Advanced Science and Technology Letters Vol.53 (AITS 2014), pp.361-364 An Improved Algorithm for Ad hoc Network.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Problems in Ad Hoc Channel Access
Categories of I/O Devices
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Improvement on LEACH Protocol of Wireless Sensor Network
PH4705 ET4305 Interface Standards A number of standard digital data interfaces are used in measurement systems to connect instruments and computers for.
Chapter 1: Computer Networks IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Guide to major network components
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
NAME: NASIRAHMADPROGRAM: B.S TELECOMSEMESTER: 7THREG#: SU/ PRESENTED TO: ENGR. GUL ZAMEEN KHANDATE: UNIVERSITY: SARHAD UNIVERSITY.
Chapter 8 Input/Output. Busses l Group of electrical conductors suitable for carrying computer signals from one location to another l Each conductor in.
MICA: A Wireless Platform for Deeply Embedded Networks
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
Methods Demarcating into two parts to present, one is the method of location update, the other is method of data communication, namely ILSR. Location Update.
Wireless Sensor Monitoring Group Members: Daniel Eke (COMPE) Brian Reilly (ECE) Steven Shih (ECE) Sponsored by:
Design of the multi-level security network switch system which restricts covert channel Conference: Communication Software and Networks (ICCSN), 2011 IEEE.
Common Devices Used In Computer Networks
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Autonomous Helicopter James LydenEE 496Harris Okazaki.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Ad Hoc Network.
Advanced Science and Technology Letters Vol.74 (ASEA 2014), pp Prototyping of Web-based Solar Monitoring.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Advanced Science and Technology Letters Vol.31 (ACN 2013), pp Application Research of Wavelet Fusion Algorithm.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp A 0 Ohm substitution current probe is used.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Advanced Science and Technology Letters Vol.32 (Architecture and Civil Engineering 2013), pp A Preliminary.
Advanced Science and Technology Letters Vol.106 (Information Technology and Computer Science 2015), pp.17-21
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Data Transmission Mechanism for Multiple Gateway System Xuan He, Yuanchen Ma and Mika Mizutani, 6th International Conference on New Trends in Information.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Advanced Science and Technology Letters Vol.54 (Networking and Communication 2014), pp Priority-based.
Advanced Science and Technology Letters Vol.54 (Networking and Communication 2014), pp Pipelined Dynamic.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Energy-Efficient Protocol for Cooperative Networks.
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
QoS-specified Traffic Grooming Algorithm in WDM Mesh Networks Bing Xiang, Hongfang Yu, Sheng Wang, Lemin Li Communications, Circuits and Systems, 2004.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Simple LAN Topologies  Terminators stop signals after they have reached their destination  Signal bounce –Phenomenon in which signals travel endlessly.
Advanced Science and Technology Letters Vol.54 (Networking and Communication 2014), pp Efficient Duplicate.
TV Remote As A Wireless Mouse For PC.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
PATIENT HEALTH MONITORING AND ALARMING
Author:Zarei.M.;Faez.K. ;Nya.J.M.
The University of Adelaide, School of Computer Science
Computer Network Course objective: To understand Network architecture
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
MOBILE AD-HOC NETWORKS
School of Computer Science and Engineering Pusan National University
DBS INSTITUTE OF TECHNOLOGY
Multi-channel, multi-radio wireless networks
A comparison of Ad-Hoc Routing Protocols
Advanced Science and Technology Letters Vol
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Advanced Science and Technology Letters Vol
Zigbee Networks Using Xbee Modules
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Presentation transcript:

Advanced Science and Technology Letters Vol.53 (AITS 2014), pp An Improved Algorithm for Ad hoc Network Zhengxing Rong 1, Meiran Yang 2, Yixin Yan * Harbin University of Science and Technology, Harbin, , P. R. China * Abstract. The technology of wireless sensor network is a new direction in the field of information science. With the development of science and technology, in modern life, its application is more and more widely. The technology is usually used for information communication in a wide range of network. Sensor network communication can be completed without interference. This paper proposes an efficient, stable self-organizing network protocol algorithm in the situation, to realize self organization and information communication. Using STM32 microcontroller as network nodes, it achieves a low power, high speed, high performance wireless ad hoc network, the node and terminal can form a stable network communication, and quality of the network communication can be further improved. Keywords: Wireless network; self organization; microcontroller; sensor; 1 Introduction The wireless network is composed of a group of mobile nodes with wireless transceiver components, it is a self-organizing and multi hop network. Compared with other communication networks, wireless ad hoc network has no center, self- organizing, multi hop routing, dynamic topology and other characteristics. It has no cable fixed base and each node can be used as a terminal and routing which can switch fast and movie at any time. 2 Design principle This design uses STM32F103 MCU and does not need the complex hardware circuit. It will send and receive datas by the serial port 2 which is connected with the wireless module. The design realizes the network between the multi nodes and terminal by using a self-designed algorithm. It includes a terminal and a plurality of nodes in the system. The terminal is always open. If the connection is failed, the node will try to connect with other nodes which are in the network. If succeeded, it will transfer data and help the nodes in the blind spots connecting with the network. Figure 2-1 is the block diagram of the terminal. Figure 2-1 is the block diagram of the nodes. ISSN: ASTL Copyright © 2014 SERSC

Advanced Science and Technology Letters Vol.53 (AITS 2014) STM32 LCD display module CH340 USB Serial port 1 Figure 2-1 the block diagram of the terminal STM32 LCD display module Serial port 1 External component module Serial port 2 Wireless module Serial port 2 wireless Figure 2-1 is the block diagram of the nodes This algorithm can ensure the communication between nodes and terminal can connect through other routes network when the signal interference happened, and search the blind spot where the nodes cannot reach. Figure 2-3 is the system network structure diagram. Figure 2-3. diagram of the system network structure diagram In the diagram, the node A and node B can communicate with a terminal network, and node C is out of the transmission range in the terminal signals but in the the transmission range of the node A and B. So the node C can connect with the network through the node A and B. 3 Self organization protocol The network includes a terminal connecting with PC and multiple nodes. After tuning Terminal Node A Node B Node C 362 Copyright © 2014 SERSC

Advanced Science and Technology Letters Vol.53 (AITS 2014) on power of terminal and the initialization, enter the mode waiting for the command. Nodes can be arbitrarily placed, after power on and initialization, nodes firstly send a request command of connecting with the network to the terminal, if the terminal confirmation command is received, it have been accessed to and do the operation in the network. If in the set time, it can’t receive terminal confirm command, that node thinks itself as the blind spot, the node will send the request to the other network node, if the received the node confirm command, have been in the network and saved the address of node. Other node network courses are the same, each node can mount a number of node, the networking can send commands to every node. Self-organization process is shown in Figure 3-1. start Node Initialization Enter the network operation end send access request Figure 3-1. self-organization process 4 Software design Terminal program includes three parts. First, displaying the datas receives from terminal through serial port 1 in the PC. Second, inputting the command from PC and sending it to the specified node through terminal. Last, deal with the application of nodes. Figure 4-1 is the flow chart of terminal program. Send the access request N receive terminal reply ? N reach the upper limit of sengding Y Y to node in network N reply from the superior node N reach the upper limit of sengding Y Y Copyright © 2014 SERSC 363

Advanced Science and Technology Letters Vol.53 (AITS 2014) start initialization N port 1 receive data N port 2 receive data Y Y Send data to Data is application N send confirmation order end start operation terminal local Y N N send data to lower node send confirm order Y application from node data is to lower node Y address N node N N end data Figure 4-1.the flow chart of terminal program Figure 4-2. Network operation flow chart port receive data is from Y data is to external component The node program includes network and network operations in two parts. Network connection flow is as networking process described in the above. Network operations include reply to the request of lower node, send the blind node’s address to the terminal, transmiss the terminal command to the node, judge the command which is terminal sends and send command to the external module. Network operation flow chart is shown in figure 4-2. the aim node save the node Y confirm order from Acknowledgments. This study was financed partially by Higher Education Key Laboratory for Measuring and Control Technology and Instrumentation of Heilongjiang Province, Harbin University of Science and Technology. References 1.Cai, X., Li, J., Zhu, L.: Performance of Routing Protocols in Very Large Scale Wireless Sensor Networks [J]. Journal of Networks, 2012, 7(12). 1.Abd Jalil K, Ahmad Z, Manan J A. Securing Routing Table update in AODV routing protocol[C]//Open Systems (ICOS), 2011 IEEE Conference on. IEEE, 2011: Wang Shengbing, Modulation classification of radio signals. Southeast University,(2006) pp Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A., Wireless body area networks: a survey, Communications Surveys & Tutorials, IEEE, Vol. PP, Issue 99, pp The Network Simulator NS ,6. 5.Sahadevaiah K, Ramanaiah O B V. An Empirical Examination of Routing Protocols in Mobile Ad Hoc Networks[J]. International Journal of Communications, Network & System Sciences, 2010, 3(6). 364 Copyright © 2014 SERSC