Yakubu Labarans' Project
Yakubu Labarans' Project
Wireless networks have significantly impacted the world, since their initial
deployment. Wireless networks have continued to develop and their uses have
significantly grown. Cellular phones are nowadays part of huge wireless network
systems and people use mobile phones on a daily basis in order to communicate
with each other and exchange information. Recently, wireless networks have been
used for positioning as well in order to enable the provision of location oriented
services to the end-user. Different types of measurements available during standard
network and terminal operation, mainly for resource management and
synchronization purposes, can be employed to derive the user’s location. With
these numerous uses of wireless network, this project will focus on resources
sharing dedicated network. A professor at the University of Hawaii, Norman
Abramson developed the world’s first wireless computer communication network,
ALOHAnet (operational in 1971), using low-cost ham-like radios. The system
included seven computers deployed over four islands to communicate with the
central computer on the Oahu Island without using phone lines. WLAN hardware
initially cost so much that it was only used as an alternative to cabled LAN in
places where cabling was difficult or impossible. Early development included
industry-specific solutions and proprietary protocols, but at the end of the 1990s
these were replaced by standards, primarily the various versions of IEEE 802.11
(in products using the Wi-Fi brand name). An alternative ATM-like 5 GHz
standardized technology, HiperLAN/2, has so far not succeeded in the market, and
with the release of the faster 54 Mbit/s 802.11a (5 GHz) and 802.11g (2.4 GHz)
standards, it is even more unlikely that it will ever succeed. In 2009 802.11n was
added to 802.11. It operates in both the 2.4 GHz and 5 GHz bands at a maximum
data transfer rate of 600 Mbit/s.
1
Most new routers are able to utilize both wireless bands, known as dualband.
This allows data communications to avoid the crowded 2.4 GHz band, which is
also shared with Bluetooth devices and microwave ovens. The 5 GHz band is also
wider than the 2.4 GHz band, with more channels, which permits a greater number
of devices to share the space. Not all channels are available in all regions.
A wireless local area network (WLAN) links two or more devices using some
wireless distribution method (typically spread-spectrum or OFDM radio), and
usually providing a connection through an access point to the wider Internet. This
gives users the ability to move around within a local coverage area and still be
connected to the network. Most modern WLANs are based on IEEE 802.11
standards, marketed under the Wi-Fi brand name.
2
- To take an advantage of based random walk algorithm in going distributed
search application for avoiding number of transmissions.
- To calculate time taken to cover the entire network after initiation of a
search from a randomly selected initial node in designed network
1.6 LIMITATIONS
3
1.7 TERMINOLOGIES
- ROUTER
A router is a piece of hardware or software that receives, filters, and sends data
packets across networks. A router is connected to at least two networks, commonly
LANs (Local Area Networks) or WANs (Wide Area Network).
-PROTOCOL:
These are set of rules outlining how connected devices communication across a
network to exchange information easily and safely.
-DUALBAND:
These are routers which are capable of transmitting and receiving data using both
2.4 GHz and 5GHz frequencies either simultaneously or one at a time.
Dual band also incorporate multiple-In Multiple-Out radio configurations. The
combination of several radios on one band with dual-band support provides higher
performance for home networking than single-band routers offers.
-RADIO MODEMS:
These are modems that transfer data wirelessly across a range of up to tens of
kilometers. Radio modems encode, transmit, receive and decode serial data using
radio waves. They connect to serial ports on devices such as video cameras and
data acquisition systems, and send signals to receive signals from other radio
modems
1.6.5 NETWORK SWITCH:
1.6.6 HUB
It is an electrical device which converts electric currents into radio waves, and vice
versa. It is usually used with a radio transmitter or radio receiver. In transmission, a
radio transmitter supplies an electric current oscillating at radio frequency (i.e. high
frequency AC) to the antenna's terminals, and the antenna radiates the energy from
the current as electromagnetic waves (radio waves). In reception, an antenna
intercepts some of the power of an electromagnetic wave in order to produce a tiny
voltage at its terminals that is applied to a receiver to be amplified. An antenna can
be used for both transmitting and receiving.
5
CHAPTER TWO
LITERATURE REVIEW
2.0 OVERVIEW
This chapter will be focus on what improvement wireless LAN has undergo so far
but it can be interchange for what improvement wireless router (IEEE 802.11)
specification has undergo. IEEE was the institutional body that given standards set
and protocols. Wireless Local Area Network (WLAN), also known as IEEE
802.11, is a set of standards that enable over-the-air communication in medium
range distances (approximately 30-150 m).
6
The 802.11a standard uses the same data link layer protocol and frame format as
the original standard, but uses OFDM as modulation skin. It operates in the 5 GHz
band with a maximum data rate of 54 Mbps. Achievable throughputs in the mid-20
Mbps. Since the 2.4 GHz band is heavily used to the point of being crowded, using
the relatively un-used 5 GHz band gives 802.11a a significant advantage.
However, this high carrier frequency also brings a disadvantage: the effective
overall range of 802.11a is less than that of 802.11b/g. In theory, 802.11a signals
are absorbed more readily by walls and other solid objects in their path due to their
smaller wavelength and, as a result, cannot penetrate as far as those of 802.11b. In
practice, 802.11b typically has a higher range at low speeds (802.11b will reduce
speed to 5 Mbps or even 1 Mbps at low signal strengths). However, at higher
speeds, 802.11a often has the same or greater range due to less interference.
7
802.11b has a maximum raw data rate of 11 Mbps and uses the same media access
method defined in the original standard. 802.11b products appeared on the market
in early 2000, since 802.11b is a direct extension of the modulation technique
defined in the original standard. The dramatic increase in throughput of 802.11b
(compared to the original standard) along with simultaneous substantial price
reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN
technology. 802.11b devices suffer interference from other products operating in
the 2.4 GHz band. Devices operating in the 2.4 GHz range include: microwave
ovens, Bluetooth devices, baby monitors and cordless telephones.
8
Max Indoor Range: ~150 feet/45 meters
In June 2003, a third modulation standard was ratified: 802.11g. This works in the
2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme
as 802.11a. It operates at a maximum physical layer bit rate of 54 Mbps exclusive
of forward error correction codes, or about 22 Mbps average throughputs. 802.11g
hardware is fully backwards compatible with 802.11b. They then proposed
802.11g standard was rapidly adopted by consumers starting in January 2003, well
before ratification, due to the desire for higher data rates, and reductions in
manufacturing costs. By summer 2003, most dual-band 802.11a/b products became
dual-band/tri-mode, supporting 802.11a and 802.11b/g in a single mobile adapter
card or access point. Details of making b and g work well together occupied much
of the lingering technical process; in an 802.11g network, however, activity of an
802.11b participant will reduce the data rate of the overall 802.11g network. Like
802.11b, 802.11g devices suffer interference from other products operating in the
2.4 GHz band.
The IEEE 802.11i standard focuses on addressing all aspects of wireless security—
even beyond client authentication and data privacy using WEP keys. As the
802.11i standard was being developed, wireless LAN vendors have moved ahead
to implement as many of its features as possible. As a result, the Wi-Fi Alliance
developed Wi-Fi Protected Access (WPA) based on some of the 802.11 draft
components. This is the most recent version of encryption for wireless networks. It
is defined as MAC Layer Security Enhancements for 802.11. It increases the
encryption sophistication of WEP using the Advanced Encryption Standard (AES).
The hardware of devices that use 802.11i must be designed to handle AES. The
two are not compatible, they are completely unique. Older legacy 802.11 products
are not upgradeable. For some administrators, this provides some issues if they are
upgrading their entire system to an 802.11i based encryption. Some of the
equipment may simply need to be replaced in order to comply.
10
2.7 IEEE 802.11-2012 STANDARD and SPECIFICATION.
In 2007, task group TGmb was authorized to "roll up" many of the amendments to
the 2007 version of the 802.11 standard. REVmb or 802.11mb, as it was called,
created a single document that merged ten amendments (802.11k, r, y, n, w, p, z, v,
u, and s) with the 2007 base standard. In addition much cleanup was done,
including a reordering of many of the clauses. Upon publication on March 29,
2012, the new standard was referred to as IEEE 802.11-2012.
IEEE 802.11ad is an amendment that defines a new physical layer for 802.11
networks to operate in the 60GHz millimeter wave spectrum. This frequency band
has significantly different propagation characteristics than the 2.4GHz and 5GHz
band where Wi-Fi networks operate. Products implementing the 802.11ad standard
are being brought to market under the WiGig brand name. The certification
11
program is now being developed by the Wi-Fi Alliance instead of the now defunct
Alliance. The peak transmission rate of 802.11ad is 7Gbit/s.
IEEE 802.11ai is an amendment to the 802.11 standard which will add new
mechanisms for a faster initial link setup time.
IEEE 802.11aq is an amendment to the 802.11 standard which will enable pre-
association discovery of services. The extend some of the mechanism in 802.11u
that enabled device discovery to further discover the service running on a device,
or provided by a network.
IEEE 802.11ax is the successor to 802.11ac and will increase the efficiency of
WLAN networks. Currently at a very early stage of development this project has
the goal of providing 4 times the throughput of 802.11ac.
13
The original goal of the IEEE 802.11 Task Group T (TGT) was to develop
performance metrics, measurement methods, and test conditions to measure the
performance metrics, measurement methods and test conditions to measure the
performance of 802.11 wireless networking equipment.
Within the IEEE 802.11 Working Group, the following IEEE Standards
Association Standard and Amendments exist:
(June 2012)
IEEE 802.11ac: Very High Throughput <6 GHz; potential improvements over
802.11n: better modulation scheme (expected ~10% throughput increase), wider
channels (estimate in future time 80 to 160 MHz), multi user MIMO; (December
2013)
IEEE 802.11ad: Very High Throughput 60 GHz (December 2012) - see WiGig
IEEE 802.11ae: Prioritization of Management Frames (March 2012)
2.2 IN PROCESS
IEEE 802.11ah: Sub 1 GHz license exempt operation (e.g. sensor network,
smart metering) (~ March 2016)
16
IEEE 802.11ai: Fast Initial Link Setup (~ November 2015)
802.11F and 802.11T are recommended practices rather than standards, and are
capitalized as such.
17
2.2.1 TABLE 1: PROJECT STANDARD and SPECIFICATION
Rang
Effective e (typical
IEEE Operating Throughp indoo
Release Frequenc Throughput r distance
Wireless y ut Speeds
Date (maximu Speeds* in meters)*
Specification Range m
802.11a 1999 5.15- 54 Mbps 23 Mbps ~25 meters
5.35/5.4
7
-
2.4-2.5
802.11b 1999 GHz 11 Mbps 5 Mbps ~35 meters
2.4-2.5
802.11g 2003 GHz 54 Mbps 23 Mbps ~25+ meters
802.11n 2007 2.4 GHz or540 Mbps 100 Mbps ~50 meters
5GHz
(unappro bands
ved
CHAPTER THREE
18
3.0 DESIGN CONSIDERATION
Identifying which services and applications the WLAN must support is a key to
building a robust, relevant, scalable and sustainable architecture. It is strongly
urged to consider the following elements of any one-to-one initiative:
- Throughput requirements
-Special attention should be considered for NOUN SST staff taking their laptop
home to access the Internet or other resources.
Obtain floor plans for NOUN SST 6TH Floor included in the project.
Determine how many Access Points it will take to provide a signal to the
desired coverage area.
19
Identify signal trouble areas and physical construction or environmental
challenges.
Verify that there is a power source near the intended location for each Access
Point or Power over Ethernet compatibility.
Confirm there is a way to run a patch cable between your wired network and
each AP and/or APs to be used as repeaters. List specialized antennae
requirements.
Determine AP network cabling distances and are within CAT-5 or 6 limits
(~100m)
- End-user requirements.
20
3.2.1 TECHNOLOGY
21
FIGURE 1: Wireless Network Consisting of Stand Alone Access,
Planning a Wireless
3.2.2 Network
22
- AP activity is coordinated by a wireless centralized controller.
Encryption/decryption and authentication are performed at the controller, instead of
at the individual APs;
- There is a smaller, isolated wireless coverage area that requires only one or
a few APs; and
It is worth noting that when APs are first deployed, they must be configured. Such
things as radio settings and authorized users must be added. Once WLANs are
installed they are subject to frequent change as manufacturers update firmware and
introduce new products; as new students are introduced and as security codes are
updated. Each of these changes requires an administrator to ―touch‖—physically
or electronically— each AP or device that connects to the WLAN. It is not cost
effective to manage WLANs device by device, and hence if there will be more than
24
just a few APs on your WLAN, option for the centrally coordinated architecture. A
centrally coordinated WLAN is well suited to deployments where:
- There are one or more large wireless coverage areas that require multiple
APs possibly accompanied by several smaller isolated coverage areas;
- RF network self-healing is required; and
- A redundant state-failover solution is required.
There is no question that the trends indicate centrally coordinated solutions are
becoming the de facto standard. As wireless LAN deployments continue to grow
larger, accommodating ever greater numbers of users, there will be an increasing
demand to centrally manage a wide range of security, performance and
configuration attributes as a single system from a single dashboard or software
interface.
25
As for all of their attractions in terms of performance, flexibility and
affordability, WLANs also pose management challenges very different from
those of wired networks. These challenges increase geometrically as WLANs
grow in size, scope and complexity. The solution is to automate these
management tasks by implementing best practice service level management
processes and tools.
Emerging field tools are also complementing IT toolkits in filling the need to
effectively manage the wireless environments. These tools provide the ability
to detect rogue APs, determine security levels, determine where there are
potential interference sources for wireless, such as cordless phones, and
analyze wireless data.
There are many different ways to set up a wireless network. A certain density of
APs is required to provide satisfactory network coverage and capacity, while
many aspects of WLANs are analogous to wired LANs and should be managed
in a consistent fashion; some aspects of wireless are unique. Wireless is a
shared medium and, as such, requires careful planning for dynamic usage
profiles and capacity variations.
4.1 Hardware
May requires witch standard applicable for VLAN which support PoE,
VLAN or capacity.
Older hardware is in compatible with new security standards and
Can older hardware support the new wireless cards? Is there room for them?
4.2 System Software Requirement
4.2.1 Software
Desktop and laptop patch management should be deployed to ensure the latest
product patches are pushed to all clients. This will help to increase security, reduce
compatibility challenges, keep interfaces consistent and decrease support costs over
time. Have a comprehensive desktop management strategy that includes all mobile
devices and laptops. A comprehensive, centralized dashboard to monitor, maintain,
manage and report on all desktop management aspects. Do not settle for just patch
management software. The feature and functionality set of the chosen management
system should be comprehensive and in one simple Graphical User Interface
(GUI).
4.2 Personal Firewalls
Personal firewall software should be deployed on each and every laptop. Ideally,
these software firewalls will function within a centrally controlled system that can
enforce usage with and is compatible with your hardware firewalls. All laptops
with a wireless NIC must have a personal firewall installed that supports
connection-specific policies. As laptops are often outside the protection of the
school or district firewall, every laptop should have a personal firewall
installed.Thiswillbecriticalforstudentstakingtheirlaptopshomeandthenreturning,
with potential infections, to the school WLAN. The firewall built into Vista may
provide sufficient baseline security for student laptop use, although software client
licenses compatible with your firewall solution at either the school site or district
head office is better. What is built into Windows XP is not sufficient. The personal
29
firewall should be configured to block split tunneling and any ad hoc WLAN
connections.
4.2.1 Anti-Virus(A/V)
Anti-Virus protects and minimizes threats, and is essential for all laptops because
new viruses proliferate daily and spread quickly. Anti-Virus should be centrally
controlled so the definitions can be monitored. If not, definitions may not be
updated and laptops would eventually get a virus. MacAfee, Symantec, Trend
Micro, Computer Associates and many other vendors have central control and
monitoring. Despite offerings for stand alone, typically consumer versions, do not
implement the seas they do not have central management and require maintenance
and updates. Some small districts may have this in place on guest or even existing
legacy laptops accessing their WLANs. This practice should stop immediately.
4.2.2 Anti-Spyware(A/S)
Security certificates and critical data will be accessible to a savvy user who
happens to come across a lost or stolen laptop, and includes all access settings to
the WLAN and other resources including applications, VPN and more. Using EFS,
systems will make it challenging, if not impossible, even for a highly skilled user to
crack and gain access without the user’s network password. In this scenario,
password policy and enforcement is critical. The key to address here is that if a
30
laptop is lost, no one could access the data on it. Imagine if a principal’s laptop
were stolen while travelling and all of the private data therein were exposed to a
thief.
31
CHAPTER FIVE
5.1 SUMMARY
This report demonstrate various search process problems in unstructured network
as well as this report represent entire project process by classifying various project
functionalities. Which also demonstrate project requirements and technical usage
structure for developing distributed dynamic application and classify proposed
method for resolving spatial queries problems by establishing dynamic network
model using network simulator, the proposed model will identify problem
statement in existing system and reconstruct entire network by accepting dynamic
search process
5.2 CONCLUSION.
I had to put tremendous amount of thought and planning into wireless network
network. Its solution is innovative and functional and can be a cost effective
5.0 RECOMMENDATION.
32
your specific user-base requirements. However, use the WLAN vendor’s
published recommendations as a rough guideline.
It is recommended that at minimum a WLAN Intrusion
Detection System (IDS) or an integrated Intrusion detection
and prevention solution. The latter not only identifies
intrusions, but also addresses them automatically.
Centralized control is generally recommended as it eases administration
burden and can give management high level reports of the entire
organization’s activity. Also, it is strongly recommended to use centrally
manageable security appliances.
It is strongly recommended that you use your core expertise in
understanding the fundamentals of delivering education to grow students’
experience and knowledge as the base of your decision making.
Recommended to have standard device type(s).This can be one single
laptop make and model for every eligible staff across the district, or,
multiple standard laptops and PDAs for association one-to-one initiatives.
Design a strong and encompassing wireless networking policy. One clause
strongly recommended is that wireless APs must only be attached to a
dedicated network segment, and not to a segment containing other network
resources.
Implementing a standardized policy for school owned laptops used by
students in a one-to-one program is highly recommended.
33
REFFERENCE
BACCOUR, N., KOUB, A., YOUSSEF, H., JAM, M. B., ROS, D. D., RIO,
ALVES, R. & BECKER, L. B. 2010. F-LQE: a fuzzy link quality estimator for
wireless sensor networks. Proceedings of the 7th European conference on Wireless
Sensor Networks. Coimbra, Portugal: Springer-Verlag.
BERZOSA, J., MABE, J., GRABHAM, N. J. & TUDOR, M. J. 2012. Social issues
of power harvesting as key enables of WSN in pervasive computing. 2012 IEEE:
International Conference on Pervasive Computing and Communications
Workshops (PERCOM Workshops).
34
BILLINGS, S. A. & VOON, W. S. F. 1983. Structure detection and model validity
tests in the identification of nonlinear systems. Proceeding of the institution of
electronic engineers. UK
CHAMP, J., SAAD, C. & BAERT, A.-E. 2009. Lifetime in Wireless Sensor
Networks. Complex, Intelligent and Software Intensive Systems, 2009. CISIS '09.
International Conference on.
CHU, H.-T., HUANG, C.-C., LIAN, Z.-H. & TSAI, J. J. P. 2006. A ubiquitous
warning system for asthma-inducement. IEEE Computer Society.
DONG, Q., BANERJEE, S., ADLER, M. & MISRA, A. 2005. Minimum energy
reliable paths using unreliable wireless links. Proceedings of the 6th ACM
international symposium on Mobile ad hoc networking and computing. Urbana-
Champaign, IL, USA: ACM.
35
FENGYUAN REN, J. Z., TAO HE, CHUANG LIN, SAJAL K. DAS, December,
2011 EBRP: Energy-Balanced Routing Protocol for Data Gathering in Wireless
Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, , 22,
2108-2125
FOSTER PROVOST, T. F. 2013. Data Science for Business: What you need to
know about data mining and data-analytic thinking, O'Reilly Media.
HANDE, A. & CEM, E. 2010. Wireless sensor networks for healthcare: A survey.
Comput. Netw. %@ 1389-1286, 54, 2688-2710.
36
HEINZELMAN, W. 2000. Application Specific Protocol Architectures for
Wireless Networks. Ph.D Thesis, Massachusetts Institute of Technology.
HOULE, M. E., KRIEGEL, H.-P., KR, P., GER, SCHUBERT, E. & ZIMEK, A.
2010. Can shared-neighbor distances defeat the curse of dimensionality?
Proceedings of the 22nd international conference on Scientific and statistical
database management. Heidelberg, Germany: Springer-Verlag.
37
INTANAGONWIWAT, C., GOVINDAN, R. & ESTRIN, D. Directed dicusion: a
scalable and robust communication paradigm for sensor networks. Proceedings of
ACM MobiCom '00, 2000 Boston, MA. 56-67.
ISLAM, S., KEUNG, J., LEE, K. & LIU, A. 2012. Empirical prediction models for
adaptive resource provisioning in the cloud. Future Generation Comp. Syst., 28,
155-162.
JEONGGIL, K., JONG HYUN, L., YIN, C., RV, ZVAN MUSVALOIU, E.,
ANDREAS, T., GERALD, M. M., TIA, G., WALT, D., LEO, S. & RICHARD, P.
D. 2010. MEDiSN: Medical emergency detection in sensor networks. ACM Trans.
Embed. Comput. Syst, 10, 1-29.
KONRAD, L., DAVID, J. M., THADDEUS, R. F. F.-J., ALAN, N., ANTONY, C.,
VICTOR, S., GEOFFREY, M., MATT, W. & STEVE, M. 2004. Sensor Networks
for Emergency Response: Challenges and Opportunities. IEEE Pervasive
Computing, 3, 16-23.
38
KORKALAINEN, M., SALLINEN, M., K, N., RKK, INEN & TUKEVA, P. 2009.
Survey of Wireless Sensor Networks Simulation Tools for Demanding
Applications. Proceedings of the 2009 Fifth International Conference on
Networking and Services. IEEE Computer Society.
LE, H., HOANG, D. & POLOAH, R. 2008. S-Web: An Efficient and Self-
organizing Wireless Sensor Network Model. Lecture Notes in Network-Based
Information Systems, 5186, 179-188.
LI, X.-Y., SONG, W.-Z. & WANG, W. 2005. A unified energy-efficient topology
for unicast and broadcast. Proceedings of the 11th annual international conference
on Mobile computing and networking. Cologne, Germany: ACM.
LIU, A., REN, J., LI, X., CHEN, Z. & SHEN, X. 2012. Design principles and
improvement of cost function based energy aware routing algorithms for wireless
sensor networks. Computer Networks, 56, 1951-1967.
39
MAO, X., TANG, S., XU, X. & LI, X.-Y. 2011. Energy Efficient Opportunistic
Routing in Wireless Sensor Networks. Parallel and Distributed Systems, IEEE
Transactions, 22, 1934-1942.
MIN, R., BHARDWAJ, M., CHO, S.-H., SHIH, E., SINHA, A., WANG, A. &
CHANDRAKASAN, A.
2001. Low-power wireless sensor networks. Fourteenth International Conference
on VLSI Design.
NORMAN, J., JOSEPH, J. P. & ROJA, P. P. 2010. A Faster Routing Scheme for
Stationary Wireless Sensor Networks - A Hybrid Approach. CoRR, abs/1004.0421.
40
down hospital unit. Proceedings of the 8th ACM Conference on Embedded
Networked Sensor Systems ACM.
QIONG, H., BO, D. & SUBIR, B. 2013. Pulse Switching. Wireless Sensor
Networks. CRC Press.
S. PARK, W. L., AND D.-H. CHO. 2012. Fair clustering for energy efficiency in a
cooperative wireless sensor network. In 75th IEEE Conference on Vehicular
Technology.
SHAH, R. C. & RABAEY, J. M. 2002. Energy aware routing for low energy ad
hoc sensor networks.
IEEE Conference on Wireless Communications and Networking.
SRAVAN, A., KUNDU, S. & PAL, A. 2007. Low Power Sensor Node for a
Wireless Sensor Network.
20th International IEEE Conference on VLSI Design.
TIAN, Y., JARUPAN, B., EKICI, E. & ÖZGÜNER, F. 2006. Real-time task
mapping and scheduling for collaborative in-network processing in DVS-enabled
wireless sensor networks. . IPDPS. IEEE.
TWALA, B. 2014. Reasoning with Noisy Software Effort Data. Appl. Artif. Intell.,
28, 533-554.
WAN, P.-J., CALINESCU, G., LI, X.-Y. & FRIEDER, O. 2002. Minimum-energy
broadcast routing in static ad hoc wireless networks. ACM Wireless Networks.
43
WANG, Q., HEMPSTEAD, M. & YANG, W. A Realistic Power Consumption
Model for Wireless Sensor Network Devices. Third Annual IEEE Communications
Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
(IEEE SECON 2006), 2006a VA, USA. IEEE, 286-295.
WOOD, A., VIRONE, G., DOAN, T., CAO, Q., SELAVO, L., WU, Y., FANG,
L., HE, Z., LIN, S., STANKOVIC, J., 2006. ALARM-NET: wireless sensor
networks for assisted-living and residential monitoring; . In: CS-2006-01, T. R.
(ed.). Department of Computer Science, University of Virginia: Charlottesville,
VA, USA.
XU, S. & SAADAWI, T. 2001. Does the IEEE 802.11 MAC protocol work well in
multihop wireless ad hoc networks? Comm. Mag., 39, 130-137.
XU, Y., BIEN, S., MORI, Y., HEIDEMANN, J. & ESTRIN, D. 2003. Topology
Control Protocols to Conserve Energy in Wireless Ad Hoc Networks. California:
Center for Embedded Networked Computing.
YIN, G., YANG, G., WU, Y. & ZHANG, B. 2008. Energy-Efficient Routing
Algorithms for Wireless Sensor Networks. Internet Computing in Science and
Engineering, 2008. ICICSE '08. Harbin: IEEE.
44
integrating digital telemetry for medicine. Engineering in Medicine and Biology
Society, 1998. Proceedings of the 20th Annual International Conference of the
IEEE 3
ZHANG, L., YANG, W., RAO, Q., NAI, W. & DONG, D. 2013. An Energy
Saving Topology management Algorithm Based on Dijkstra in Wireless Sensor
Networks. Journal of Information & Computational Science. IEEE Computer
Society.
45