Mengshu Hou
University of Electronic Science and Technology of China
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mengshu Hou.
IEEE ACM Transactions on Networking | 2016
Daibo Liu; Mengshu Hou; Zhichao Cao; Jiliang Wang; Yunhao Liu
Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the same packet simultaneously, especially in networks with intensive traffic. Uncoordinated transmissions often incur a number of duplicate packets, which are further forwarded in the network, occupy the limited network resource, and hinder the packet delivery performance. Existing solutions to this issue, e.g., overhearing or coordination based approaches, either cannot scale up with the system size, or suffer high control overhead. We present Duplicate-Detectable Opportunistic Forwarding (DOF), a duplicate-free opportunistic forwarding protocol for low-duty-cycled wireless sensor networks. DOF enables senders to obtain the information of all potential forwarders via a slotted acknowledgment scheme, so the data packets can be sent to the deterministic next-hop forwarder. Based on light-weight coordination, DOF explores the opportunities as many as possible and removes duplicate packets from the forwarding process. We implement DOF and evaluate its performance on an indoor testbed with 20 TelosB nodes. The experimental results show that DOF reduces the average duplicate ratio by 90%, compared to state-of-the-art opportunistic protocols, and achieves 61.5% enhancement in network yield and 51.4% saving in energy consumption.
international conference on network protocols | 2013
Daibo Liu; Zhichao Cao; Jiliang Wang; Mengshu Hou; Yunhao Liu
Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the same packet simultaneously, especially in networks with intensive traffic. Uncoordinated transmissions often incur a number of duplicate packets, which are further forwarded in the network, occupy the limited network resource, and hinder the packet delivery performance. Existing solutions to this issue, e.g. overhearing or coordination based approaches, either cannot scale up with the system size, or suffers high control overhead. We present Duplicate-Detectable Opportunistic Forwarding (DOF), a duplicate free opportunistic forwarding protocol for low-duty-cycled wireless sensor networks. DOF enables senders to obtain the information of all potential forwarders via a slotted acknowledgement scheme, so the data packets can be sent to the deterministic next-hop forwarder. Based on light-weight coordination, DOF explores the opportunities as many as possible and removes duplicate packets from the forwarding process. We implement DOF and evaluate its performance on an indoor test-bed with 20 TelosB nodes. The experimental results show that DOF reduces the average duplicate ratio by 90%, compared to state-of-the-art opportunistic protocols, and achieves 61.5% enhancement in network yield and 51.4% saving in energy consumption.
mobile ad hoc networking and computing | 2014
Daibo Liu; Zhichao Cao; Jiliang Wang; Mengshu Hou; Yujun Li
In large scale wireless sensor networks, retransmission strategies are widely adopted to guarantee the reliability of multi-hop forwarding. However, keeping retransmission over a bursty link may fail consecutively. Moreover, the retransmission will also be useless over those back-up links which are spatial correlated with the failed link. Thus, it is necessary to design an unified retransmission strategy, which considers both temporal and spacial link properties, to further improve network reliability and efficiency. In this paper, we propose RxLayer, a practical and general supporting layer of data retransmission. Without inducing noticeable overhead, RxLayer captures the temporal and spatial link properties by conditional probability models. A sender will retransmit data over the candidate link with the highest delivery probability while failures occur. RxLayer can be transparently integrated with most of the existing forwarding protocols. We implement RxLayer and evaluate it on both indoor and outdoor testbeds. The results show that RxLayer improves networks reliability and energy efficiency in various scenarios. The network reliability is improved by up to 7.82%, and the total number of transmissions is reduced by up to 36.3%.
international conference on distributed computing systems | 2015
Daibo Liu; Zhichao Cao; Xiaopei Wu; Xiaoyu Ji; Mengshu Hou
On-air access of individual sensor node (called remote control) is an indispensable function in operational wireless sensor networks, for purposes like network management and real-time information delivery. To realize reliable and efficient remote control in a wireless sensor network (WSN), however, is extremely challenging, due to the stringent resource constraints and intrinsically unrealizable wireless communication. In this paper, we propose TeleAdjusting, a ready-to-use protocol to remotely control any individual node in a WSN. We develop a coding scheme for addressing on the cost-optimal reverse routing tree. In the address of each node, all its upstream relaying nodes are implicitly encoded. Then through a distributed prefix matching process between the local address and the destination address, a packet used for remote control is forwarded along a cost-optimal path. Moreover, TeleAdjusting incorporates opportunistic forwarding into the addressing process, so as to improve the network performance in terms of reliability and energy efficiency. We implement TeleAdjusting with TinyOS and evaluate its performance through extensive simulations and experiments. The results demonstrate that compared to the existing protocols, TeleAdjusting can provide high performance of remote control, which is as reliable as network-wide flooding and much more efficient than remote control through a pre-determined path.
sensor, mesh and ad hoc communications and networks | 2015
Daibo Liu; Xiaopei Wu; Zhichao Cao; Mingyan Liu; Yujun Li; Mengshu Hou
The energy efficiency and delivery robustness are two critical issues for low duty cycled wireless sensor networks. The asynchronous receiver-initiated duty cycling media access control (MAC) protocols have shown the effectiveness through various studies. In receiver-initiated MACs, packet transmission is triggered by the probe of receiver. However, it suffers from the performance degradation incurred by packet collision, especially under bursty traffic. Several protocols have been proposed to address this problem, but their performance is restricted by the unnecessary backoff time and long negotiation process. In this paper, we present Contention Detectable MAC (CD-MAC), an energy efficient and robust duty-cycled MAC for general wireless sensor network applications. By exploring the temporal diversity of the acknowledgements, a receiver recognizes the potential senders and subsequently polls individual senders one by one. We further design efficient algorithm to avoid the possible acknowledgement collision. We implement CD-MAC in TinyOS and evaluate the performance on an indoor testbed with single-hop and multi-hop networks. The results show that CD-MAC can significantly improve throughput by 1.72 times compared with the state-of-the-art receiver-initiated MAC protocol under bursty traffic loads. The results also demonstrate that CD-MAC can effectively mitigate the influence of hidden terminal problem and adapt to network dynamics well.
international conference on network protocols | 2015
Daibo Liu; Mengshu Hou; Zhichao Cao; Xiaoyu Ji; Xiaolong Zheng
Due to the constraint of energy resource, the radio of sensor nodes usually works in a duty-cycled mode. Since the sleep schedules of nodes are unsynchronized, a sender has to send preambles to coordinate with its receiver(s). In such contexts, opportunistic forwarding, which takes the earliest forwarding opportunity instead of a deterministic forwarder, shows great advantage in utilizing channel resource. The multiple forwarding choices with temporal and spatial diversity increase the chance of collision tolerance in concurrent transmissions, potentially enhancing end-to-end network performance. However, the current channel contention mechanism based on collision avoidance is too conservative to exploit concurrency. To address this problem, we propose COF, a practical protocol to exploit the potential Concurrency for low power Opportunistic Forwarding. COF determines whether a node should concurrently transmit or not, by incorporating: (1) a distributed and light-weight link quality measurement scheme for concurrent transmission and (2) a synthetic method to estimate the benefit of potential concurrency opportunity. COF can be easily integrated into the conventional unsynchronized sender-initiated protocols. We evaluate COF on a 40-node testbed. The results show that COF can reduce the end-to-end delay by up to 41% and energy consumption by 18.9%, compared with the state-of-the-art opportunistic forwarding protocol.
international conference on computer communications | 2011
Yaling Yang; Yujun Li; Mengshu Hou
In this paper, we study deliverability of greedy routing in wireless sensor networks, where nodes are distributed over a disk area according to a homogeneous Poisson point process. In our work, we model the level of deliverability of a sensor network as the probability that all sensor nodes can successfully send their data to a base station, which is named probability of guaranteed delivery. We study the relationship between the critical transmission power of sensor nodes and the probability of guaranteed delivery, such that when all sensor nodes transmit with a higher power than the critical transmission power, the sensor network can reach the desired probability of guaranteed delivery. We identify two very tight analytical upper bounds on the critical transmission power for the idealistic u-disk model and the realistic log-normal shadowing model respectively. The correctness and tightness of these two upper bounds are verified by extensive simulations.
information processing in sensor networks | 2016
Daibo Liu; Zhichao Cao; Mengshu Hou; Yi Zhang
Link estimation is a fundamental component of forwarding protocols in wireless sensor networks. In low power forwarding, however, the asynchronous nature of widely adopted duty-cycled radio control brings new challenges to achieve accurate and real- time estimation. First, the repeatedly transmitted frames (called wake-up frame) increase the complexity of accurate statistic, especially with bursty channel contention and coexistent interference. Second, frequent update of every link status exhausts the limited energy supply due to long duration of beacon broadcast. In this paper, we propose meter (Distributed Frame Counter), which takes the opportunities of link overhearing to update link status in real time. Furthermore, meter does not only depend on counting the successfully decoded wake-up frames, but also counts the corrupted ones by exploiting the feasibility of ZigBee identification based on short-term sequence of the received signal strength. We implement meter in TinyOS and further evaluate the performance through extensive experiments on indoor and outdoor testbeds. The results demonstrate that meter can significantly improve the performance of the state-of-the-art link estimation schemes.
parallel and distributed computing: applications and technologies | 2004
Mengshu Hou; Xian-Liang Lu; Xu Zhou; Chuan Zhan
To improve unstructured peer-to-peer system performance, one wants to minimize the number of peers that have to be probed before the query is answered. In this paper, we propose a replication strategy with the consideration of heterogeneous resources among peers in the unstructured P2P system. In our strategy, the system copies the replication of the popular file to high capacity peers. Experimental result shows our replication strategy reduces the network traffic greatly, and improves the popular file availability effectively.
Compel-the International Journal for Computation and Mathematics in Electrical and Electronic Engineering | 2013
Daibo Liu; Mengshu Hou; Hong Qu
Purpose – The purpose of this paper is to determine a set of routes for multiple salesmen starting at and turning back to the home depots. The objective of the algorithm is to be efficient and to minimize the total cost of all salesmen.Design/methodology/approach – The new method first generates a SModel, then deletes all redundant edges in the model and reorganizes isolated paths. According to the given statistics, about 16.5 percent of the nodes have a degree greater than 2 in the SModel, which means that there must be redundant edges in the model. The authors refer to those edges connected to nodes with a degree greater than 2 as redundant candidate edges. By deleting redundant edges, the original graph is simplified to a great extent, then related operation is adopted to generate expected result.Findings – A simple model is used to simplify the original graphs by deleting redundant edges. Based on the simplified results, two strategies are proposed to determine primal edges linking with home depot. Si...