Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhichao Cao is active.

Publication


Featured researches published by Zhichao Cao.


international conference on computer communications | 2011

Ubiquitous data collection for mobile users in wireless sensor networks

Zhenjiang Li; Mo Li; Jiliang Wang; Zhichao Cao

We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data. We propose a novel approach for mobile users to collect the network-wide data. The routing structure of data collection is additively updated with the movement of the mobile user. With this approach, we only perform a local modification to update the routing structure while the routing performance is bounded and controlled compared to the optimal performance. The proposed protocol is easy to implement. Our analysis shows that the proposed approach is scalable in maintenance overheads, performs efficiently in the routing performance, and provides continuous data delivery during the user movement. We implement the proposed protocol in a prototype system and test its feasibility and applicability by a 49-node testbed. We further conduct extensive simulations to examine the efficiency and scalability of our protocol with varied network settings.


IEEE Transactions on Parallel and Distributed Systems | 2013

Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks

Zhenjiang Li; Yunhao Liu; Mo Li; Jiliang Wang; Zhichao Cao

We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data. We propose a novel approach for mobile users to collect the network-wide data. The routing structure of data collection is additively updated with the movement of the mobile user. With this approach, we only perform a limited modification to update the routing structure while the routing performance is bounded and controlled compared to the optimal performance. The proposed protocol is easy to implement. Our analysis shows that the proposed approach is scalable in maintenance overheads, performs efficiently in the routing performance, and provides continuous data delivery during the user movement. We implement the proposed protocol in a prototype system and test its feasibility and applicability by a 49-node testbed. We further conduct extensive simulations to examine the efficiency and scalability of our protocol with varied network settings.


international conference on embedded networked sensor systems | 2014

ZiSense: towards interference resilient duty cycling in wireless sensor networks

Xiaolong Zheng; Zhichao Cao; Jiliang Wang; Yunhao Liu

To save energy, wireless sensor networks often run in a low duty cycle mode, where the radios of sensor nodes are scheduled between ON and OFF states. For nodes to communicate with each other, Low Power Listening (LPL) and Low Power Probing (LPP) are two types of rendezvous mechanisms. Nodes with LPL or LPP rely on signal strength or probe packets to detect potential transmissions, and then keep the radio-on for communications. Unfortunately, in many cases, signal strength and probe packets are susceptible to interference, resulting in undesirable radio on time when the signal strength of interference is above a threshold or a probe packet is interfered. To address the issue, we propose ZiSense, an energy efficient rendezvous mechanism which is resilient to interference. Instead of checking the signal strength or decoding the probe packets, ZiSense detects the existence of ZigBee transmissions and wakes up nodes accordingly. On sensor nodes with limited information and resource, we carefully study and extract short-term features purely from the time-domain RSSI sequence, and design a rule-based approach to efficiently identify the existence of ZigBee. We theoretically analyze the benefit of ZiSense in different environments and implement a prototype in TinyOS with TelosB motes. We examine ZiSense performance under controlled interference and office environments. The evaluation results show that, compared with state-of-the-art rendezvous mechanisms, ZiSense significantly reduces the energy consumption.


IEEE ACM Transactions on Networking | 2015

L 2 : lazy forwarding in low-duty-cycle wireless sensor network

Zhichao Cao; Qiang Ma; Yunhao Liu

In order to simultaneously achieve good energy efficiency and high packet delivery performance, a multihop forwarding scheme should generally involve three design elements: media access mechanism, link estimation scheme, and routing strategy. Disregarding the low-duty-cycle nature of media access often leads to overestimation of link quality. Neglecting the bursty loss characteristic of wireless links inevitably consumes much more energy than necessary and underutilizes wireless channels. The routing strategy, if not well tailored to the above two factors, results in poor packet delivery performance. In this paper, we propose L2, a practical design of data forwarding in low-duty-cycle wireless sensor networks. L2 addresses link burstiness by employing multivariate Bernoulli link model. Further incorporated with synchronized rendezvous, L2 enables sensor nodes to work in a lazy mode, keep their radios off most of the time, and realize highly reliable forwarding by scheduling very limited packet transmissions. We implement L2 on a real sensor network testbed. The results demonstrate that L2 outperforms state-of-the-art approaches in terms of energy efficiency and network yield.


international conference on computer communications | 2012

L 2 : Lazy forwarding in low duty cycle wireless sensor networks

Zhichao Cao; Yunhao Liu

Energy-constrained wireless sensor networks are duty-cycled, relaying on multi-hop forwarding to collect data packets. A forwarding scheme generally involves three design elements: media access, link estimation, and routing strategy. Most existing studies, however, focus only on a subset of those three. Disregarding the low duty cycle nature of media access often leads to overestimate of link quality. Neglecting the characteristic of bursty loss over wireless links inevitably consumes much more energy than necessary and underutilizes wireless channels. The routing strategy, if not well tailored to the above factors, results in poor packet delivery performance. In this paper, we propose L2, a practical design of data forwarding in low duty cycle wireless sensor networks. L2 addresses link burstiness using multivariate Bernoulli link model. Further incorporated with synchronized rendezvous, L2 enables sensor nodes to work in a lazy mode, keep their radios off as long as they can, and allocates the precious energy for only a limited number of promising transmissions. We implement L2 on real sensor network testbeds. The results show that L2 outperforms state-of-the-art approaches in terms of energy efficiency and network yield.


real-time systems symposium | 2012

On the Delay Performance Analysis in a Large-Scale Wireless Sensor Network

Jiliang Wang; Wei Dong; Zhichao Cao; Yunhao Liu

We present a comprehensive delay performance measurement and analysis in an operational large-scale urban wireless sensor network. We build a light-weight delay measurement system in such a network and present a robust method to calculate per-packet delay. Through analysis of delay and system metrics, we seek to answer the following fundamental questions: what are the spatial and temporal characteristics of delay performance in a real network? what are the most important impacting factors and is there any practical model to capture those factors? what are the implications to protocol design? In this paper, we explore the important factors from the data in presence of various metrics and randomness, and show that the important factors are not necessarily the same with that in Internet. Further, we propose a delay model to capture those factors and validate it in the network. We revisit several prevalent protocol designs such as Collection Tree Protocol, opportunistic routing and Dynamic Switching based Forwarding, and show the implications to protocol designs.


IEEE ACM Transactions on Networking | 2015

On the delay performance in a large-scale wireless sensor network: measurement, analysis, and implications

Jiliang Wang; Wei Dong; Zhichao Cao; Yunhao Liu

We present a comprehensive delay performance measurement and analysis in a large-scale wireless sensor network. We build a lightweight delay measurement system and present a robust method to calculate the per-packet delay. We show that the method can identify incorrect delays and recover them with a bounded error. Through analysis of delay and other system metrics, we seek to answer the following fundamental questions: What are the spatial and temporal characteristics of delay performance in a real network? What are the most important impacting factors, and is there any practical model to capture those factors? What are the implications to protocol designs? In this paper, we identify important factors from the data trace and show that the important factors are not necessarily the same with those in the Internet. Furthermore, we propose a delay model to capture those factors. We revisit several prevalent protocol designs such as Collection Tree Protocol, opportunistic routing, and Dynamic Switching-based Forwarding and show that our model and analysis are useful to practical protocol designs.


IEEE ACM Transactions on Networking | 2016

Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks

Daibo Liu; Mengshu Hou; Zhichao Cao; Jiliang Wang; Yunhao Liu

Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the same packet simultaneously, especially in networks with intensive traffic. Uncoordinated transmissions often incur a number of duplicate packets, which are further forwarded in the network, occupy the limited network resource, and hinder the packet delivery performance. Existing solutions to this issue, e.g., overhearing or coordination based approaches, either cannot scale up with the system size, or suffer high control overhead. We present Duplicate-Detectable Opportunistic Forwarding (DOF), a duplicate-free opportunistic forwarding protocol for low-duty-cycled wireless sensor networks. DOF enables senders to obtain the information of all potential forwarders via a slotted acknowledgment scheme, so the data packets can be sent to the deterministic next-hop forwarder. Based on light-weight coordination, DOF explores the opportunities as many as possible and removes duplicate packets from the forwarding process. We implement DOF and evaluate its performance on an indoor testbed with 20 TelosB nodes. The experimental results show that DOF reduces the average duplicate ratio by 90%, compared to state-of-the-art opportunistic protocols, and achieves 61.5% enhancement in network yield and 51.4% saving in energy consumption.


international conference on computer communications | 2014

Sleep in the Dins: Insomnia Therapy for Duty-cycled Sensor Networks

Jiliang Wang; Zhichao Cao; Xufei Mao; Yunhao Liu

Duty cycling mode is widely adopted in wireless sensor networks to save energy. Existing duty-cycling protocols cannot well adapt to different data rates and dynamics, resulting in a high energy consumption in real networks. Improving those protocols may require global information or heavy computation and thus may not be practical, leading to empirical parameters in real protocols. To fill the gap between the application requirement and protocol performance, we design a light-weight adaptive duty-cycling protocol (LAD), which reduces the energy consumption under different data rates and protocol dynamics. We theoretically validate the performance improvement of the protocol. We implement the protocol in TinyOS and extensively evaluate it on 40 TelosB nodes. The evaluation results show the energy consumption can be reduced by 28.2%~40.1% compared with state-of-the-art protocols. Results based on data from a 1200-node operational network further show the effectiveness and scalability of the design.


international conference on network protocols | 2013

DOF: Duplicate Detectable Opportunistic Forwarding in duty-cycled wireless sensor networks

Daibo Liu; Zhichao Cao; Jiliang Wang; Mengshu Hou; Yunhao Liu

Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the same packet simultaneously, especially in networks with intensive traffic. Uncoordinated transmissions often incur a number of duplicate packets, which are further forwarded in the network, occupy the limited network resource, and hinder the packet delivery performance. Existing solutions to this issue, e.g. overhearing or coordination based approaches, either cannot scale up with the system size, or suffers high control overhead. We present Duplicate-Detectable Opportunistic Forwarding (DOF), a duplicate free opportunistic forwarding protocol for low-duty-cycled wireless sensor networks. DOF enables senders to obtain the information of all potential forwarders via a slotted acknowledgement scheme, so the data packets can be sent to the deterministic next-hop forwarder. Based on light-weight coordination, DOF explores the opportunities as many as possible and removes duplicate packets from the forwarding process. We implement DOF and evaluate its performance on an indoor test-bed with 20 TelosB nodes. The experimental results show that DOF reduces the average duplicate ratio by 90%, compared to state-of-the-art opportunistic protocols, and achieves 61.5% enhancement in network yield and 51.4% saving in energy consumption.

Collaboration


Dive into the Zhichao Cao's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daibo Liu

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Mengshu Hou

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yi Zhang

Hong Kong University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge