Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mengshu Hou is active.

Publication


Featured researches published by Mengshu Hou.


IEEE ACM Transactions on Networking | 2016

Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks

Daibo Liu; Mengshu Hou; Zhichao Cao; Jiliang Wang; Yunhao Liu

Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the same packet simultaneously, especially in networks with intensive traffic. Uncoordinated transmissions often incur a number of duplicate packets, which are further forwarded in the network, occupy the limited network resource, and hinder the packet delivery performance. Existing solutions to this issue, e.g., overhearing or coordination based approaches, either cannot scale up with the system size, or suffer high control overhead. We present Duplicate-Detectable Opportunistic Forwarding (DOF), a duplicate-free opportunistic forwarding protocol for low-duty-cycled wireless sensor networks. DOF enables senders to obtain the information of all potential forwarders via a slotted acknowledgment scheme, so the data packets can be sent to the deterministic next-hop forwarder. Based on light-weight coordination, DOF explores the opportunities as many as possible and removes duplicate packets from the forwarding process. We implement DOF and evaluate its performance on an indoor testbed with 20 TelosB nodes. The experimental results show that DOF reduces the average duplicate ratio by 90%, compared to state-of-the-art opportunistic protocols, and achieves 61.5% enhancement in network yield and 51.4% saving in energy consumption.


international conference on network protocols | 2013

DOF: Duplicate Detectable Opportunistic Forwarding in duty-cycled wireless sensor networks

Daibo Liu; Zhichao Cao; Jiliang Wang; Mengshu Hou; Yunhao Liu

Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the same packet simultaneously, especially in networks with intensive traffic. Uncoordinated transmissions often incur a number of duplicate packets, which are further forwarded in the network, occupy the limited network resource, and hinder the packet delivery performance. Existing solutions to this issue, e.g. overhearing or coordination based approaches, either cannot scale up with the system size, or suffers high control overhead. We present Duplicate-Detectable Opportunistic Forwarding (DOF), a duplicate free opportunistic forwarding protocol for low-duty-cycled wireless sensor networks. DOF enables senders to obtain the information of all potential forwarders via a slotted acknowledgement scheme, so the data packets can be sent to the deterministic next-hop forwarder. Based on light-weight coordination, DOF explores the opportunities as many as possible and removes duplicate packets from the forwarding process. We implement DOF and evaluate its performance on an indoor test-bed with 20 TelosB nodes. The experimental results show that DOF reduces the average duplicate ratio by 90%, compared to state-of-the-art opportunistic protocols, and achieves 61.5% enhancement in network yield and 51.4% saving in energy consumption.


mobile ad hoc networking and computing | 2014

RxLayer: adaptive retransmission layer for low power wireless

Daibo Liu; Zhichao Cao; Jiliang Wang; Mengshu Hou; Yujun Li

In large scale wireless sensor networks, retransmission strategies are widely adopted to guarantee the reliability of multi-hop forwarding. However, keeping retransmission over a bursty link may fail consecutively. Moreover, the retransmission will also be useless over those back-up links which are spatial correlated with the failed link. Thus, it is necessary to design an unified retransmission strategy, which considers both temporal and spacial link properties, to further improve network reliability and efficiency. In this paper, we propose RxLayer, a practical and general supporting layer of data retransmission. Without inducing noticeable overhead, RxLayer captures the temporal and spatial link properties by conditional probability models. A sender will retransmit data over the candidate link with the highest delivery probability while failures occur. RxLayer can be transparently integrated with most of the existing forwarding protocols. We implement RxLayer and evaluate it on both indoor and outdoor testbeds. The results show that RxLayer improves networks reliability and energy efficiency in various scenarios. The network reliability is improved by up to 7.82%, and the total number of transmissions is reduced by up to 36.3%.


international conference on distributed computing systems | 2015

Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs

Daibo Liu; Zhichao Cao; Xiaopei Wu; Xiaoyu Ji; Mengshu Hou

On-air access of individual sensor node (called remote control) is an indispensable function in operational wireless sensor networks, for purposes like network management and real-time information delivery. To realize reliable and efficient remote control in a wireless sensor network (WSN), however, is extremely challenging, due to the stringent resource constraints and intrinsically unrealizable wireless communication. In this paper, we propose TeleAdjusting, a ready-to-use protocol to remotely control any individual node in a WSN. We develop a coding scheme for addressing on the cost-optimal reverse routing tree. In the address of each node, all its upstream relaying nodes are implicitly encoded. Then through a distributed prefix matching process between the local address and the destination address, a packet used for remote control is forwarded along a cost-optimal path. Moreover, TeleAdjusting incorporates opportunistic forwarding into the addressing process, so as to improve the network performance in terms of reliability and energy efficiency. We implement TeleAdjusting with TinyOS and evaluate its performance through extensive simulations and experiments. The results demonstrate that compared to the existing protocols, TeleAdjusting can provide high performance of remote control, which is as reliable as network-wide flooding and much more efficient than remote control through a pre-determined path.


sensor, mesh and ad hoc communications and networks | 2015

CD-MAC: A contention detectable MAC for low duty-cycled wireless sensor networks

Daibo Liu; Xiaopei Wu; Zhichao Cao; Mingyan Liu; Yujun Li; Mengshu Hou

The energy efficiency and delivery robustness are two critical issues for low duty cycled wireless sensor networks. The asynchronous receiver-initiated duty cycling media access control (MAC) protocols have shown the effectiveness through various studies. In receiver-initiated MACs, packet transmission is triggered by the probe of receiver. However, it suffers from the performance degradation incurred by packet collision, especially under bursty traffic. Several protocols have been proposed to address this problem, but their performance is restricted by the unnecessary backoff time and long negotiation process. In this paper, we present Contention Detectable MAC (CD-MAC), an energy efficient and robust duty-cycled MAC for general wireless sensor network applications. By exploring the temporal diversity of the acknowledgements, a receiver recognizes the potential senders and subsequently polls individual senders one by one. We further design efficient algorithm to avoid the possible acknowledgement collision. We implement CD-MAC in TinyOS and evaluate the performance on an indoor testbed with single-hop and multi-hop networks. The results show that CD-MAC can significantly improve throughput by 1.72 times compared with the state-of-the-art receiver-initiated MAC protocol under bursty traffic loads. The results also demonstrate that CD-MAC can effectively mitigate the influence of hidden terminal problem and adapt to network dynamics well.


international conference on network protocols | 2015

COF: Exploiting Concurrency for Low Power Opportunistic Forwarding

Daibo Liu; Mengshu Hou; Zhichao Cao; Xiaoyu Ji; Xiaolong Zheng

Due to the constraint of energy resource, the radio of sensor nodes usually works in a duty-cycled mode. Since the sleep schedules of nodes are unsynchronized, a sender has to send preambles to coordinate with its receiver(s). In such contexts, opportunistic forwarding, which takes the earliest forwarding opportunity instead of a deterministic forwarder, shows great advantage in utilizing channel resource. The multiple forwarding choices with temporal and spatial diversity increase the chance of collision tolerance in concurrent transmissions, potentially enhancing end-to-end network performance. However, the current channel contention mechanism based on collision avoidance is too conservative to exploit concurrency. To address this problem, we propose COF, a practical protocol to exploit the potential Concurrency for low power Opportunistic Forwarding. COF determines whether a node should concurrently transmit or not, by incorporating: (1) a distributed and light-weight link quality measurement scheme for concurrent transmission and (2) a synthetic method to estimate the benefit of potential concurrency opportunity. COF can be easily integrated into the conventional unsynchronized sender-initiated protocols. We evaluate COF on a 40-node testbed. The results show that COF can reduce the end-to-end delay by up to 41% and energy consumption by 18.9%, compared with the state-of-the-art opportunistic forwarding protocol.


international conference on computer communications | 2011

Many-to-one deliverability of greedy routing in 2-D wireless sensor networks

Yaling Yang; Yujun Li; Mengshu Hou

In this paper, we study deliverability of greedy routing in wireless sensor networks, where nodes are distributed over a disk area according to a homogeneous Poisson point process. In our work, we model the level of deliverability of a sensor network as the probability that all sensor nodes can successfully send their data to a base station, which is named probability of guaranteed delivery. We study the relationship between the critical transmission power of sensor nodes and the probability of guaranteed delivery, such that when all sensor nodes transmit with a higher power than the critical transmission power, the sensor network can reach the desired probability of guaranteed delivery. We identify two very tight analytical upper bounds on the critical transmission power for the idealistic u-disk model and the realistic log-normal shadowing model respectively. The correctness and tightness of these two upper bounds are verified by extensive simulations.


information processing in sensor networks | 2016

Frame counter: achieving accurate and real-time link estimation in low power wireless sensor networks

Daibo Liu; Zhichao Cao; Mengshu Hou; Yi Zhang

Link estimation is a fundamental component of forwarding protocols in wireless sensor networks. In low power forwarding, however, the asynchronous nature of widely adopted duty-cycled radio control brings new challenges to achieve accurate and real- time estimation. First, the repeatedly transmitted frames (called wake-up frame) increase the complexity of accurate statistic, especially with bursty channel contention and coexistent interference. Second, frequent update of every link status exhausts the limited energy supply due to long duration of beacon broadcast. In this paper, we propose meter (Distributed Frame Counter), which takes the opportunities of link overhearing to update link status in real time. Furthermore, meter does not only depend on counting the successfully decoded wake-up frames, but also counts the corrupted ones by exploiting the feasibility of ZigBee identification based on short-term sequence of the received signal strength. We implement meter in TinyOS and further evaluate the performance through extensive experiments on indoor and outdoor testbeds. The results demonstrate that meter can significantly improve the performance of the state-of-the-art link estimation schemes.


parallel and distributed computing: applications and technologies | 2004

Study on replication in unstructured p2p system

Mengshu Hou; Xian-Liang Lu; Xu Zhou; Chuan Zhan

To improve unstructured peer-to-peer system performance, one wants to minimize the number of peers that have to be probed before the query is answered. In this paper, we propose a replication strategy with the consideration of heterogeneous resources among peers in the unstructured P2P system. In our strategy, the system copies the replication of the popular file to high capacity peers. Experimental result shows our replication strategy reduces the network traffic greatly, and improves the popular file availability effectively.


Compel-the International Journal for Computation and Mathematics in Electrical and Electronic Engineering | 2013

A simple model for the multiple traveling salesmen problem with single depot and multiple sink

Daibo Liu; Mengshu Hou; Hong Qu

Purpose – The purpose of this paper is to determine a set of routes for multiple salesmen starting at and turning back to the home depots. The objective of the algorithm is to be efficient and to minimize the total cost of all salesmen.Design/methodology/approach – The new method first generates a SModel, then deletes all redundant edges in the model and reorganizes isolated paths. According to the given statistics, about 16.5 percent of the nodes have a degree greater than 2 in the SModel, which means that there must be redundant edges in the model. The authors refer to those edges connected to nodes with a degree greater than 2 as redundant candidate edges. By deleting redundant edges, the original graph is simplified to a great extent, then related operation is adopted to generate expected result.Findings – A simple model is used to simplify the original graphs by deleting redundant edges. Based on the simplified results, two strategies are proposed to determine primal edges linking with home depot. Si...

Collaboration


Dive into the Mengshu Hou's collaboration.

Top Co-Authors

Avatar

Daibo Liu

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yujun Li

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hong Qu

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Yi Zhang

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Chuan Zhan

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Xian-Liang Lu

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge