Professional Documents
Culture Documents
978-1-4673-4369-5/12/$31.00 2012
c IEEE
C. Organization • To share costly equipment and resources, which are
This paper is organized as follows. In Section II, we describe otherwise available to limited number of users due to
briefly the overview of the Advanced Network Technologies constraints on time and geographical distances.
Virtual Lab. In Section III, we describe an experiment on
B. Target Audience
simulating a wireless sensor network with NS-2. Section IV
illustrated an suitable example and in Section V, we conclude This lab is suitable for undergraduate or postgraduate stu-
the paper. dents having a course on Computer Network and Wireless
Sensor Networks.
II. OVERVIEW OF THE A DVANCED N ETWORK
T ECHNOLOGIES V IRTUAL L AB C. Concept of an Experiment
In this Section, we have first described the objectives of our The model of an experiment in the context of virtual labs
designed ANT VLab. Subsequently, we have described the has been specified by the experts’ committee of virtual labs.
target audience, concept of an experiment, human computer Although, development of each lab is going on in a distributed
interface and the list of experiments. Fig. 2 shows the screen manner in different institutions of India, an attempt has been
shot of an experiment on WSNs designed in the ANT VLab. made to make all the labs follow a basic structure [4]. As per
these guidelines, an experiment consists of:
• Theory: This section provides a brief theoretical overview
on the subject matter of the particular experiment.
• Simulation: Flash animations have been used to illustrate
specific concepts on the topic.
• Self-evaluation: This section provides a set of multiple-
choice type questions for each experiment that lets an
user to judge his knowledge on the subject.
• Procedure: This section provides detailed steps on how
to solve the different exercises for a given experiment.
• Exercises: This is the core section of an experiment. In
fact, the notion of real-life experiment actually maps to
this section. Depending upon the topic, a set of exercises
are given to be worked out by the students. Link to
Fig. 2. A screen shot of the ANT VLab
a possible solution of the exercise, with an optional
analysis, is also presented here.
A. Objectives • References: Provides a list of books and/or URLs of web
resources that have helped in the development of the
Virtual Labs will provide to the students the result of an current experiment.
experiment by one of the following methods (or possibly a
combination) D. Human Computer Interface
• Modeling the physical phenomenon by a set of equations
Virtual labs should be as realistic as possible. Also, unless
and carrying out simulations to yield the result of the the interface is user friendly, it will be difficult to conduct
particular experiment. This can, at-the-best, provide an the experiment remotely [1]. In ANT VLab, the GUI is im-
approximate version of the real-world experiment. plemented using JQuery, Django framework, Python, Hypertex
• Providing measured data for virtual lab experiments cor-
Markup Language (HTML), and JavaScript for supporting web
responding to the data previously obtained by measure- browsers.
ments on an actual system.
• Virtual labs will be made more effective and realistic E. List of Experiments
by providing additional inputs to the students like ac-
companying audio and video streaming of an actual lab ANT VLab has a set of ten experiments focusing on
experiment and equipment. different areas of the subject. A list of all the experiments
• To enthuse students to conduct experiments by the arous-
in ANT VLab is described in Table I.
ing their curiosity. This would help them in learning basic
and advanced concepts through remote experimentation. F. Deployment
• To provide a complete Learning Management System The ANT VLab has been deployed to the Production server
(LMS) around the virtual labs where the students can hosted by IIIT-Hyderabad. Presently, the official URL of this
avail the various tools for learning, including additional virtual lab is: http://virtual-labs.ac.in/cse28/ [7]. An extensive
web-resources, video-lectures, animated demonstrations documentation for the deployment process has been prepared
and self evaluation. as well.
TABLE I
L ISTS OF E XPERIMENTS IN THE ANT VL AB . B. Operations of LEACH
The operation of LEACH is divided into number of rounds
No. Experiments
1 Basics of Network Simulation with each round having two phases: setup phase and steady-
2 Simulating a Local Area Network state phase. The phases in each round of the LEACH protocol
3 Measuring Network Performance is shown in Fig. 4. In the setup phase, clusters are organized
4 Simulation of a Satellite Network
5 Simulating a WiFi Network
and this is done in three steps that is, cluster-head advertise-
6 Simulating a WiMAX Network ment, cluster set-up and transmission schedule creation. In the
7 Simulating a Mobile Adhoc Network steady-state phase, data transfer to the base station occurs [11]
8 Simulating a Wireless Sensor Network [19]. The algorithm for both the phases of the LEACH protocol
9 Setting up a Bluetooth Network
10 Setting up a Zigbee Network is given as follows.
phase and steady-state phase with their algorithms and a 1) Let x be a random no between 0 and 1, n be the
suitable schematic diagram of LEACH protocol. given node, P be the cluster-head probability, r be
the current round, G the set of nodes that were not
A. Discussions on LEACH cluster-heads in the previous rounds.
LEACH is a cluster-based routing protocol for WSNs [12], 2) If the random number is < the following threshold
[8]. In WSNs, sensor nodes are partitioned into a number T (n), then the node becomes a cluster head.
of small groups known as clusters. Each cluster has the
coordinators, called cluster head (CH), and each node in P
1 if n ∈ G
a cluster is called a cluster node [9]. LEACH adopts the T (n) = 1−P ∗(rmod P )
0, otherwise
clustering concept to distribute energy among the sensor
nodes in the network, and improves the energy-efficiency of 3) Nodes that are cluster-heads in round 0 cannot be
WSNs beyond the normal clustering architecture [20]. LEACH again the same in the next 1/P rounds; after 1/P −
uses a TDMA/CDMA MAC to reduce inter-cluster and intra- 1, the threshold value will be T (n)=1.
cluster collisions. As a result, the lifetime of the network 4) In 1/P rounds, all nodes are eligible again to
can be extended, and is a very important issue that needs become cluster heads.
to be considered in WSNs [22], [23], [24]. Fig. 3 shows the 5) After the election of cluster head, each node broad-
schematic diagram that can help in understanding the LEACH casts an advertisement message to the rest of the
protocol. In Fig. 3, CH represents a cluster head and CN nodes by using the CSMA MAC protocol.
represents a cluster node. The algorithm is designed so that each node becomes a
cluster head at least once. After the completion of this phase,
each non-cluster-head node decides the cluster by using the
received signal strength of the advertisement.
• Cluster Set-up:
Fig. 6. Scree shot of code used for simulating the LEACH protocol
IV. A N I LLUSTRATED E XAMPLE number of cluster heads (line #475), and once again verify
the output
The exercise for this experiment deals with how to simulate
a routing protocol for WSNs, namely, LEACH, using the
Mannasim patch with NS-2. A summary of the simulation
settings is given in Table II. The first column in Table II
presents the parameters for the setting and the second presents
the values for the corresponding parameters. A screen shot of
code for simulating LEACH protocol using Mannasim patch
is shown in Fig. 6.
The number of access points is set to be 0 for our simulation
and all the nodes are static. The ratio P that is described in Fig. 7. Screen shot of the output of the simulation results
The screen shot of the solution of the exercise is shown in [4] B. Pati, S. Misra, and A. Mohanty. “A Model for Evaluating the
Fig. 8. The result indicates that, we have 4 cluster heads and 11 Effectiveness of Software Engineering Virtual Labs,” IEEE International
Conference on Technology Enhanced Education (ICTEE ’12), 2012.
common nodes. It can be observed from the simulation results [5] “Virtual Labs,” [Online]. http://www.vlab.co.in/. Accessed: 17 September
that the actual number of cluster heads formed per round is 2012.
varying with respect to the desired number of cluster heads. [6] “Sakshat Virtual Labs,” [Online]. http://www.sakshat.ac.in/. Accessed:
17 September 2012.
[7] “Advanced Network Technologies Virtual Labs,” [Online]. http://virtual-
labs.ac.in/ cse28/. Accessed: 17 September 2012.
[8] “Simulating a Wireless Sensor Network,” [Online].
http://vlssit.iitkgp.ernet.in/ ant/08/. Accessed: 17 September 2012.
[9] H. Liu, L. Li, and S. Jin. “Cluster Number Variability Problem in
LEACH,” Springer-Verlag Berlin Heidelberg, LNCS 4159, pp. 429 -
437, 2006.
[10] W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan. “An
Application-Specific Protocol Architecture for Wireless Microsensor Net-
works,” IEEE Transactions on Wireless Communications, vol. 1(4), pp.
660 - 670, 2002.
[11] W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan. “Energy-
Efficient Communication Protocols for Wireless Microsensor Networks,”
In Proceedings of the Hawaaian International Conference on System
Fig. 8. Screen shot of the solution of the simulation results Sciences, 2000.
[12] K. Akkaya, and M.F. Younis. “A survey on routing protocols for
wireless sensor networks,” Ad Hoc Networks, vol. 3(3), pp. 325 - 349,
2005.
V. C ONCLUSION [13] S. Lindsey, and C.S. Raghavendra. “PEGASIS: Power-efficient Gath-
ering in Sensor Information System,” In Proceedings IEEE Aerospace
Today’s technology provides a valuable opportunity to the Conference, vol. 3, pp. 1125 - 1130, 2002.
students as well as to the teachers, to practice new learning [14] “Network Simulator NS-2,” [Online]. http://www.isi.edu/nsnam/ns/.
techniques [3], [2]. Because of computers and the Internet, Accessed: 17 September 2012.
[15] “The Mannasim Framework for WSN simulation based on the Net-
most online learning today is interactive, and sometimes more work Simulator (NS-2),” [Online]. http://www.mannasim.dcc.ufmg.br/.
interactive than the traditional classroom learning [4]. HCI Accessed: 17 September 2012.
have expanded the way in such a way that information can be [16] J. Yick, B. Mukherjee, and D. Ghosal. “Wireless sensor network
survey,” Computer Networks , vol 52, pp. 2292 - 2330, 2008.
delivered to the students in a more cost effective way. [17] A. Manjeshwar, and D. P. Agrawal. “TEEN: A Protocol for Enhanced
In this paper, we describe an ANT VLab that provides Efficiency in Wireless Sensor Networks,” IEEE International Parallel
HCI for performing different experiments on WSNs. This lab and Distributed Processing Symposium, pp. 2009 - 2015, 2000.
[18] A. Manjeshwar, and D. P. Agrawal. “APTEEN: A Hybrid Protocol for
provides exercises at the end of each experiment which helps Efficient Routing and Comprehensive Information Retrieval in Wireless
the user to have an hand-on experience on the techniques used Sensor Networks,” In Proceedings of the 2nd International Workshop
in WSNs. Virtual labs are helpful for both students as well on Parallel and Distributed Computing Issues in Wireless Networks and
Mobile computing, 2002.
as for the teachers. Teachers should make use of virtual labs [19] W. Heinzelman. “Application specific protocol architectures for wireless
to facilitate learning and should adapt their current teaching networks,” PhD Thesis, MIT, 2000.
methods to incorporate this new media into the classroom [20] W. R. Heinzelman, A. Sinha, A. Wang, and A. P. Chandrakasan.
“Energy-scalable algorithms and protocols for wireless sensor networks,”
to improve their teaching process. Since there is no direct In Proceedings of the International Conference on Acoustics, Speech, and
teacher-student contact in a virtual lab environment, course Signal Processing (ICASSP ’00), pp. 3722 - 3725, 2000.
expectations and outcomes must be clearly specified, and [21] W. Heinzelman, J. Kulik, and H. Balakrishnan. “Adaptive Protocols for
Information Dissemination in Wireless Sensor Networks,” In Proceedings
timely feedback must be provided. Overall, we expect the of the Fifth Annual ACM/IEEE International Conference on Mobile
virtual labs in general, and the ANT VLab in particular, would Computing and Networking (MobiCom ’99), pp. 174-185, 1999.
be able to enhance the quality of education in India. [22] F. Liu, K. Xing, X. Cheng, and S. Rotenstreich. “Energy-efficient
MAC layer protocols in ad hoc networks,” Resource Management in
ACKNOWLEDGMENT Wireless Networking, 2004.
[23] C. R. Lin and M. Gerla. “Adaptive Clustering for Mobile Wireless
The authors would like to thank Arijit Roy, Sujata Pal and Networks,” IEEE Journal on Selected Areas in Communications, vol
15(7), pp. 1265 - 1275, 1997.
Tanay Chaki for contributing towards the development of the [24] R. Jurdak, C. Lopes, and P. Baldi. “A survey, classification and
ANT VLab at IIT Kharagpur. This work is funded with the comparative analysis of medium access control protocols for ad hoc
support of Ministry of Human Resource and Development, networks,” IEEE Communications Surveys and Tutorials, vol 6(1), 2004.
[25] J. Kulik, W. Heinzelman, and H. Balakrishnan. “Negotiation-based
Government of India. Protocols for Disseminating Information in Wireless Sensor Networks,”
In Proceeding of the Fifth ACM/IEEE MOBICOM, vol 8, pp. 169 - 185,
R EFERENCES 2002.
[1] C. C. Ko, B. M. Chen, S. Hu, V. Ramakrishnan, C. D. Cheng,
Y. Zhuang, and J. Chen. “A Web-Based Virtual Laboratory on a
Frequency Modulation Experiment,” IEEE Transaction on Systems, Man,
and Cybernetics-part C: Application and Reviews, vol. 31(3), 2001.
[2] “Criteria for Accrediting Engineering Programs,” [Online].
http://www.abet.org/. Accessed: 17 September 2012.
[3] “National Accreditation Board for Education and Training,” [Online].
http://www.qcin.org/ nabet/. Accessed: 17 September 2012.