layer protocols in ws ns

  • 1. CSE 622 Advanced Computer Networks 0 Surveying Cross-Layer Protocols in WSNs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering
  • 2. • Introduction to WSNs • WSN Topology • Design Factors • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 126-Apr-18
  • 3. • Introduction to WSNs • WSN Topology • Design Factors • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • BGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 226-Apr-18
  • 4. • The need for wireless sensors networks. • Why cannot we use normal Ad-hoc networks? • Sensor nodes are deployed densely, which makes them hard to have a unique global identification especially with the overhead that a packet would have. • Sensor nodes are prone to failures so the network must find a way to maintain its availability. • Sensor nodes are typically very small, in the range of 1 cm3, which results in a very frequent topology change. Introduction to WSNs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 326-Apr-18
  • 5. • Introduction to WSNs • WSN Topology • Design Factors • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 426-Apr-18
  • 6. • Densely distributed sensor nodes. • One or more sink nodes. WSN Topology Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 526-Apr-18
  • 7. • Introduction to WSNs • WSN Topology  • Design Factors • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 626-Apr-18
  • 8. • Fault Tolerance: Sensors in WSNs are prone to failures due to the environment conditions or energy limitation so the network should keep the functionality intact even after losing some of the nodes. • Scalability: The network should accommodate the addition of extra nodes in case of expanding the network or replacing the faulty nodes. Design Factors Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 726-Apr-18
  • 9. • Production Costs: Sensors in WSNs are deployed densely, prone to damage, and left unattended with low possibility of maintenance so it has to be cheap, which will be, typically, in the order of 1$. • Power Consumption: Nodes must conserve their energy while maintaining the minimum requirements of the network. That energy is driven from a small battery that would fit with such small node. With the possibility of no energy harvesting, power consumption becomes one of the most critical points in a protocol. Design Factors Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 826-Apr-18
  • 10. • Hardware Constraints: WSN nodes are mainly composed of four mandatory components and can have multiple attached peripherals. • The main components are: • Sensing unit, which is composed of the sensor unit and an ADC. • A processing unit to process the data. • A transceiver unit for communication. • A power unit. • These sub units may be needed to fit in a matchbox-sized module and sometimes smaller than a cubic centimetre to stay suspended in air. Design Factors Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 926-Apr-18
  • 11. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1026-Apr-18
  • 12. Protocol Stack of WSNs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1126-Apr-18
  • 13. • Physical layer: • Responsible for frequency selection, carrier frequency generation, signal detection, modulation, and data encryption. • Data link layer: • Responsible for the multiplexing of data streams, data frame detection, medium access, and error control. • MAC: • Establish communication links for data transfer. • Fairly and efficiently share communication resources between sensor nodes. • Error Control: • ARQ (Automatic Repeat Request) is limited by the additional retransmission energy cost and overhead. • FEC (Forward Error Correction): The decoding complexity is greater so that additional processing power is needed. Protocol Stack of WSNs Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1226-Apr-18
  • 14. • Network layer: • Special multi-hop wireless routing protocols between the sensor nodes and the sink node are needed. • Power efficiency is always an important consideration. • Sensor networks are mostly data-centric. • Flooding: Each node receives data, repeats it by broadcasting unless a maximum number of hops for the packet is reached. • Provide internetworking with external networks such as other sensor networks, command and control systems, and the Internet. • Transport layer: • This layer is especially needed when the system is planned to be accessed through the Internet or other external networks. • Unlike protocols such as TCP, the end-to-end communication schemes in sensor networks are not based on global addressing. These schemes must consider that addressing based on data or location is used to indicate the destinations of the data packets. • Transport layer protocols are required for two main functionalities: reliability and congestion control. • Factors such as power consumption and scalability and characteristics like data-centric routing, mean sensor networks need different handling in the transport layer. Protocol Stack of WSNs Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1326-Apr-18
  • 15. • Application layer: • Responsible for traffic management and provide software for different applications that translate the data in an understandable form or send queries to obtain certain information. • Three possible application layer protocols: Sensor Management Protocol (SMP), Task Assignment and Data Advertisement Protocol (TADAP), and Sensor Query and Data Dissemination Protocol (SQDDP). • SMP (Sensor Management Protocol): • Management protocol that provides the software operations needed to perform the following administrative tasks: • Introducing the rules related to data aggregation, attribute-based naming, and clustering to the sensor nodes. • Exchanging data related to the location finding algorithms. • Time synchronization of the sensor nodes. • Moving sensor nodes. • Turning sensor nodes on and off. • Querying the sensor network configuration and the status of nodes and reconfiguring the sensor network. • Authentication, key distribution, and security in data communications. Protocol Stack of WSNs Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1426-Apr-18
  • 16. • Power management plane: • Manages how a sensor node uses its power. • For example, the sensor node may turn off its receiver after receiving a message from one of its neighbours. This is to avoid getting duplicated messages. • Also, when the power level of the sensor node is low, the sensor node broadcasts to its neighbours that it is low in power and cannot participate in routing messages. The remaining power is reserved for sensing. • Mobility management plane: • Detects and registers the movement of sensor nodes so the sensor nodes can keep track of who their neighbour sensor nodes are. • By knowing who the neighbour sensor nodes are, the sensor nodes can balance their power and task usage. • Task management plane: • Balances and schedules the sensing tasks given to a specific region. • Not all sensor nodes in that region are required to perform at the same time. Protocol Stack of WSNs Cont. Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1526-Apr-18
  • 17. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1626-Apr-18
  • 18. • The non-adjacent layers can interact with each other to share the information in order to enhance the performance of the network. • For example, the application layer can interact with the MAC layer to share the QoS requirements to allow and help the MAC layer to achieve better scheduling. • On the other hand, the physical layer can send the Channel Status Information (CSI) to the network layer so it can adjust its routing paths to avoid the paths that are not in a good state. Cross-Layer Protocols in WSNs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1726-Apr-18
  • 19. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1826-Apr-18
  • 20. • Non-Manager Method. • Manager Method. Classifications of Cross-Layer Designs Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 1926-Apr-18
  • 21. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2026-Apr-18
  • 22. • The Energy Diffserv Application-Aware Scheduling (EDAS) algorithm has been proposed to allow the MAC layer to take the energy efficiency, QoS requirements, and fairness into consideration to increase the quality of the received videos. • It includes some mechanisms to achieve that goal: • For example, the admission control mechanism is used to provide the needed QoS to all video flows. • It also includes channel time partition mechanism, an application-aware dynamic channel time allocation algorithm, and it provides energy- differentiated service to the devices based on the energy levels that they have. • The experimental results showed that this technique has reached 30% reduction in energy consumption by compressing the videos with low quality. EDAS Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2126-Apr-18
  • 23. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS  • DGR • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2226-Apr-18
  • 24. • The application layer in the Directional Geographical Routing (DGR) relies on the information from the lower layers in order to construct multiple paths, instead of using single route, to transmit parallel H.26L real-time video streams. • This will help to achieve better load balancing, bandwidth utilization, and fast packet delivery, which will help in achieving lower delays, longer network lifetime, and better video quality. • The experimental results showed that this technique has improved the average video Peak Signal-to-Noise Ratio (PSNR) by 3 dB. DGR Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2326-Apr-18
  • 25. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS  • BGR  • MLRR • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2426-Apr-18
  • 26. • The application layer in the Multi-Level Rate Routing (MLPR) relies on the information from lower layers (e.g., the distance between the sensor nodes) to reduce the number of the transmitted bits by each node. • The reason is that the nodes close to each other, probably, will measure values similar to each other so it is not needed to send the whole sensed data by each node. • However, the Data Source Coding (DSC) algorithm is used to encode the data by the application layer before sending so the number of the transmitted bits will be less and the bandwidth will be utilized in a better way. • After that, it will be the responsibility of the sink node to combine the received data from different sensor nodes to construct the original sensed value again. MLRR Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2526-Apr-18
  • 27. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS  • BGR  • MLRR  • GRASS • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2626-Apr-18
  • 28. • The functionality of the network layer in the Grid-based Routing and Aggregator Selection Scheme (GRASS) has been extended to include the aggregation capability, where the cluster heads will aggregate the data coming from the sensor nodes. • Also, the cluster heads will, based on some algorithms, try to find the minimum number of the aggregation points that the packets need to travel before reaching their destinations at the sink to maximize the lifetime of the network and minimize the latency. • The experimental results showed that the lifetime of the network has been increased by 35% when using that approach. GRASS Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2726-Apr-18
  • 29. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs • Classification of Cross-Layer Designs  • EDAS  • BGR  • MLRR  • GRASS  • CEDA Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2826-Apr-18
  • 30. • The network layer in the Cell-based Energy Density- aware (CEDA) relies on one of the Channel Status Information (CSI) parameters from the lower layers, which is the energy level by adding it as a variable in the routing tables. • This parameter will serve as a weighting factor when routing the data to avoid using the paths that contains nodes with less remaining energy. CEDA Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 2926-Apr-18
  • 31. • Introduction to WSNs  • WSN Topology  • Design Factors  • Protocol Stack of WSNs  • Cross-Layer Protocols in WSNs  • Classification of Cross-Layer Designs  • EDAS  • BGR  • MLRR  • GRASS  • CEDA  Agenda Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 3026-Apr-18
  • 32. CSE 622 Advanced Computer Networks Ahmed Hamed, Hussein Abd Elrahman, and Rizk Tawfik Ain Shams University - Faculty of Engineering 3126-Apr-18