J. Parallel Distrib. Comput.: Jalel Ben-Othman Bashir Yahya

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

J. Parallel Distrib. Comput.

70 (2010) 849–857

Contents lists available at ScienceDirect

J. Parallel Distrib. Comput.


journal homepage: www.elsevier.com/locate/jpdc

Energy efficient and QoS based routing protocol for wireless sensor networks
Jalel Ben-Othman ∗ , Bashir Yahya
Department of Computer Science, PRiSM Laboratory, University of Versailles Saint Quentin, 45 Avenue des Etats-Unis, 78000 Versailles, France

article info abstract


Article history: The increasing demand for real-time applications in Wireless Sensor Networks (WSNs) has made the
Received 15 November 2009 Quality of Service (QoS) based communication protocols an interesting and hot research topic. Satisfying
Received in revised form Quality of Service (QoS) requirements (e.g. bandwidth and delay constraints) for the different QoS based
3 February 2010
applications of WSNs raises significant challenges. More precisely, the networking protocols need to cope
Accepted 27 February 2010
Available online 17 March 2010
up with energy constraints, while providing precise QoS guarantee. Therefore, enabling QoS applications
in sensor networks requires energy and QoS awareness in different layers of the protocol stack. In many
Keywords:
of these applications (such as multimedia applications, or real-time and mission critical applications),
Multipath routing the network traffic is mixed of delay sensitive and delay tolerant traffic. Hence, QoS routing becomes
Energy efficiency an important issue. In this paper, we propose an Energy Efficient and QoS aware multipath routing
Quality of Service protocol (abbreviated shortly as EQSR) that maximizes the network lifetime through balancing energy
Forward error correction consumption across multiple nodes, uses the concept of service differentiation to allow delay sensitive
Wireless sensor networks traffic to reach the sink node within an acceptable delay, reduces the end to end delay through spreading
out the traffic across multiple paths, and increases the throughput through introducing data redundancy.
EQSR uses the residual energy, node available buffer size, and Signal-to-Noise Ratio (SNR) to predict the
best next hop through the paths construction phase. Based on the concept of service differentiation, EQSR
protocol employs a queuing model to handle both real-time and non-real-time traffic.
By means of simulations, we evaluate and compare the performance of our routing protocol with the
MCMP (Multi-Constraint Multi-Path) routing protocol. Simulation results have shown that our protocol
achieves lower average delay, more energy savings, and higher packet delivery ratio than the MCMP
protocol.
© 2010 Elsevier Inc. All rights reserved.

1. Introduction A typical WSN consists of a number of sensor devices that


collaborate with each other to accomplish a common task
In the recent years, the rapid technological advances in micro- (e.g. environment monitoring, object tracking, etc.) and report the
electro-mechanical systems, low power and highly integrated dig- collected data through wireless interface to a center node (sink
ital electronics, small scale energy supplies, tiny microprocessors, node). The areas of applications of WSNs vary from civil, health-
and low power radio technologies have created low power, low care, and environmental to military. Examples of applications in-
cost and multifunctional wireless sensor devices, which can ob- clude target tracking in battlefields [7], habitat monitoring [18],
serve and react to changes in physical phenomena of their sur- civil structure monitoring [28], forest fire detection [13], and fac-
rounding environments. These sensor devices are equipped with tory maintenance [24].
a small battery, a tiny microprocessor, a radio transceiver, and a However, with the specific consideration of the unique proper-
set of transducers that used to acquire information that reflect the ties of sensor networks such limited power, stringent bandwidth,
changes in the surrounding environment of the sensor node. The dynamic topology (due to node failures, adding/removing nodes, or
emergence of these low cost and small size wireless sensor devices even physical mobility), high network density and large scale de-
has motivated intensive research in the last decade addressing the ployments have posed many challenges in the design and manage-
potential of collaboration among sensors in data gathering and pro- ment of sensor networks. These challenges have demanded energy
cessing, which led to the invention of Wireless Sensor Networks awareness and robust protocol designs at all layers of the network-
(WSNs). ing protocol stack [29].
Efficient utilization of sensor’s energy resources and maximiz-
ing the network lifetime were and still are the main design consid-
∗ Corresponding author.
erations for the most proposed protocols and algorithms for sensor
E-mail addresses: jbo@prism.uvsq.fr (J. Ben-Othman), baya@prism.uvsq.fr networks and have dominated most of the research in WSNs. How-
(B. Yahya). ever, depending on the type of application, the generated sensory
0743-7315/$ – see front matter © 2010 Elsevier Inc. All rights reserved.
doi:10.1016/j.jpdc.2010.02.010
850 J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857

data normally have different attributes, where it may contain delay 2. Multipath routing
sensitive and delay tolerant data. For example, the data generated
by a sensor network that monitors the temperature in a normal Single path routing protocols in sensor network are designed
weather monitoring station are not required to be received by the to discover a single path between a source/destination pair. From
processing center or the sink node within certain time limits. On the other hand, multipath routing consists of finding multiple
the other hand, for a sensor network that used for fire detection in a paths between the source and destination nodes. These multiple
forest, any sensed data that carries an indication of a fire should be paths can be used to solve some trade-offs in such networks and
reported to the processing center within certain time limits. Fur- accommodate with the dynamic nature of WSNs. In this section,
thermore, the introduction of multimedia sensor networks along we discuss some benefits and advantages of multipath routing. As
with the increasing interest in real-time applications have made well, we mention some problems that arise when using multipath
strict constraints on both delay and throughput in order to report routing in wireless sensor networks.
the time-critical data (in such applications) to the processing cen-
ter or sink within certain time limits and bandwidth requirements 2.1. Benefits of multipath routing
without any loss. These performance metrics (i.e. delay and band-
width) are usually referred to as Quality of Service (QoS) require- As mentioned in the introduction, multipath routing protocols
ments [1]. Therefore, enabling real-time applications in sensor can provide load balancing, fault tolerance, bandwidth aggrega-
networks requires energy and QoS awareness in different layers tion, and reduced delay. Below, we discuss how to provide each
of the protocol stack in order to have efficient utilization of the of these benefits in multipath routing.
network resources and effective access to sensors readings. Thus
QoS routing is an important topic in sensor networks research, and
2.1.1. Load balancing
it has been under the focus of the research community of WSNs.
As stated in [11], one of the reasons for which classical
Refer to References [1,8] for surveys on Quality of Service based
multipath routing has been explored is to provide load balancing.
routing protocols for WSNs.
Load balancing can be achieved by splitting the traffic across
Many routing solutions specifically designed for WSNs have
multiple paths. This use of multipath routing is applicable to
been proposed [3,20]. In these proposals, the unique properties
WSNs. Load balancing can spread energy utilization across nodes
of the WSNs have been taken into account. These routing
in the sensor network, potentially resulting in longer lifetimes.
techniques can be classified according to the protocol operation
Furthermore, load balancing helps in avoiding congestion and
into negotiation based, query based, QoS based, and multi-path based.
bottleneck problems.
The negotiation based protocols have the objective to eliminate
the redundant data by include high level data descriptors in the
message exchange. In query based protocols, the sink node initiates 2.1.2. Reliability and fault tolerance
the communication by broadcasting a query for data over the Reliability means that the probability that a message generated
network. The QoS based protocols allow sensor nodes to make a at one place in the network can actually routed to the intended
tradeoff between the energy consumption and some QoS metrics destination. Reliability is a big issue in WSNs, because data
before delivering the data to the sink node [21]. Finally, multi- transmission is subject to lost due to several reasons: various kinds
path routing protocols use multiple paths rather than a single of interference, media access conflicts, network topology changes,
path in order to improve the network performance in terms of etc. These reasons affect the wireless radios to correctly decode the
reliability and robustness. Multi-path routing establishes multiple wireless signals.
paths between the source–destination pair. Multi-path routing One of the reasons behind developing multipath routing is to
protocols have been discussed in the literature for several years provide route failure protection, and increase resiliency to route
now [25]. Multi-path routing has focused on the use of multiple failures. Discovering and maintaining multiple paths between
paths primarily for load balancing, fault tolerance, bandwidth the source–destination pair improves the routing performance
aggregation, and reduced delay. We focus on supporting quality of by providing alternative routes. When the primary path fails, an
service through multi-path routing. alternative path will be used to transfer the data. In this case the
In this paper, we propose EQSR protocol: Energy efficient multiple paths are not used simultaneously.
and QoS based multi-path routing protocol for WSNs to recover Multiple paths can be used simultaneously for data routing.
from node failures and achieves load balancing through splitting Simultaneous multipath routing could be used to improve
up the traffic across a set of available node-disjoint paths in reliability. This could be done by sending multiple copies of data
across different paths. As long as, one of the multiple paths does
order to efficiently balance the energy consumption over multiple
not fail, the receiver node will receive the data. Sending multiple
sensor nodes. Furthermore, EQSR increases the reliability of data
copies is not the only way to provide fault tolerance, but there
delivery through utilizing a light wait XOR-based FEC (Forward
are many methods that are suitable for sensor networks by using
Error Correction) technique to provide data redundancy. Data
source coding schemes such as FEC techniques [16].
redundancy increases resiliency to path failures and enables the
protocol to recover lost data and reconstruct the original message,
while avoiding any excessive delay due to data retransmissions. 2.1.3. Highly aggregated bandwidth
EQSR uses the residual energy, node available buffer size, and Bandwidth may be limited in a WSN, routing over a single path
Signal-to-Noise Ratio (SNR) to predict the next hop through the may not provide enough bandwidth for a connection. However,
path construction phase. EQSR employs a queuing model that is if data are routed over multiple paths simultaneously, the overall
designed to handle real-time and non-real-time traffic through bandwidth of the paths may satisfy the bandwidth requirement of
service differentiation by giving real-time traffic higher priority an application.
than non-real-time traffic.
The remainder of the paper is organized as follow: In Section 2, 2.1.4. Minimizing end to end delay
we describe and discuss some of the related work. We detail By assuming that the paths between the source–destination
our proposal in Section 3. Section 4 presents the performance pair are node disjoint paths where correlation between the paths
evaluation. Finally, we conclude the paper in Section 5. is very low, and there is no route coupling between different
J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857 851

1 2 3 4 oriented routing proposals are surveyed in [1,8]. In this section we


do not give a comprehensive summary of the related work, instead
S D we present and discuss some proposals related to our protocol.
One of the early proposed routing protocols that provide some
5 QoS is the Sequential Assignment Routing (SAR) protocol [23].
6 7 8
SAR protocol is a multi-path routing protocol that makes routing
Fig. 1. Two node-disjoint paths [6]. decisions based on three factors: energy resources, QoS on each
path, and packet’s priority level. Multiple paths are created by
routes (this could be achieved, for example, through the using building a tree rooted at the source to the destination. During
of directional antennas), the end to end delay can be minimized construction of paths those nodes which have low QoS and low
by dividing the data (to be sent) into a number of segments and residual energy are avoided. Upon the construction of the tree,
using multiple paths to route segments simultaneously to the most of the nodes will belong to multiple paths. To transmit data
destination. Consider the following example [6]: to sink, SAR computes a weighted QoS metric as a product of the
As, we assumed each node in Fig. 1 uses a directional antenna additive QoS metric and a weighted coefficient associated with the
towards its target node only, then the communication in the route priority level of the packet to select a path. Employing multiple
S-1-2-3-4-D will not effect the communication on the route S-5-6- paths increases fault tolerance, but SAR protocol suffers from the
7-8-D. overhead of maintaining routing tables and QoS metrics at each
In this example, when node 1 is transmitting a packet to sensor node.
node 2, S can transmit a packet to node 5 simultaneously. Thus K. Akkaya and M. Younis in [2] proposed a cluster based
the destination D will receive a packet at every time-tick with QoS aware routing protocol that employs a queuing model to
two disjoint paths using directional antenna. This scheme of handle both real-time and non-real-time traffic. The protocol only
communication decreases the overall end-to-end delay between considers the end-to-end delay. The protocol associates a cost
S and D. function with each link and uses the K-least-cost path algorithm to
find a set of the best candidate routes. Each of the routes is checked
2.2. Problems with multipath routing against the end-to-end constraints and the route that satisfies the
constraints is chosen to send the data to the sink. All nodes initially
Nodes in the wireless sensor network use a shared wireless are assigned the same bandwidth ratio which makes constraints on
channel to communicate. This means neighboring nodes must other nodes which require higher bandwidth ratio. Furthermore,
content for the channel. When the channel is busy by a the transmission delay is not considered in the estimation of the
transmitting node, neighboring nodes hear the transmission and end-to-end delay, which sometimes results in selecting routes that
are blocked from receiving data from other nodes. Additionally, do not meet the required end-to-end delay. However, the problem
depending on the under laying MAC protocol, neighboring nodes of bandwidth assignment is solved in [30] by assigning a different
may have to defer their transmission till the channel is free. bandwidth ratio for each type of traffic for each node.
Even when multiple channels are used, the quality of neighboring SPEED [12] is another QoS based routing protocol that
transmission may be degraded because of the interference. provides soft real-time end-to-end guarantees. Each sensor node
Now, consider the use of a multipath routing, where the maintains information about its neighbors and exploits geographic
multiple paths are used simultaneously. Even, the multiple routes forwarding to find the paths. To ensure packet delivery within the
are node-disjoint paths, transmissions over the routes may required time limits, SPEED enables the application to compute
interfere if some nodes are in the transmission range of each other. the end-to-end delay by dividing the distance to the sink by the
This problem is called route coupling. Route coupling occurs when speed of packet delivery before making any admission decision.
two routes are located physically close enough to interfere with Furthermore, SPEED can provide congestion avoidance when the
each other during data communication. As a result, nodes in those network is congested. However, while simulation results in [12]
two routes are constantly contending for access to the wireless have shown that SPEED outperforms other protocols, this does
channel they share and can end up performing worse than a not mean that SPEED is an energy efficient protocol. Because the
single path protocol. Thus, node-disjoint routes are not a sufficient protocols used in the head to head comparison are not energy
condition for improved performance. Refer to Reference [6] for aware protocols. The SPEED protocol does not consider any energy
more details. metric in its routing protocol, which makes a question about its
In Reference [26], authors have studied this problem and energy efficiency. Therefore, for more realistic understanding of
proposed a measure for the coupling between two routes using SPEED’s energy consumption, it should be compared with energy
a correlation factor. The correlation factor between two node- aware routing protocols.
disjoint paths is defined as the number of links connecting the Message-initiated Constrained-Based Routing (MCBR) mecha-
two paths [26]. Choosing paths that have low correlation factor can nism is proposed in [10]. MCBR is composed of explicit specifica-
improve the performance of multipath routing. tions of constraint-based destinations, route constraints and QoS
Route coupling can be reduced or completely removed through requirements for messages, and a set of QoS aware meta-strategies.
the use of directional antenna. For example, if each node in Given the destination and routing constraints, routes from the
Fig. 1 uses a directional antenna towards its target node only, source to the destination are established through flooding the net-
the the communication in path S-1-2-3-4-D will not affect the work. Through applying general purpose meta routing strategies, a
communication on the path S-5-6-7-8-D. For more details refer to data message is routed from source to destination via a route that
References [6,22]. satisfies the QoS requirements for that data message. However, the
extra control packets (because of flooding the network with con-
3. Related work trol packets) are a significant overhead. The same authors in [19]
have proposed the QoS aware learning based routing to decrease
QoS routing in sensor networks is a challenging problem the complexity of MCBR protocol and enhance its performance.
because of the scarce resources of the sensor node. Thus, this Felemban et al. proposed Multi-path and Multi-speed Routing
problem has received a significant attention from the research Protocol (MMSPEED) for probabilistic QoS guarantee in WSNs [31].
community, where many proposals are being made. Some QoS QoS of service provisioning is done in two domains; timelines
852 J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857

domain and reliability domain. Multiple QoS levels are provided Hop Residual Free Link
Source ID
in the timelines domain by using different delivery speeds, while Count Energy Buffer Quality
different reliability requirements are supported by probabilistic
multipath forwarding. However, MMSPEED lacks a method for Fig. 2. HELLO message structure.
dealing with the data redundancy problem, which leads to
consuming a large amount of energy as shown in [32]. In this 4.2. Link cost function
context a data aggregation mechanism can be added to enhance
the performance of the protocol. The link cost function is used by the node to select the next hop
Recently, X. Huang and Y. Fang have proposed a multi- during the path discovery phase. We use a cost function such as
constrained QoS multi-path routing (MCMP) protocol [14] that presented in [17] with some changes. Let Nx be the set of neighbors
uses braided routes to deliver packets to the sink node according of node x. Then our cost function includes an energy factor,
to certain QoS requirements expressed in terms of reliability available buffer factor, and interference factor with appropriate
and delay. The problem of the end-to-end delay is formulated weights (α , β , and γ ):
as an optimization problem, and then an algorithm based on
Next hop = max{α Eresd,y + β Bbuffer ,y + γ Iinterference,xy },
linear integer programming is applied to solve the problem. The y∈Nx
protocol objective is to utilize the multiple paths to augment
where, Eresd,y is the current residual energy of node y, where y ∈ Nx ,
network performance with moderate energy cost. However, the
Bbuffer ,y is the available buffer size of node y, and Iinterference,xy is
protocol always routes the information over the path that includes
the SNR for the link between x and y. In this cost function, we
minimum number of hops to satisfy the required QoS, which
only consider the residual energy of node y but not x. Because
leads in some cases to more energy consumption. Authors
node y consumes energy for data reception and transmission if it
in [5], have proposed the Energy constrained multi-path routing
is selected as a next hop for node x. We do not consider node x,
(ECMP) that extends the MCMP protocol by formulating the QoS
because whatever node y is, node x still needs to spend the same
routing problem as an energy optimization problem constrained
amount of energy on data transmission [17].
by reliability, play-back delay, and geo-spatial path selection
The total cost (Ctotal ) for a path P consists of a set of K nodes is
constraints. The ECMP protocol trades between minimum number
the sum of the individual link costs l(xy)i,i∈K along the path. Then we
of hops and minimum energy by selecting the path that satisfies
have:
the QoS requirements and minimizes energy consumption.
K −1
Meeting QoS requirements in WSNs introduces certain over- X
Ctotal,P = l(xy)i .
head into routing protocols in terms of energy consumption, inten-
i =1
sive computations, and significantly large storage. This overhead
is unavoidable for those applications that need certain delay and
bandwidth requirements. In our proposal, we combine different 4.3. Paths discovery phase
ideas from the previous protocols in order to optimally tackle the
problem of QoS in sensor networks. In our proposal we try to satisfy Based on the idea of the directed diffusion [11,15], the sink
the QoS requirements with the minimum energy. Our EQSR routing node starts the multiple paths discovery phase to create a set of
protocol performs routes discovery using multiple criteria such as neighbors that able to forward data towards the sink from the
energy remaining, remaining buffer size and signal-to-noise ratio. source node. The constructed multi-paths are node-disjoint paths
In the next section we detail our proposal. (i.e. have no common nodes except the source and the destination).
In multi-path routing, node-disjoint paths are usually preferred
4. Description of EQSR protocol because they utilize the most available network resources, and
hence are the most fault-tolerant. If an intermediate node in a set
of node-disjoint paths fails, only the path containing that node
In this section, we first define some assumptions, then we
is affected, so there is a minimum impact to the diversity of the
provide the details of multiple paths discovery and maintenance,
routes [11].
as well as the traffic allocation and data transmission across the
The path discovery procedure is executed according to the
multiple paths.
following phases:

4.1. Assumptions
• Initialization phase: Each sensor node broadcast a HELLO
message to its neighboring nodes in order to have enough
information about which of its neighbors can provide it with the
We assume N identical sensor nodes are distributed randomly
highest quality data. Each sensor node maintains and updates
in the sensing filed. All nodes have the same transmission range,
its neighboring table during this phase. The neighboring table
and have enough battery power to carry their sensing, computing, contains information about the list of neighboring nodes of
and communication activities. The network is fully connected and the sensor node. Fig. 2 illustrates the structure of the HELLO
dens (i.e. data can be sent from one node to another in a multi- message. The link quality field is expressed in terms of signal-to-
hop bases). Each node in the network is assigned a unique ID and noise ratio (SNR) for the link between any node and its neighbor.
all nodes are willing to participate in communication process by Hop count gives the distance in hops for the message from its
forwarding data. Furthermore, we assume that the sensor nodes originator. As the message is only broadcasted to the neighbors
are stationery for their lifetime. Additionally, at any time, we of the node, this field is not used in this version of the protocol.
assume that each sensor node is able to compute its residual • Primary Path discovery phase: After initialization phase each
energy (the remaining energy level), and its available buffer size sensor node has enough information to compute the cost
(remaining memory space to cache the sensory data while it is function for its neighboring nodes. Then, the sink node locally
waiting for servicing), as well as record the link performance computes its preferred next hop node using the link cost
between itself and its neighboring node in terms of signal-to- function, and sends out a RREQ message to its most preferred
noise ratio (SNR). By examining recent link performance data, next hop (Fig. 3 shows the structure of the RREQ message).
predications and decisions about path stability may be made. Similarly, through the link cost function, the preferred next hop
J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857 853

Source Dest. Residual Free Link Route Table 1


Route ID Some values for the bound α [9].
ID ID Energy Buffer Quality Cost
α 95% 90% 85% 80% 50%
Fig. 3. RREQ message structure. xα −1.65 −1.28 −1.03 −0.85 0

RREQ RREQ
i1
Sink 0 9 P1

L paths for
RT traffic
5 i2

Traffic Allocation Scheme

Data Reassembly and Recovery


Real Time Traffic
RREO RREQ
P2

N- available paths
Instant Queue
RREQ IIIUSE

CLASSIFIER
7 RREQ iL

PACKET
2 Source
8 RREQ j1 Destination
3

NRT traffic
j2

M paths for
Non-Real Time Traffic
RREQ
6 RREQ jM
1 FIFO QUEUE
Source PN

4
Fig. 5. Functional diagram of the EQSR protocol.
Primary Path
where xα is the corresponding bound from the standard normal
Alternative Path distribution for different levels of α . Table 1 lists some values for xα .
Now out of the k paths, the protocol picks out a number of l
Fig. 4. Example of path discovery. paths to be used to transfer the real-time traffic, and m paths for
non-real-time traffic, where k = l + m. To calculate l, we assume
node of the sink computes locally its most preferred next hop in that the sensor node knows the size of its traffic (both real-time and
the direction of the source node, and sends out a RREQ message non-real-time traffic). Let Tr represents the size of the real-time
to its next hop, the operation continues until source node traffic, Tnr represents the size of the non-real-time traffic, then we
(see Fig. 4). have:
• Alternative Paths discovery phase: For the second alternate Tr
path, the sink sends alternate path RREQ message to its next l= k,
most preferred neighbor. To avoid having paths with shared Tr + Tnr
node, we limit each node to accept only one RREQ message. Tnr
m= k.
For those nodes that receive more than one RREQ message, Tr + Tnr
only accept the first RREQ message and reject the remaining As we divided the k paths between the real-time and non-real-
messages (see Fig. 4, for an example of path construction. In this time traffic according to the traffic size, we select the best l paths
example Node 9 computes its next preferred neighbor finds it that minimize the end to end delay to transfer the real-time traffic
Node 7. Node 9 generates RREQ message and forwards to node to ensure that the critical-time data is delivered to the destination
7, but node 7 has been included in the primary path, then node within the time requirements, with out any delay. To find the best
7 simply responds to node 9 with an INUSE message indicating baths in terms of the end-to-end delay, during the paths discovery
that node 7 is already selected in a routing path. Immediately phase, each sensor node estimates the time elapsed for the RREQ
node 9, searches its neighboring table and computes the next packet since its transmission from the node’s neighbor till it is
preferred neighbor, which will be node 5, and sends out RREQ received by the node itself. By accumulating this time, the source
message to it. Node 5 accepts the message and continues the node can compute end-to-end delay for each of the available paths.
procedure in the direction of the source node).
4.6. Traffic allocation and data transmission
4.4. Path refreshment
Our protocol employs the queuing model presented in [2] to
In order to save energy, we reduce the overhead traffic through handle both real-time and non-real-time traffic. Two different
reducing control messages. Therefore, instead of periodically queues are used, one instant priority queue for real-time traffic,
flooding a KEEPALIVE message to keep multiple paths alive and and the other queue follows the first in first out basis for non-
real-time traffic. Fig. 5 shows the functional diagram of the EQSR
update cost function metrics, we append the metrics on the data
protocol.
message by attaching the residual energy, remaining buffer size,
The source node knows the degree of the importance of each
and link quality to the data message.
data packet it is sending which can be translated into predefined
priority levels. The application layer sets the required priority level
4.5. Paths selection for each data packet by appending an extra bit of information to
act as a stamp to distinguish between real-time and non-real-time
After the completion of paths discovery phase and the paths packets. Based on the packet type, the classifier directs packets
have been constructed, we need to select a set of paths from the into the appropriate queue. The traffic allocation scheme first
N available paths to transfer the traffic from the source to the des- splits up the packets into a number of equal sized sub-packets
tination with a desired bound of data delivery given by α . To find (or segments), and then schedules sub-packets simultaneously for
the number of required paths, we assume that each path is asso- transmission across the available multiple paths. Before scheduling
ciated with some rate pi (i = 1, 2, . . . , N ) that corresponds to the the sub-packets, the traffic allocation scheme adds error correction
probability of successfully delivering a message to the destination. codes to improve the reliability of transmission and to increase
Following the work done in [9], the number of required paths is the resiliency to paths failures and ensure that an essential portion
calculated as: of the packet is received by the destination without incurring any
v
u N
uX N
X delay and more energy consumption through data retransmission.
k = xα .t pi (1 − pi ) + pi At the sink node, the parts are collected, reassembled, and the
i=1 i =1
original message is recovered. More details are given below.
854 J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857

l l 4.7.3. Data forwarding and recovery


After computing the XOR error correction codes, the segments
S0 S1 S2 SN-2 SN-1 C0 C1 C2 CM
of the original message (S1 , S2 , S3 , . . . , SN ) along with the error
correction codes (C0 , C1 , C2 , C3 , . . . , CM ) are sent out across the
Original Message Correction codes multiple available paths. In [4], authors have proven that if M
or less segments are lost out of the N + M total data and
overhead (correction codes), the original N message segments
UP ID MS Off SA DA PT Data can be recovered using appropriate linear transformations (in our
UP: Cost Metrics SA: Source Address case through XOR operation). The original message could be
ID: Identification DA: Destination Address regenerated as follow:
MS: More Segments Data: upto 256 bytes
Offset: Segment Offset PT: Extra bit marks the packet type (0:NRT, 1:RT) S1 = C0 ⊕ C2
S2 = C0 ⊕ C3
Fig. 6. Packet format (original message and correction codes).
..
4.7. Data transfer across multiple paths
.
S M = C0 ⊕ C1 .
Data transfer is done through two steps; packet segmentation
and encoding; data forwarding and Recovery. The details are given Fig. 6 shows the packet segmentation and the fields in each
below: segment (or sub-packet). We use a fixed segment length, and
segments must have a length that is a multiple of 8, to allow
4.7.1. Data packet segmentation and encoding proper offset specification. The UP field is an encoded peace of
The data packet is split up into N equal sized segments information that represents the current value of metrics used in the
(S0 , S1 , S2 , . . . , SN −1 ), and over head part of M + 1 (where M < cost function (i.e. residual energy, remaining buffer size, and SNR
N) error correction codes (C0 , C1 , C2 , C3 , . . . , CM ) of same size as ratio) to avoid excessive control packets to maintain and keep routs
the data segment are added to the original message (see Fig. 5). alive. Each node along the path, after updating its neighboring table
The data segments and error correction codes are of the same with this information, changes this value by its current metrics
size (l bytes) and are specified in unites of 8 bytes, which is and forwards the sub-packet into its next hop. The Identification
why segment length should be a multiple of 8 (by referring to field (ID) is a unique identifier assigned to each message being
Fig. 6, the off field is used to solve the problem of reassembling fragmented. The field is used by the sink node to reassemble
the message at the receiver side. Off field helps in sequencing messages without accidentally mixing segments from different
segments by indicating to the receiver where in the overall messages. More Segments (MS), this bit is set to 1 for all segments
message each particular segment should be placed). Correction except the last one, which has it set to 0. When the segment with
codes are calculated as a function of the information bits to provide a value of zero in the MS bit is seen, the receiver knows that it has
redundant information. We use an XOR-based coding algorithm received the last segment of the message. Segment Offset (off), this
like the one presented in [27]. This algorithm does not require high
field solves the problem of sequencing segments by indicating to
computation power or high storage space. The correction codes are
the receiver where in the original message each particular segment
computed as follow:
should be placed. The PT field is an extra bit, used to distinguish
C0 = S0 ⊕ S1 ⊕ S2 ⊕ · · · ⊕ SN −1 between real-time and non-real-time packets, in order for the
C1 = S1 ⊕ S2 ⊕ S3 ⊕ · · · ⊕ SM packet classifier to forward each packet to its appropriate queue.
C2 = S2 ⊕ S3 ⊕ S4 ⊕ · · · ⊕ S(M +1)mod N
C3 = S3 ⊕ S4 ⊕ S5 ⊕ · · · ⊕ S(M +2)mod N 5. Performance evaluation of EQSR protocol
..
. We evaluate the performance and validate the effectiveness
of our EQSR through simulation. In this section, we describe
CM = SM ⊕ S1 ⊕ S2 ⊕ · · · ⊕ S(M +k)mod N
the performance metrics, simulation environment and simulation
where ⊕ represents exclusive OR operation. results. We used NS-2 to implement and conduct a set of
Correction codes are generated for both types of traffic, real
simulation experiments for our protocol and do a comparative
time and non-real time. In the above equations; N = l for real-
study with the MCMP protocol [14].
time traffic, and N = m for non-real-time traffic (see Section 4.5).
Our simulation environment consists of 300 sensor nodes
randomly deployed in a field of 500 m × 500 m. All nodes are
4.7.2. Traffic allocation
identical with a radio transmission range set to 25 m. The sink node
After the selection of a set of multiple paths for both traffic
is situated at the upper right corner of the simulation field, and the
types (real time, and non-real time), and after adding FEC codes,
source node is situated on the left bottom corner. Table 2 shows
the source node can begin sending data to the destination along
the simulation parameters.
the paths. The traffic allocation mechanism used deal with how the
data is distributed amongst the available paths. We use a weighted We investigate the performance of the EQSR protocol in a multi-
traffic allocation strategy to distribute the traffic amongst the hop network topology. The metrics used in the evaluation are the
available paths to improve the end to end delay and throughput. energy consumption, delivery ratio, and average delay. The average
In this strategy, the source node distributes the traffic amongst the energy consumption is the average of the energy consumed by the
paths according to the end to end delay of each path. – The end to nodes participating in message transfer from source node to the
end delay of each path is estimated during the paths construction sink node. The delivery ratio is the number of packets generated
phase (refer to Section 4.5 for the estimation method) – Paths that by the source node to the number of packets received by the sink
have a smaller end to end delay are allocated more data segments node. The average delay is the average time required to transfer
than other paths. We assume that end to end delay of each path a data packet from source node to the sink node. We study the
is inversely proportional to the available bandwidth. To satisfy impact of packets generation rate and node failure probability on
this assumption, we assume that nodes in the sensor network are these performance metrics. Simulation results are averaged over
homogeneous and the bandwidth-delay product is a constant. several simulation runs.
J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857 855

Table 2
Simulation parameters.

Network field 500 m × 500 m


Number of sensors 200
Number of sinks/number of sources 1/1
Transmission range 25 m
Packet size (data + over head) 1024 bytes
Sub-packet size 256 bytes
Transmit power 15 mW
Receive power 13 mW
Idle power 12 mW
Sleep mode Power 0.015 mW
Initial battery power 100 J
MAC layer IEEE 802.11
Fig. 8. Packets delivery ratio.
Max buffer size 256 K-bytes
Buffer threshold 1024 bytes
Number of correction codes Set to 1/3rd of the available paths
Weights (α , β , and γ )respectively 3/2/3
Simulation time 1000 s

Fig. 9. Average energy consumption.

Fig. 7. Average end-to-end delay.

5.1. Impact of packets generation rate

In this experiment, we change the packets arrival rate at the


source node from 10 to 100 packets/s. The generated traffic at
the source node is mixed traffic of both real- and non-real-time
traffic. The real-time traffic is set to 10% of the generated traffic.
We compare our protocol with the MCMP protocol.

5.1.1. Average end-to-end delay


Fig. 10. Average packet delay as node failure increases.
End to end delay is an important metric in evaluating QoS
based routing protocols. The average packet delay of EQSR and
5.1.3. Average energy consumption
MCMP protocols as the packet arrival rate increases is illustrated
Fig. 9 shows the results for the energy consumption. From
in Fig. 7. In this experiment, we change the packet arrival rate
the figure, we note that MCMP slightly outperforms our protocol;
at the source node, and measure the delay for both real-time
and non-real-time traffic. From the results, it is clear that EQSR this is because of the overhead induced by the queuing model
successfully differentiates network service by giving high real-time and error codes computation. However, meeting the quality of
traffic absolute preferential treatment over low priority traffic. The service requirements (delay and throughput) introduces a certain
real-time traffic is always combined with low end-to-end delay. overhead in terms of energy consumption. Thus a minimum
MCMP protocol outperforms our protocol in the case of non-real- tradeoff with delay and throughput should be made to reduce
time traffic, because of the overhead caused by the queuing model. the energy expenditure [21]. By changing the network conditions
Furthermore, for higher traffic rates the average delay increases and considering node failures, the energy consumption of the
because the EQSR protocol gives priority to process real-time traffic MCMP protocol increases significantly as shown in Fig. 12, which
first, which causes more queuing delay for non-real-time traffic at is commented below in Section 5.2.3.
each sensor node.
5.2. Impact of node failure probability
5.1.2. Packet delivery ratio
Another important metric in evaluating routing protocols is the In this simulation experiment, we study the behavior of the
average delivery ratio. Fig. 8 shows the average delivery ratio of protocol in the presence of node failures. We fix the packets arrival
EQSR and MCMP protocols. Obviously, EQSR protocol outperforms rate at 50 packets/s, and change the node failure probability from
the MCMP protocol; this is because in the case of path failures, 0 to 0.05. The results are averaged over several simulation runs.
EQSR uses forward error correction (FEC) technique to retrieve the
original message, which is not implemented in the MCMP protocol. 5.2.1. Average delay
Implementing a FEC technique in the routing algorithm enhances The average packet delay of the EQSR and MCMP protocols as
the delivery ratio of the protocol as well as minimizes the overall the node failure probability increases is depicted in Fig. 10. We
energy consumption specially in the case of route failures. observe that, the MCMP protocol is very sensitive to the increase
856 J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857

protocol designed specifically for wireless sensor networks to


provide service differentiation by giving real-time traffic absolute
preferential treatment over the non-real-time traffic. Our protocol
uses the multi-path paradigm together with a Forward Error
Correction (FEC) technique to recover from node failures without
invoking network-wide flooding for path-discovery. This feature is
very important in sensor networks since flooding consumes energy
and consequently reduces the network lifetime.
Our EQSR protocol uses the residual energy, node available
buffer size, and signal-to-noise ratio to predict the next hop
through the paths construction phase. EQSR splits up the
transmitted message into a number of segments of equal size,
Fig. 11. Average delivery ratio as node failure increases. adds correction codes, and then transmits it over multiple paths
simultaneously to increase the probability that an essential portion
of the packet is received at the destination without incurring
excessive delay. EQSR protocol handles both real-time and non-
real-time traffic efficiently, by employing a queuing model that
provides service differentiation.
Through computer simulation, we have evaluated and studied
the performance of our routing protocol under different network
conditions and compared it with the MCMP protocol. Simulation
results have shown that our protocol achieves lower average delay,
more energy savings, and higher delivery ratio than the MCMP
protocol.
As a future work, we are intended to deeply analyze the
performance of our protocol and study the impact of the network
Fig. 12. Average energy consumption as node failure increases. size, path length, and buffer size on the performance metrics.

in node failure probability. The average delay of MCMP protocol References


increases up to approximately 1.6 s for node failure probability
of 0.05 (i.e. increased by about 1.4 s compared to Fig. 6). On the [1] Kemal Akkaya, Mohamed Younis, A survey on routing protocols for wireless
other hand, our EQSR protocol (either for real-time or non-real- sensor networks, Journal of Ad Hoc Networks 3 (3) (2005) 325–349.
time traffic) is not as sensitive to the increase of node failure [2] K. Akkaya, M. Younis, An energy aware QoS routing protocol for wireless
sensor networks, in: The Proceedings of the 23rd International Conference on
probability as MCMP protocol. The FEC technique implemented Distributed Computing Systems Workshops, Providence, RI, USA, May 19–22,
in EQSR protocol makes the protocol very effective and more 2003, pp. 710–715.
resilience to node failures. Furthermore, the delay is not affected [3] Jamal N. Al-Karaki, Ahmed E. Kamal, Routing techniques in wireless sensor
networks: a survey, IEEE Journal of Wireless Communications 11 (6) (2004)
too much as the node failure probability increases. 6–28.
[4] E. Ayanoglu, E. Chih-Lin, R.D. Gitlin, J.E. Mazo, Diversity coding for transparent
5.2.2. Average delivery ratio self-healing and fault-tolerant communication networks, IEEE Transactions on
Communications 41 (11) (1993) 1677–1686.
This average delivery ratio for both protocols is illustrated in [5] A.B. Bagula, K.G. Mazandu, Energy constrained multipath routing in wireless
Fig. 11. As the node failure probability increases, the delivery sensor networks, in: The Proceedings of the 5th International Conference on
ratio of MCMP protocol drops significantly (compared to Fig. 7, Ubiquitous Intelligence and Computing, UIC-2008, Oslo, Norway, June 23–25,
2008, pp. 453–467.
for node failure probability of 0.05, the delivery ratio dropped
[6] Somprakash Bandyopadhyay, Siuli Roy, Tetsuro Ueda, Kazuo Hasuike,
from 0.78 to 0.37). Contrary, the EQSR protocol is slightly affected Multipath routing in ad hoc wireless networks with directional antenna,
by the increase in the node failure probability. This is because in: The Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal
EQSR employs an error correction scheme which contributes Wireless Communications, PWC-2002, vol. 234, Singapore, October 23–25,
2002, pp. 45–52.
in increasing the delivery ratio in the case of path failures by [7] T. Bokareva, W. Hu, S. Kanhere, B. Ristic, N. Gordon, T. Bessell, M. Rutten, S. Jha,
reconstructing the original message using the generated XOR- Wireless sensor networks for battlefield surveillance, in: Proceedings of The
codes without the need to initiate data retransmissions. Land Warfare Conference, LWC Brisbane, Australia, October 24–27, 2006.
[8] D. Chen, P.K. Varshney, QoS support in wireless sensor networks: a survey,
in: The Proceedings of the International Conference on Wireless Networks,
5.2.3. Average energy consumption ICWN-2004, Las Vegas, Nevada, USA, June 2004, pp. 227–233.
Fig. 12 shows the results for the energy consumption under [9] S. Dulman, T. Nieberg, J. Wu, P. Havinga, Trade-off between traffic overhead
node failures. Obviously our EQSR protocol outperforms the MCMP and reliability in multipath routing for wireless sensor networks, in: The
Proceedings of IEEE Wireless Communications and Networking Conference,
protocol in this case. Compared to Fig. 8, we observe that EQSR WCNC-2003, vol. 3, New Orleans, Louisiana, USA, March 16–20, 2003,
protocol achieves more energy savings than MCMP protocol. This pp. 1918–1922.
is because EQSR protocol easily recovers from path failures and be [10] E. Felemban, C.G. Lee, E. Ekici, MMSPEED: multipath multispeed protocol for
QoS guarantee of reliability and timelines in wireless sensor networks, IEEE
able to reconstruct the original messages through the use of the Transactions on Mobile Computing 5 (6) (2006) 738–754.
FEC algorithm. While the MCMP protocol needs to initiate a data [11] Deepak Ganesan, Ramesh Govindan, Scott Shenker, Deborah Estrin, Highly-
retransmission to recover lost data, which leads to a significant resilient, energy-efficient multipath routing in wireless sensor networks, ACM
increase in the energy consumption (compared to Fig. 9). SIGMOBILE Mobile Computing and Communications Review 5 (4) (2001)
11–25.
[12] T. He, et al., SPEED: A stateless protocol for real-time communication in sensor
6. Conclusion networks, in: The Proceedings of the International Conference on Distributed
Computing Systems, Providence, RI, USA, May 19–22, 2003, pp. 46–55.
[13] M. Hefeeda, M. Bagheri, Wireless sensor networks for early detection of forest
In this paper, we have presented our EQSR protocol; an fires, in: The Proceedings of IEEE International Conference on Mobile Adhoc
energy efficient and quality of service aware multi-path routing and Sensor Systems, MASS-2007, Pisa, Italy, October 8–11, 2007, pp. 1–6.
J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857 857

[14] X. Huang, Y. Fang, Multiconstrained QoS multipath routing in wireless sensor [30] M. Younis, M. Youssef, K. Arisha, Energy aware routing in cluster based sensor
networks, Journal of Wireless Networks 14 (4) (2008) 465–478. networks, in: The Proceedings of the 10th IEEE International Symposium
[15] Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Hei- on Modeling, Analysis, and Simulation of Computer and Telecommunication
demann, Fabio Silva, Directed diffusion for wireless sensor networking, Systems, MASCOTS-2002, Fort Worth, Texas, USA, October 11–16, 2002,
ACM/IEEE Transactions on Networking (TON) 11 (1) (2002) 2–16. pp. 129–136.
[16] Wenjing Lou, Wei Liu, Yanchao Zhang, Performance optimization using mul- [31] Y. Zhang, M. Fromherz, Message-initiated constraint-based routing for
tipath routing in mobile ad hoc and wireless sensor networks, in: M. Cheng, wireless adhoc sensor networks, in: The Proceedings of the First IEEE
Y. Li, D.-Z. Zhu (Eds.), A Book Chapter in Combinatorial Optimization in Com- Consumer Communication and Networking Conference, CCNC-2004, Las
munication Networks Book, Kluwer, 2005, ISBN:978-0-387-29025-6. Vegas, Nevada, USA, Jan 5–8, 2004, pp. 648–650.
[17] Ye Ming Lu, Vincent W.S. Wong, An energy efficient multipath routing protocol [32] Y. Zhang, M. Fromherz, L. Kuhn, Smart routing with learning-based QoS-aware
for wireless sensor networks, International Journal of Communication System routing strategies. in: The Proceedings of First Workshop on QoS Routing,
20 (7) (2007) 747–766. Barcelona, Spain, October 1st, 2004.
[18] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, J. Anderson, Wireless
sensor networks for habitat monitoring, in: The Proceedings of the 1st ACM
International Workshop on Wireless Sensor Networks and Applications, ACM-
WSNA, Atlanta, Georgia, USA, September 28–28, 2002, pp. 88–97.
[19] José-F. Martinez, Ana-B. Garcia, Ivan Corredor, Lourdes Lopez, Vicente Hernan- Jalel Ben-Othman received his B.Sc. and M.Sc. degrees
dez, Antonio Dasilva, Trade-Off Between Performance and Energy Consump- both in Computer Science from the University of Pierre
tion Wireless Sensor Networks, in: Lecture Notes in Computer Science (LNCS), et Marie Curie, (Paris VI) France in 1992, and 1994
4725/2007, Springer-Verlag, Berlin, Heidelberg, 2007, pp. 264–271, ISBN:978- respectively. He received his Ph.D. degree from the
3-540-74916-5. University of Versailles, France, in 1998. He was an
[20] Anahit Martirosyan, Azzedine Boukerche, Richard Werner, Nelem Pazzi, A Assistant Professor at the University of Orsay (Paris 11) and
taxonomy of cluster-based routing protocols for wireless sensor networks, University of Pierre et Marie Curie (Paris 6), in 1998 and
in: The Proceedings of International Symposium on Parallel Architectures, 1999 respectively. He is now an Associate Professor at the
Algorithms, and Networks, ISPAN-2008, Sydney, Australia, May 7–9, 2008, University of Versailles since 2000.
pp. 247–253. Dr. Ben-Othman research interests are in the area of
[21] Anahit Martirosyan, Azzedine Boukerche, Richard Werner, Nelem Pazzi, wireless ad hoc and sensor networks, Broadband Wireless
Energy-aware and quality of service-based routing in wireless sensor Networks, multi-services bandwidth management in WLAN (IEEE 802.11), WMAN
networks and vehicular ad hoc networks, Annales des Télécommunications (IEEE 802.16), WWAN (LTE), security in wireless networks in general and wireless
63 (11–12) (2008) 669–681. sensor and ad hoc networks in particular. His work appears in highly respected
[22] Stephen Muller, Rose P. Tsang, Dipak Ghosal, Multipath routing in mobile ad international journals and conferences, including, IEEE ICC, Globecom, LCN, VTC,
hoc networks; issues and challenges, in: Performance Tools and Applications PIMRC etc.
to Networked Systems, in: Lecture Notes in Computer Science (LNCS), He has supervised and co-supervised several graduate students in these
vol. 2965, Springer, 2004, pp. 209–234, ISBN:3540219455. areas. His widely known for his wok on wireless ad hoc and sensor network, in
[23] K. Sohrabi, J. Pottie, Protocols for self-organization of a wireless sensor particular security. Since 2002, he has served as Technical committee of more than
network, IEEE Personal Communications 7 (5) (2000) 16–27. 40 international IEEE/ACM conferences and workshops including ICC, Globecom,
[24] K. Srinivasan, M. Ndoh, H. Nie, H. Xia, K. Kaluri, D. Ingraham, Wireless MSWIM, LCN, etc. He is a member of IEEE and ACM.
technologies for condition-based maintenance (CBM) in petroleum plants, He is also serving as the Local Arrangement Chair for the 13th IEEE International
in: The Proceeding of the International Conference on Distributed Computing Symposium on Computer Communication (ISCC 09). He serves as a TPC Co-Chair of
in Sensor Systems, DCOSS’05, (Poster Session), Marina del Rey, CA, USA, June 9th international Workshop on Wireless local Networks (WLN09), as a publicity
30–July 1, 2005, pp. 389–390. chair of 12-th ACM International Conference on Modeling, Analysis and Simulation
[25] Jack Tsai, Tim Moors, A review of multipath routing protocols: from wireless ad of Wireless and Mobile Systems (MSWIM 09), IEEE International Symposium on
hoc to mesh networks, in: The Proceedings of ACoRN Early Career Researcher a World of Wireless Mobile and Multimedia Networks (WOWMOM 2010), 25th
Workshop on Wireless Multihop Networking, Sydney, Australia, Jul. 17–18, Biennial Symposium on Communications and he serves as a TPC Co-Chair of IEEE
2006. Globecom Wireless Communications Symposium (Globecom 2010).
[26] Kui Wu, Janelle Harms, On-demand multipath routing for mobile ad hoc And he is active member of IEEE CIS-TC, TC AHSN, WTC.
networks, in: Proceedings of 4th European Personal Mobile Communication
Conference, EPMCC, Vienna, Austria, Feb 20–22, 2001.
[27] Zhiqiang Xiong, Zongkai Yang, Wei Liu, Zhen Feng, A lightweight FEC algorithm Bashir Yahya received a B.Sc. degree in Computer
for fault tolerant routing in wireless sensor networks, in: The Proceedings Engineering from Al-Fateh University, Tripoli, Libya, in
of International Conference on Wireless Communications, Networking and 1994, and an M.Sc. degree in Computer Networks from INT
Mobile Computing, WiCOM-2006, Wuhan, China, September 22–24, 2006, (Institut National des Télécommunications, Evry, France)
pp. 1–4. in 2004. Currently, he is a member of the Network
[28] N. Xu, S. Rangwala, K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, Architectures and Services (ASR) research group at PRiSM
D. Estrin, A wireless sensor network for structural monitoring, in: The laboratory, University of Versailles, Versailles, France,
Proceedings of the 2nd International Conference on Embedded Networked where he is pursing his Ph.D. degree in Computer Science.
Sensor Systems, Baltimore, MD, USA, November 03–05, 2004, pp. 13–24. Mr. Yahya research interests include medium access and
[29] Bashir Yahya, Jalel Ben-Othman, Towards a classification of energy aware MAC routing in wireless sensor networks, quality of service in
protocols for wireless sensor networks, Journal of Wireless Communications WSNs, cross layer optimization and design, and mobility
and Mobile Computing 9 (12) (2009) 1572–1607. management. He is a member of IEEE, IEEE Communication Society and ACM.

You might also like