General Information:
Instructor: Katia Obraczka (katia "at" soe "dot" ucsc "dot" edu)
Lab: Internetwork Research Group (i-NRG) (https://inrg.soe.ucsc.edu)
Office hours: TBD
Lectures:
When: Tue Thu 11:40 - 1:15am
Where: Soc Sci 2 363
Course Overview:
This class covers various topics relevant to wireless networking and mobile computing. It focuses on communication protocols for wireless and mobile networks from medium-access control to end-to-end transport and applications. The course requires extensive reading of research papers and in-class presentations, participation, and discussion. Programming proficiency is assumed since students will be required to complete a major class project.
Pre-requisites: CSE 250A or equivalent.
Topics covered:
. Medium access control
. Routing (unicast and multicast)
. Wireless internetworking
. End-to-end protocols
. Other:
. Networking paradigms: disruption-tolerant networking, software-defined networking
. Edge computing and edge intelligence
. Mobility characterization and modeling
. Power and topology management
. Security
. Internet of Things and Sensor Networks
Resources: No textbook is required since most of the required readings will be from research papers. The book "Ad Hoc Wireless Networks: Architectures and Protocols" by C. Siva Ram Murthy and B.S. Manoj can be used as a reference. Students can check with the instructor on additional reference sources. All material for the class will be distributed and managed online using the class Web page.
Evaluation:
. In-class presentation: 20%
. Reading reports: 10%
. Project: 40%
. Exam: 30%
IMPORTANT NOTE: Grades of C and below will be assigned to students who do not perform satisfactorily. Students should not assume that a passing grade will be assigned simply because this is a graduate class.
Attendance:
=> Class attendance is mandatory. Because this is a graduate class, students are expected to participate actively in class, and that's hard to do if they do not attend class regularly. Attendance will not be recorded, but students cannot miss more than two classes. If a student needs to miss a class, they must let the instructor know (in advance if possible).
COVID-19 and other health and emergency preparedness information: Each individual at UC Santa Cruz should act in the best interests of everyone else in our community. Please take care to comply with all university guidelines regarding current health and safety measures. If you are ill or suspect you may have been exposed to someone who is ill, or if you have symptoms that are in any way similar to those of COVID-19, please err on the side of caution and stay home until you are well or have tested negative after an exposure. Please communicate with the teaching staff if you experience an illness, exposure or any other emergency situation that requires you to miss class and/or lab session. A Zoom link for the lectures will be provided in case attendence needs to be done remotely.
The class has been designed following current campus guidance and with current public health policies in mind. However, these guidelines may change due to shifting public health and safety guidelines. As such, the class format may be altered which may include moving in-person sessions onto Zoom and/or modifying course assignments to work in a remote format. The instructor will communicate clearly with students via email and through the class Web page and bulletin board about any changes that occur. As much advance warning as possible will be provided as well as information needed to transition smoothly to the new format. If there are any questions about the changes, make sure to reach out to the instructor.
Student Responsibilities:
Students enrolled in this class are agreeing to the following:
=> ACADEMIC INTEGRITY: All work turned in as reports, project, and exam MUST be individual. If any work claimed by a student to be their own is found to not to be their own and/or is shared with others, that will be considered a violation of academic integrity and will NOT BE TOLERATED. Academic integrity violations may result in automatically failing the class. For more information on UCSC's academic integrity policies, visit http://www.ucsc.edu/academics/academic-integrity/index.html. Students are encouraged to discuss with the instructor any questions they may have regarding academic integrity.
=> Students are responsible for reading the papers that will be covered in a specific lecture BEFORE the lecture. All papers must be read in detail even though not all details will be covered in class. A reading report on the papers read needs to be submitted before the class meeting in which the papers will be discussed. More information on reading reports are provided below.
=> Students are also responsible for checking the class Web page frequently for updates, schedule changes, etc.
=> The course pre-requisite is CMPE 252A or equivalent. Prospective students can talk to the instructor if they do not have the required background. If a student has not taken CMPE 252A (or equivalent) and still wants to take the class, it is the student's responsibility to acquire the corresponding background material.
=> As mentioned in the description of the course, students must be proficient (C, C++, Java, Python) programmers as a programming project will account for a considerable portion of the grade.
=> Much of the course material, including reading assignments and lecture notes, will be posted on the class Web page. However, students are responsible for all material covered in class, whether or not it appeared on the class Web site.
Project: Working on a class project on a topic related to wireless networking is an important component of the class. The project will involve implementation or simulation. Suggested project topics will be provided but students can also propose heir own projects which need to be approved by the instructor. Students are required to submit a project proposal (by the end of the 3rd week of class) containing the following: (1) Project title, (2) Motivation, related wotk and goals, (3) Brief description of proposed approach, (4) Basic design, (5) Implementation, evaluation and testing methodology, (6) Demo/expected results.
=> Project proposals will not be graded but are mandatory.
=> Project deliveralbles: As part of the project, students need to submit a written report, source code, and a presentation. Students will present their projects at the end of the quarter.
Reading Reports:
Students are expected to write a one-page report that contains a brief summary of the papers to be read for each class. Reading reports are due before the start of the class when the papers will be covered. Reading reports are to be submitted as an e-mail attachment (plain text or pdf). Please use “CSE 257 Spring23 Reading Report #” as the subject line.
Each reading report should contain: a brief summary of each paper which should include short answers to the following questions: (1) what is the problem the authors are trying to solve? (2) why is the problem interesting, relevant, and/or important? (3) what other approaches or solutions existed at the time that this work was done? (4) how did the proposed approach contribute to the state-of-the-art, i.e., why existing approaches were not adequate? (5) what is the proposed approach and how does it compare to earlier approaches, in other words, what are the contributions of the proposed approach? (6) what are the main strengths and weaknesses of the paper/proposed approach? After summarizing all papers to be covered in lecture, the report should also include a paragraph with brief compare and contrast commentary of the papers read. It should also include at least 2 questions to be asked during lecture as a way to foster participation and discussion. Make sure to have a copy of your reports handy during class to help guide class discussion and your participation.
In-Class Presentations:
Students will present on a topic of their choice as they relate to wireless and mobile networking. Possible topics include: security in wireless networks, recent networking architectures and paradigms (DTN, SDN, edge computing, etc). Student presenters need to pick a topic of their interest among the ones suggested. Students can also propose a new topic (need instructor's approval). Once the topic is selected, students will choose 3 papers on the topic to be covered. Selected papers need approval from instructor.
Student presentations must provide adequate coverage of the topic based on the papers selected. Presentations should avoid describing the papers exactly and instead provide an overview of the main contributions, approach, methods described in the papers as well as a the presenter's own observations/perspective. Presentations should provide insight and critical perspective on the state-of-the-art related to the topic being presented. Class discussion should be encouraged, e.g., through discussion points/questions. On the day of their presentation, the presenter does not need to submit a reading report. They should send their presentation to the instructor ahead of time so it can be posted on the class Web page.
Schedule (Tentative):
Date | Topic | Lecture Notes |
April 4 | Course Overview | Lecture 1 |
April 6 | Introduction: Motivation, background, basic concepts, terminology | Lecture 2 |
April 11 |
Introduction: Motivation, background, basic concepts, terminology ns-3 Tutorial |
|
April 13 |
Introduction: Motivation, background, basic concepts, terminology OMNET++ Tutorial |
|
April 18 |
MAC I Network Simulation Bridge (NSB) Tutorial |
|
April 20 |
MAC I Cooja-Contiki Tutorial |
|
April 25 |
MAC I Mininet-WiFi Tutorial |
Lecture 7 |
April 27 | MAC I & II | Lecture 8 |
May 2 | Routing: Unicast Routing in MANETs | Lecture 9 |
May 4 | Routing: Unicast Routing in MANETs | Lecture 10 |
May 9 | Routing: Multicast Routing in MANETs | Lecture 11 |
May 11 | Wireless Internetworking | Lecture 12 |
May 16 | End-to-End Protocols | Lecture 13 |
May 18 | End-to-End Protocols | Lecture 14 |
May 23 | End-to-End Protocols | Lecture 15 |
May 25 | Exam | |
May 30 | IoT (Jack) | IoT for AgTech |
June 1 | Reliable Multipoint Communication | Lecture 16 |
June 6 | Clustering and routing in IoT (Firouz) | |
June 8 | Edge Computing and Vehicle Platooning (Jake) | |
June 13 | Project Presentations (12pm-3pm) |
Reading List:
Timeless readings:
. Saltzer et al., End-to-end Arguments in System Design https://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf
. Lampson, Hints for Computer System Design https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/acrobat-17.pdf
. Lamport, Time, Clocks, and the Ordering of Events in a Distributed Systems https://dl.acm.org/doi/pdf/10.1145/359545.359563
Introduction (Week 1)
. L. Kleinrock, "Nomadicity: Anytime, Anywhere In A Disconnected World", Invited paper, Mobile Networks and Applications, Vol. 1, No. 4, January 1996, pp. 351-357.
. L. Kleinrock, "An Internet Vision: The Invisible Global Infrastructure", Ad Hoc Networks Journal, Vol. 1, No. 1, pp. 3-11, July 2003.
. M Weiser, "The Computer for the 21st Century", 1991.
. M. Weiser, "Some Computer Science Problems in Ubiquitous Computing", Communications of the ACM, July 1993.
Medium Access Control I - Contention-Based MAC (Weeks 2 & 3)
B. P. Crow and I. Widjaja and L. G. Kim and P. T. Sakai, "IEEE 802.11 Wireless Local Area Networks", 1997. IEEE Communications Magazine, 35(9):116-126.
. Vaduvur Bharghavan, Alan Demers, Scott Shenker, Lixia Zhang, "MACAW: A Media Access Protocol for Wireless for Wireless LANs", ACM Sigcomm 94.
. J. J. Garcia-Luna-Aceves and C. L. Fullmer, "Floor Acquisition Multiple Access in Single-Channel Wireless Networks," ACM MONET Journal, Special Issue on Ad Hoc Networks, Vol. 4, 1999, pp. 157-174.
Optional Reading: P. Karn MACA - A New Channel Access Method for Packe Radio, ARRI~/CRRI, Amateur Radio 9th Computer Networking Conference, September 22, 1990.
Medium Access Control II - Scheduled-Access MAC (Week 4)
Venkatesh Rajendran, Katia Obraczka, J.J. Garcia-Luna-Aceves. "DYNAMMA: A DYNAmic Multi-channel Medium Access Framework for Wireless Ad Hoc Networks", Proceedings of the 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS). Oct 2007. Nominated for the best paper award.
. V. Rajendran, Katia Obraczka, and J.J. Garcia-Luna-Aceves, "Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks", ACM/Kluwer Wireless Networks (WINET), 2006.
. Djukic, P. and Mohapatra, P., "Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware", Proceedings of the INFOCOM 2009, 2009.
MANET Unicast Routing I (Week 5)
. Dynamic source routing in ad hoc wireless networks, David B. Johnson, David A. Maltz, in Mobile Computing, editor T. Imielinski and Hank Korth, Kluwer, 1996.
. An Implementation Study of the AODV Routing Protocol, Elizabeth M. Royer and Charles E. Perkins, Proceedings of the IEEE Wireless Communications and Networking Conference, Chicago, IL, September 2000.
MANET Unicast Routing II (Week 5)
. Samir R. Das, Charles E. Perkins, Elizabeth M. Royer and Mahesh K. Marina. Performance Comparison of Two On-demand Routing Protocols for Ad hoc Networks. IEEE Personal Communications Magazine Special Issue on Ad hoc Networking, February 2001, pp. 16-28.
. Optimized Link State Routing Protocol (OLSR), RFC 3626.
MANET Multicast Routing (Week 6)
. Multicast Operation of the Ad hoc On-Demand Distance Vector Routing Protocol. Royer and Perkins, Proceedings of Mobicom, August 1999.
. On-Demand Multicast Routing Protocol. Lee, Gerla and Chiang, Proceedings of WCNC, September 1999.
Wireless Internetworking (Week 6)
. A Mobile Host Protocol Supporting Route Optimization and Authentication, Andrew Myles, David B. Johnson, Charles Perkins, IEEE Journal on Selected Areas in Communications, special issue on Mobile and Wireless Computing Networks, 13(5):839-849, June 1995.
. FLIP: A Flexible Interconnection Protocol for Heterogeneous Internetworking, Ignacio Solis and Katia Obraczka, in ACM/Kluwer Mobile Networking and Applications (MONET) Special on Integration of Heterogeneous Wireless Technologies.
Optional Reading:
. Mobility Support in IPv6 , Charles E. Perkins and David B. Johnson. Proceedings of the Second Annual International Conference on Mobile Computing and Networking (MobiCom'96), November 1996.
End-to-End Protocols I: Infrastructure-Based Wireless Networks (Week 7)
. Improving TCP/IP Performance over Wireless Networks, Hari Balakrishnan, Srinivasan Seshan, Elan Amir, Randy H. Katz. Proc. 1st ACM Conf. on Mobile Computing and Networking, Berkeley, CA, November 1995.
. Delayed duplicate acknowledgements: a TCP-Unaware approach to improve performance of TCP over wireless, Nitin H. Vaidya, Milten N. Mehta, Charles E. Perkins, Gabriel Montenegro.
. I-TCP: indirect TCP for mobile hosts, 15th Int'l Conf. on Distributed Computing Systems (ICDCS), May 1995.
End-to-End Protocols II: MANETs (Week 8)
. Analysis of TCP Performance over Mobile Ad Hoc Networks, G. Holland and N. H. Vaidya, Fifth Annual International Conference on Mobile Computing and Networking (MOBICOM), Seattle, August 1999.
. A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks, Thomas Dyer, Rajendra Boppana, Mobihoc 2001.
. Improving TCP Performance over Mobile Ad-Hoc Networks with Out-of-Order Detection and Response, F. Wand and Y. Zhang, Mobihoc 2002.
Reliable Multipoint Communication (Optional Reading)
. Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-Hop Ad Hoc Networks, Venkatesh Rajendran, Katia Obraczka, Yunjung Yi, Sung-Ju Lee, Ken Tang and Mario Gerla, Proceedings of the IFIP Networking' 04, May 2004.
. Reliable Adaptive Lightweight Multicast Protocol, Ken Tang, Katia Obraczka, Sung-Ju Lee and Mario Gerla, Proceedings of IEEE ICC 2003, May 2003.
. Ken Tang, Katia Obraczka, Sung-Ju Lee and Mario Gerla, “Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks”, Proceedings of IEEE ISCC, July 2002.
IoT for AgTech: [Jack's presentation] (May 30th)
. Rabin Patra, Sergiu Nedevschi, Sonesh Surana, Anmol Sheth, Lakshminarayanan Subramanian, and Eric Brewer. 2007. WiLdnet: design and implementation of high performance wifi based long distance networks. In Proceedings of the 4th USENIX conference on Networked systems design & implementation (NSDI'07). USENIX Association, USA, 7. https://dl.acm.org/doi/10.5555/1973430.1973437
. Z. Li and T. He, "LongBee: Enabling Long-Range Cross-Technology Communication," IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, Honolulu, HI, USA, 2018, pp. 162-170, doi: 10.1109/INFOCOM.2018.8485938. https://doi.org/10.1109/INFOCOM.2018.8485938
. M. Ji, J. Yoon, J. Choo, M. Jang and A. Smith, "LoRa-based Visual Monitoring Scheme for Agriculture IoT," 2019 IEEE Sensors Applications Symposium (SAS), Sophia Antipolis, France, 2019, pp. 1-6, doi: 10.1109/SAS.2019.8706100. https://doi.org/10.1109/SAS.2019.8706100
Routing and Clustering in IoT [Firouz's presentation] (June 6th)
. Heinzelman, W., Chandrakasan, A., and Balakrishnan, H., "Energy-Efficient Communication Protocols for Wireless Microsensor Networks," Proceedings of the 33rd Hawaiian International Conference on Systems Science (HICSS), January 2000.
. S. K. Singh, P. Kumar and J. P. Singh, "A Survey on Successors of LEACH Protocol," in IEEE Access
. Z. Xu, L. Chen, C. Chen and X. Guan, "Joint Clustering and Routing Design for Reliable and Efficient Data Collection in Large-Scale Wireless Sensor Networks," in IEEE Internet of Things Journal, vol. 3, no. 4, pp. 520-532, Aug. 2016
Edge Computing and Vehicle Platooning [Jake's presentation] (June 8th)
. P. Arthurs, L. Gillam, P. Krause, N. Wang, K. Halder and A. Mouzakitis, "A Taxonomy and Survey of Edge Cloud Computing for Intelligent Transportation Systems and Connected Vehicles," in IEEETransactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6206-6221, July 2022, doi: 10.1109/TITS.2021.3084396.
. Quadri, C., Mancuso, V., Marsan, M. A., & Rossi, G. P., "Edge-basedplatoon control," in Computer Communications, vol. 181, pp. 17-31, 2022, https://doi.org/10.1016/j.comcom.2021.09.021.
. F. Michaud, P. Lepage, P. Frenette, D. Letourneau and N. Gaubert, "Coordinated Maneuvering of Automated Vehicles in Platoons," in IEEE Transactions on Intelligent Transportation Systems, vol. 7, no. 4, pp. 437-447, Dec. 2006, doi: 10.1109/TITS.2006.883939.
Project Ideas:
1. According to the U.S. Department of Transportation (USDOT), platooning is a coordinated operation of two or more vehicles via cooperative adaptive cruise control (CACC). Platooning provides a number of benefits, including: fuel efficiency, road capacity and road safety.
Platooning systems can be classified broadly into two types, 1. Centralized and 2. Decentralized. Centralized approach, which is characterized with the presence of a leader suffers from few well known drawbacks such as single point of failure and performance bottleneck (the leader), as well as shorter platoon-length and data loss due to longer range communication from the leader.
Decentralized platooning systems were proposed to mitigate the drawbacks of centralized platooning mentioned above. There is no platoon leader and vehicles interact only with neighboring vehicles to complete the maneuvers. Localized interactions allow decentralized platooning systems handle longer platoons
Generally, platooning systems adopt top-down approaches where high-level objectives, in this case, the platoon maneuvers such as join, exit and lane change, are defined and then workflows, including message exchange, specific for each maneuver are defined. This kind of approach is termed as Deliberate Decentralized Systems. In our research, we have proposed a new type of decentralized platooning that adopts the bottom-up approach which is inspired by biological systems. We call our approach Emergent-Behavior Based Platooning reported in:
S. Sreenivasamurthy and K. Obraczka, “Towards Biologically Inspired Decentralized Platooning for Autonomous Vehicles,” 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021, pp. 1-7, doi: 10.1109/VTC2021-Spring51267.2021.9448731.pdf
The goal of the project is to implement a Deliberate Decentralized Platooning Systems. The implementation will be used to compare it against existing Centralized Platooning System and a novel Emergent Decentralized Platooning System. Therefore, the infrastructure on which this system will be implemented is rather fixed. We would like to use PLEXE-3.0 simulator for this work. This uses additional software and the versions of those should be as follows - omnetpp-5.6.2, sumo-1.9.2 and veins-5.1.
The choice of actual implementation of the Deliberate Decentralized Platooning Systems is left to the implementer. However, it should support at least platoon joining at the tail end and multi vehicle platoon exit maneuvers.
Some examples of Deliberate Decentralized Platooning Systems:
Heinovski, Julian, and Falko Dressler. "Platoon formation: Optimized car to platoon assignment strategies and protocols." 2018 IEEE Vehicular Networking Conference (VNC). IEEE, 2018.
Michaud, Franois, et al. "Coordinated maneuvering of automated vehicles in platoons." IEEE Transactions on Intelligent Transportation Systems 7.4 (2006): 437-447.
Renzler, Tobias, Michael Stolz, and Daniel Watzenig. "Decentralized dynamic platooning architecture with v2v communication tested in omnet++." 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2019.
Some useful links:
Plexe: https://plexe.car2x.org/
Veins: http://veins.car2x.org/
Sumo: https://www.eclipse.org/sumo/
Omnet: https://omnetpp.org/
2. Based on the paper: S. Mansfield, K. Veenstra and K. Obraczka, “TerrainLOS: An Outdoor Propagation Model for Realistic Sensor Network Simulation”, In Proceedings of IEEE Computer Society’s MASCOTS, 2016, extend TerrainLOS to incorporate more realistic channel propagation models.
3. Based on the paper: S. Mansfield, K. Veenstra and K. Obraczka, “TerrainLOS: An Outdoor Propagation Model for Realistic Sensor Network Simulation”, In Proceedings of IEEE Computer Society’s MASCOTS, 2016, port TerrainLOS to the ns3 network simulator.
4. Propose a mechanism (e.g., using machine learning) to automatically adjust the route cache TTL for on-demand MANET routing protocols.
5. Estimating the performance of multimedia traffic is important in numerous contexts, including routing and forwarding, QoS provisioning, and adaptive video streaming[1]. In our research, we are proposing a network performance estimator, called MAPE, which aims at providing, in quasi real-time, network performance estimates for IoT multimedia traffic in IEEE 802.11 multihop wireless networks. MAPE is a deterministic simulation-based estimator that provides real-time per-flow throughput, packet loss and delay estimates while considering inter-flow interference and multi-rate flows, typical of multimedia traffic[2].
MAPE is able to provide network performance estimates that can be used by IoT multimedia services, notably to inform real-time route selection in IoT video transmission. The routing protocol would invoke MAPE with an up-to-date network snapshot as input. Then, based on MAPE's performance estimates, it would perform route selection accordingly. For instance, a proactive link-state algorithm (e.g., OLSR can periodically discover topology changes and disseminate this information through link state updates that MAPE can use to adjust its estimates. Network topology information would be updated whenever a node identifies “significant” changes in the network topology, e.g., link failures, new nodes/links or changes in link quality.
The goal of the project is to integrate MAPE with the OLSR routing protocol[3], using NS-3 simulator, to provide an up-to-date network snapshot periodically according to link quality between nodes and then perform a heuristic-based multipath algorithm based on MAPE's performance estimates—instead of hop count—to calculate multiple shortest paths. The implementation will be used to evaluate the performance of the routing protocol considering the network dynamic (changes in the network topology) and the source node synchronization (updates the network snapshot).
References:
[1] F. Bhering, K. Obrackza, et al. Wireless multipath video transmission: when IoT video applications meet networking—a survey. Multimedia Systems (2022).
[2] F. Bhering, K. Obrackza, et al. Network Performance Estimator with Applications to Route Selection for IoT Multimedia Applications. Available in: https://arxiv.org/
[3] NS-3: Optimized Link State Routing (OLSR). Available in: https://www.nsnam.org/docs/models/html/olsr.html
6. Advances in video cameras and wireless communication technology have contributed to the unprecedented growth of a variety of IoT video applications. However, meeting these applications' quality-of-service requirements pose significant challenges to the underlying network [1]. In addition to their high bandwidth demands, video applications also require more stringent quality-of-service guarantees from the network, such as bounded delay and delay jitter in order to deliver adequate quality-of-experience to users. Meeting such requirements becomes even more challenging in wireless networking environments due to their more limited capacity and higher data loss and link failure probability. It is thus increasingly important to understand the resource requirements of different video traffic and how they perform under different network conditions.
The goal of this project is to evaluate wireless video transmission quality under a variety of network conditions, The experiments will use ns-3's Evalvid simulator which is able to assess user-perceived quality of a wireless video transmission [2] [3]. The main contribution of the project is to propose metrics that will be representative of the underlying netwotk, e.g., network utilization. Based on these metrics to classify the underlying network, evaluate video quality (using metrics like SSIM and PSNR) under a variety of video application scenarios (e.g., number of video sources and their location, data rates, etc).
References:
[1] F. Bhering, K. Obrackza, et al. Wireless multipath video transmission: when IoT video applications meet networking—a survey. Multimedia Systems (2022).
[2] J. Klaue, B. Rathke, A. Wolisz. Evalvid–A framework for video transmission and quality evaluation. In International conference on modelling techniques and tools for computer performance evaluation, Springer (2003).
[3] NS-3 Simulator, Available in: https://www.nsnam.org/
7. The LEACH (Low Energy Adaptive Clustering Hierarchy) protocol was one of the first to propose the idea of clustering-based routing for wireless sensor networks. The protocol's main goal is to minimize energy consumption in large-sized networks by dividing the network into clusters and using a probabilistic algorithm to rotate the role of a cluster head for each round of communication. Subsequently, numerous researchers have proposed new variations to LEACH, with each modification enhancing a certain aspect of the original protocol. Choose one of the successors of the LEACH protocol and implement it in simulation. Then, compare its performance to the original LEACH in terms of energy consumption, data freshness, and overhead.
References:
[1] Heinzelman, W., Chandrakasan, A., and Balakrishnan, H., "Energy-Efficient Communication Protocols for Wireless Microsensor Networks", Proceedings of the 33rd Hawaaian International Conference on Systems Science (HICSS), January 2000
[2] S. K. Singh, P. Kumar and J. P. Singh, "A Survey on Successors of LEACH Protocol," in IEEE Access, vol. 5, pp. 4298-4328, 2017, doi: 10.1109/ACCESS.2017.2666082.
[3] Z. Xu, L. Chen, C. Chen and X. Guan, "Joint Clustering and Routing Design for Reliable and Efficient Data Collection in Large-Scale Wireless Sensor Networks," in IEEE Internet of Things Journal, vol. 3, no. 4, pp. 520-532, Aug. 2016, doi: 10.1109/JIOT.2015.2482363.