You are on page 1of 5

IEEE Proceedings of 4th International Conference on Intelligent Human Computer Interaction, Kharagpur, India, December 27-29, 2012

Advanced Network Technologies Virtual Lab:


A Human-Computer Interface for Performing
Experiments on Wireless Sensor Networks
Bibudhendu Pati Sudip Misra Barun Kumar Saha
School of Information Technology School of Information Technology School of Information Technology
Indian Institute of Technology Indian Institute of Technology Indian Institute of Technology
Kharagpur, India, 721302 Kharagpur, India, 721302 Kharagpur, India, 721302
Email: bpati@sit.iitkgp.ernet.in Email: smisra@sit.iitkgp.ernet.in Email: baruns@sit.iitkgp.ernet.in

Abstract—Research analysis manifest clear trends of growing


interest of the field of Human Computer Interaction (HCI)
towards virtualized learning. To keep up this trend, as well as
the pace with the rapid advancement of software technologies,
the Advanced Network Technologies Virtual Lab (ANT VLab)
has been developed by us at Indian Institute of Technology,
Kharagpur, India. This lab exposes students to various advanced
topics including Wi-Fi, WiMAX, Satellite Networks, Mobile
Adhoc Networks (MANETs), Wireless Sensor Networks (WSNs),
Bluetooth, Zigbee, and encourages them to work on related
problems in a partially constrained environment. Apart from
providing detailed theory on each topic, each virtual experiment
in the lab has a set of exercises to be solved using remote network
simulations. Network Simulator-2 (NS-2) / Mannasim framework
and Network Simulator-3 (NS-3) have been used for this purpose. Fig. 1. Schematic diagram of a Wireless Sensor Networks
The ANT VLab also offers benefits such as reduced software and
hardware costs as against setting up an actual advanced network
technology lab, improved learning by interactive visualization,
and self-learning advanced network technologies in the absence
cate with very short-range broadcast and multi-hop routing
of a real-life instructor. Additionally, the students can interface [7]. WSNs frequently change their topology due to fading and
and learn at their own pace any time and from any place node failures. They also have limitations in energy capacity,
having a PC with high speed Internet connectivity. WSNs is an computing power, memory, and transmission power.
emerging field in computer networking. In this paper, we discuss
the development of a module for WSNs, that can be used for A. Types
performing different WSNs experiments in the virtual mode. Depending on the environment of deployment, WSNs can
Index Terms—Wireless Sensor Networks, Human Computer
Interaction, Virtual Lab, Advanced Network Technologies, and
be classified into the following categories: terrestrial wireless
Network Simulator. sensor networks, under-ground sensor networks, underwater
sensor networks, multi-media sensor networks, and mobile
I. I NTRODUCTION sensor networks [16].

A WSNs is a wireless network consisting of spatially B. Routing Protocols in WSNs


distributed autonomous devices that use sensors for monitoring Many routing protocols have been proposed for WSNs [10].
and recording the physical conditions of the environment These have been classified into three categories, namely: Data-
and organizing the collected data at a central location [5]. centric protocols, Hierarchical protocols, and Location-based
WSNs measure environmental conditions such as temperature, protocols. Data-centric protocols are query-based and use the
sound, pollution levels, humidity, wind speed and direction, concept of naming of desired data to eliminate many redundant
and pressure [6]. It consists of anywhere from a few hun- transmissions. Hierarchical protocols cluster the nodes so that
dreds to thousands of sensor nodes [7]. The sensor node cluster heads can aggregate and reduce the data to save energy.
equipment includes a radio transceiver along with an antenna, Location-based protocols use position information to send the
a micro-controller, an interfacing electronic circuit, and an data to only the desired regions rather than to the whole
energy source, usually a battery. Fig. 1 shows an WSNs network. The more important ones among these are SPIN [21],
scenario. WSNs possess self-configuration, self-healing, self- [25], LEACH [11], PEGASIS [13], TEEN [17], and APTEEN
optimization, and self-protection capabilities. They communi- [18].

978-1-4673-4369-5/12/$31.00 2012
c IEEE
C. Organization • To share costly equipment and resources, which are
This paper is organized as follows. In Section II, we describe otherwise available to limited number of users due to
briefly the overview of the Advanced Network Technologies constraints on time and geographical distances.
Virtual Lab. In Section III, we describe an experiment on
B. Target Audience
simulating a wireless sensor network with NS-2. Section IV
illustrated an suitable example and in Section V, we conclude This lab is suitable for undergraduate or postgraduate stu-
the paper. dents having a course on Computer Network and Wireless
Sensor Networks.
II. OVERVIEW OF THE A DVANCED N ETWORK
T ECHNOLOGIES V IRTUAL L AB C. Concept of an Experiment
In this Section, we have first described the objectives of our The model of an experiment in the context of virtual labs
designed ANT VLab. Subsequently, we have described the has been specified by the experts’ committee of virtual labs.
target audience, concept of an experiment, human computer Although, development of each lab is going on in a distributed
interface and the list of experiments. Fig. 2 shows the screen manner in different institutions of India, an attempt has been
shot of an experiment on WSNs designed in the ANT VLab. made to make all the labs follow a basic structure [4]. As per
these guidelines, an experiment consists of:
• Theory: This section provides a brief theoretical overview
on the subject matter of the particular experiment.
• Simulation: Flash animations have been used to illustrate
specific concepts on the topic.
• Self-evaluation: This section provides a set of multiple-
choice type questions for each experiment that lets an
user to judge his knowledge on the subject.
• Procedure: This section provides detailed steps on how
to solve the different exercises for a given experiment.
• Exercises: This is the core section of an experiment. In
fact, the notion of real-life experiment actually maps to
this section. Depending upon the topic, a set of exercises
are given to be worked out by the students. Link to
Fig. 2. A screen shot of the ANT VLab
a possible solution of the exercise, with an optional
analysis, is also presented here.
A. Objectives • References: Provides a list of books and/or URLs of web
resources that have helped in the development of the
Virtual Labs will provide to the students the result of an current experiment.
experiment by one of the following methods (or possibly a
combination) D. Human Computer Interface
• Modeling the physical phenomenon by a set of equations
Virtual labs should be as realistic as possible. Also, unless
and carrying out simulations to yield the result of the the interface is user friendly, it will be difficult to conduct
particular experiment. This can, at-the-best, provide an the experiment remotely [1]. In ANT VLab, the GUI is im-
approximate version of the real-world experiment. plemented using JQuery, Django framework, Python, Hypertex
• Providing measured data for virtual lab experiments cor-
Markup Language (HTML), and JavaScript for supporting web
responding to the data previously obtained by measure- browsers.
ments on an actual system.
• Virtual labs will be made more effective and realistic E. List of Experiments
by providing additional inputs to the students like ac-
companying audio and video streaming of an actual lab ANT VLab has a set of ten experiments focusing on
experiment and equipment. different areas of the subject. A list of all the experiments
• To enthuse students to conduct experiments by the arous-
in ANT VLab is described in Table I.
ing their curiosity. This would help them in learning basic
and advanced concepts through remote experimentation. F. Deployment
• To provide a complete Learning Management System The ANT VLab has been deployed to the Production server
(LMS) around the virtual labs where the students can hosted by IIIT-Hyderabad. Presently, the official URL of this
avail the various tools for learning, including additional virtual lab is: http://virtual-labs.ac.in/cse28/ [7]. An extensive
web-resources, video-lectures, animated demonstrations documentation for the deployment process has been prepared
and self evaluation. as well.
TABLE I
L ISTS OF E XPERIMENTS IN THE ANT VL AB . B. Operations of LEACH
The operation of LEACH is divided into number of rounds
No. Experiments
1 Basics of Network Simulation with each round having two phases: setup phase and steady-
2 Simulating a Local Area Network state phase. The phases in each round of the LEACH protocol
3 Measuring Network Performance is shown in Fig. 4. In the setup phase, clusters are organized
4 Simulation of a Satellite Network
5 Simulating a WiFi Network
and this is done in three steps that is, cluster-head advertise-
6 Simulating a WiMAX Network ment, cluster set-up and transmission schedule creation. In the
7 Simulating a Mobile Adhoc Network steady-state phase, data transfer to the base station occurs [11]
8 Simulating a Wireless Sensor Network [19]. The algorithm for both the phases of the LEACH protocol
9 Setting up a Bluetooth Network
10 Setting up a Zigbee Network is given as follows.

C. Algorithm for the Setup Phase


III. E XPERIMENT ON S IMULATING A W IRELESS S ENSOR In the setup phase of the LEACH protocol, the cluster-head
NETWORKS WITH NS-2 advertisement, cluster set-up, and transmission schedule are
created as follows.
In this Section, first we discuss about the LEACH protocol
[11] and then we describe the operations including the setup • Cluster-head Advertisement:

phase and steady-state phase with their algorithms and a 1) Let x be a random no between 0 and 1, n be the
suitable schematic diagram of LEACH protocol. given node, P be the cluster-head probability, r be
the current round, G the set of nodes that were not
A. Discussions on LEACH cluster-heads in the previous rounds.
LEACH is a cluster-based routing protocol for WSNs [12], 2) If the random number is < the following threshold
[8]. In WSNs, sensor nodes are partitioned into a number T (n), then the node becomes a cluster head.
of small groups known as clusters. Each cluster has the 
coordinators, called cluster head (CH), and each node in P
1 if n ∈ G
a cluster is called a cluster node [9]. LEACH adopts the T (n) = 1−P ∗(rmod P )
0, otherwise
clustering concept to distribute energy among the sensor
nodes in the network, and improves the energy-efficiency of 3) Nodes that are cluster-heads in round 0 cannot be
WSNs beyond the normal clustering architecture [20]. LEACH again the same in the next 1/P rounds; after 1/P −
uses a TDMA/CDMA MAC to reduce inter-cluster and intra- 1, the threshold value will be T (n)=1.
cluster collisions. As a result, the lifetime of the network 4) In 1/P rounds, all nodes are eligible again to
can be extended, and is a very important issue that needs become cluster heads.
to be considered in WSNs [22], [23], [24]. Fig. 3 shows the 5) After the election of cluster head, each node broad-
schematic diagram that can help in understanding the LEACH casts an advertisement message to the rest of the
protocol. In Fig. 3, CH represents a cluster head and CN nodes by using the CSMA MAC protocol.
represents a cluster node. The algorithm is designed so that each node becomes a
cluster head at least once. After the completion of this phase,
each non-cluster-head node decides the cluster by using the
received signal strength of the advertisement.
• Cluster Set-up:

1) Each node informs the cluster head node about its


choice.
2) Each node uses the CSMA/MAC protocol to trans-
mit the information.
3) Cluster heads must keep receivers ON.
• Transmission Schedule Creation:

1) Creates a TDMA schedule as per the number of


nodes in the cluster.
2) Each node sends their data during their allocated
transmission time to the cluster head.

D. Algorithm for the Steady State Phase


In the steady-state phase, LEACH protocol follows follow-
Fig. 3. Schematic diagram of the LEACH protocol ing statements:
1) Begin sensing and transmitting data to the cluster heads.
TABLE II
2) Then, the cluster head node receives all the data, and S UMMARY OF THE SIMULATION SETTINGS OF THE LEACH PROTOCOL .
aggregates it before sending it to the base-station.
3) After a certain time, which is determined a priori, the Parameters Values
Area 500 m X 500 m
network goes back into the setup phase. Duration 550 sec
# of nodes 11
# of clusters 4
New cluster formation interval 100 sec (fixed)
Initial energy 10 joules
Disseminating interval 10 sec
Transmission range 50 m
Channel type Wireless
Transport protocol UDP
Layer Physical
Antenna OmniAntenna
Fig. 4. Different phases of the LEACH protocol Radio Propagation TwoRayGround
Sensing interval 5 sec
Data generator type Temperature
E. Simulating a WSNs with NS-2 using the Mannasim frame- Sensing type Programmed
work
For simulating WSNs using NS-2 [14], the Mannasim [15]
Section III is obtained in our case as k/N , where k is the #
is required, where the LEACH script generator is available.
of desired cluster heads, and N is the total # of nodes in the
Mannasim is an open source WSN module for NS-2 comprised
network.
of two solutions: The Mannasim Framework and The Script
Generator Tool (SGT). The Mannasim framework is a module
for WSNs simulation and is based on the NS-2. Mannasim
extends NS-2 by introducing new modules for design, devel-
opment and analysis of different WSNs applications. SGT is
a front-end for easy creation of TCL simulation scripts. SGT
is generate with Mannasim framework. An animation of the
working principle of the LEACH protocol is shown in Fig. 5.

Fig. 6. Scree shot of code used for simulating the LEACH protocol

The screen shot of output of simulation results is shown in


Fig. 7. The users are asked to verify certain results, as well as
to experiment with protocol, as per the following guidelines:
• For the given simulation time, how many rounds of
cluster formation take place?
• What is the number of cluster heads per round?
• Does the average number of cluster heads per round equal
Fig. 5. An animation of the working principle of the LEACH protocol
the desired number of cluster heads (line #475)?
• Vary the number of nodes (line #474) and expected

IV. A N I LLUSTRATED E XAMPLE number of cluster heads (line #475), and once again verify
the output
The exercise for this experiment deals with how to simulate
a routing protocol for WSNs, namely, LEACH, using the
Mannasim patch with NS-2. A summary of the simulation
settings is given in Table II. The first column in Table II
presents the parameters for the setting and the second presents
the values for the corresponding parameters. A screen shot of
code for simulating LEACH protocol using Mannasim patch
is shown in Fig. 6.
The number of access points is set to be 0 for our simulation
and all the nodes are static. The ratio P that is described in Fig. 7. Screen shot of the output of the simulation results
The screen shot of the solution of the exercise is shown in [4] B. Pati, S. Misra, and A. Mohanty. “A Model for Evaluating the
Fig. 8. The result indicates that, we have 4 cluster heads and 11 Effectiveness of Software Engineering Virtual Labs,” IEEE International
Conference on Technology Enhanced Education (ICTEE ’12), 2012.
common nodes. It can be observed from the simulation results [5] “Virtual Labs,” [Online]. http://www.vlab.co.in/. Accessed: 17 September
that the actual number of cluster heads formed per round is 2012.
varying with respect to the desired number of cluster heads. [6] “Sakshat Virtual Labs,” [Online]. http://www.sakshat.ac.in/. Accessed:
17 September 2012.
[7] “Advanced Network Technologies Virtual Labs,” [Online]. http://virtual-
labs.ac.in/ cse28/. Accessed: 17 September 2012.
[8] “Simulating a Wireless Sensor Network,” [Online].
http://vlssit.iitkgp.ernet.in/ ant/08/. Accessed: 17 September 2012.
[9] H. Liu, L. Li, and S. Jin. “Cluster Number Variability Problem in
LEACH,” Springer-Verlag Berlin Heidelberg, LNCS 4159, pp. 429 -
437, 2006.
[10] W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan. “An
Application-Specific Protocol Architecture for Wireless Microsensor Net-
works,” IEEE Transactions on Wireless Communications, vol. 1(4), pp.
660 - 670, 2002.
[11] W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan. “Energy-
Efficient Communication Protocols for Wireless Microsensor Networks,”
In Proceedings of the Hawaaian International Conference on System
Fig. 8. Screen shot of the solution of the simulation results Sciences, 2000.
[12] K. Akkaya, and M.F. Younis. “A survey on routing protocols for
wireless sensor networks,” Ad Hoc Networks, vol. 3(3), pp. 325 - 349,
2005.
V. C ONCLUSION [13] S. Lindsey, and C.S. Raghavendra. “PEGASIS: Power-efficient Gath-
ering in Sensor Information System,” In Proceedings IEEE Aerospace
Today’s technology provides a valuable opportunity to the Conference, vol. 3, pp. 1125 - 1130, 2002.
students as well as to the teachers, to practice new learning [14] “Network Simulator NS-2,” [Online]. http://www.isi.edu/nsnam/ns/.
techniques [3], [2]. Because of computers and the Internet, Accessed: 17 September 2012.
[15] “The Mannasim Framework for WSN simulation based on the Net-
most online learning today is interactive, and sometimes more work Simulator (NS-2),” [Online]. http://www.mannasim.dcc.ufmg.br/.
interactive than the traditional classroom learning [4]. HCI Accessed: 17 September 2012.
have expanded the way in such a way that information can be [16] J. Yick, B. Mukherjee, and D. Ghosal. “Wireless sensor network
survey,” Computer Networks , vol 52, pp. 2292 - 2330, 2008.
delivered to the students in a more cost effective way. [17] A. Manjeshwar, and D. P. Agrawal. “TEEN: A Protocol for Enhanced
In this paper, we describe an ANT VLab that provides Efficiency in Wireless Sensor Networks,” IEEE International Parallel
HCI for performing different experiments on WSNs. This lab and Distributed Processing Symposium, pp. 2009 - 2015, 2000.
[18] A. Manjeshwar, and D. P. Agrawal. “APTEEN: A Hybrid Protocol for
provides exercises at the end of each experiment which helps Efficient Routing and Comprehensive Information Retrieval in Wireless
the user to have an hand-on experience on the techniques used Sensor Networks,” In Proceedings of the 2nd International Workshop
in WSNs. Virtual labs are helpful for both students as well on Parallel and Distributed Computing Issues in Wireless Networks and
Mobile computing, 2002.
as for the teachers. Teachers should make use of virtual labs [19] W. Heinzelman. “Application specific protocol architectures for wireless
to facilitate learning and should adapt their current teaching networks,” PhD Thesis, MIT, 2000.
methods to incorporate this new media into the classroom [20] W. R. Heinzelman, A. Sinha, A. Wang, and A. P. Chandrakasan.
“Energy-scalable algorithms and protocols for wireless sensor networks,”
to improve their teaching process. Since there is no direct In Proceedings of the International Conference on Acoustics, Speech, and
teacher-student contact in a virtual lab environment, course Signal Processing (ICASSP ’00), pp. 3722 - 3725, 2000.
expectations and outcomes must be clearly specified, and [21] W. Heinzelman, J. Kulik, and H. Balakrishnan. “Adaptive Protocols for
Information Dissemination in Wireless Sensor Networks,” In Proceedings
timely feedback must be provided. Overall, we expect the of the Fifth Annual ACM/IEEE International Conference on Mobile
virtual labs in general, and the ANT VLab in particular, would Computing and Networking (MobiCom ’99), pp. 174-185, 1999.
be able to enhance the quality of education in India. [22] F. Liu, K. Xing, X. Cheng, and S. Rotenstreich. “Energy-efficient
MAC layer protocols in ad hoc networks,” Resource Management in
ACKNOWLEDGMENT Wireless Networking, 2004.
[23] C. R. Lin and M. Gerla. “Adaptive Clustering for Mobile Wireless
The authors would like to thank Arijit Roy, Sujata Pal and Networks,” IEEE Journal on Selected Areas in Communications, vol
15(7), pp. 1265 - 1275, 1997.
Tanay Chaki for contributing towards the development of the [24] R. Jurdak, C. Lopes, and P. Baldi. “A survey, classification and
ANT VLab at IIT Kharagpur. This work is funded with the comparative analysis of medium access control protocols for ad hoc
support of Ministry of Human Resource and Development, networks,” IEEE Communications Surveys and Tutorials, vol 6(1), 2004.
[25] J. Kulik, W. Heinzelman, and H. Balakrishnan. “Negotiation-based
Government of India. Protocols for Disseminating Information in Wireless Sensor Networks,”
In Proceeding of the Fifth ACM/IEEE MOBICOM, vol 8, pp. 169 - 185,
R EFERENCES 2002.
[1] C. C. Ko, B. M. Chen, S. Hu, V. Ramakrishnan, C. D. Cheng,
Y. Zhuang, and J. Chen. “A Web-Based Virtual Laboratory on a
Frequency Modulation Experiment,” IEEE Transaction on Systems, Man,
and Cybernetics-part C: Application and Reviews, vol. 31(3), 2001.
[2] “Criteria for Accrediting Engineering Programs,” [Online].
http://www.abet.org/. Accessed: 17 September 2012.
[3] “National Accreditation Board for Education and Training,” [Online].
http://www.qcin.org/ nabet/. Accessed: 17 September 2012.

You might also like