Exploiting Asymmetric Links in a Convergecast Routing Protocol for Wireless Sensor Networks

  • Bilel Romdhani
  • Dominique Barthel
  • Fabrice Valois
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7363)


Most existing routing protocols designed for WSNs assume that links are symmetric, which is in contradiction with what is observed in the field. Indeed, many links in real-world WSNs are asymmetric. Asymmetric links can dramatically decrease the performance of routing algorithms not designed to cope with them. Quite naturally, most existing routing protocol implementations prune the asymmetric links to only use the symmetric ones. In our experience, asymmetric links are a valuable asset to improve network connectivity, capacity and overall performance. We therefore introduce AsymRP (Asymmetric Convergecast Routing Protocol), a new routing protocol for collecting data in WSNs. AsymRP, a convergecast routing protocol, assumes 2-hop neighborhood knowledge and uses implicit and explicit acknowledgment. It takes advantage of asymmetric links to increase delivery ratio while lowering hop count and packet replication.


Wireless Sensor Networks Asymmetric links Convergecast routing protocol 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Heurtefeux, K., Valois, F.: Is rssi a good choice for localization in wireless sensor network? In: The 26th IEEE International Conference on Advanced Information Networking and Applications (2012)Google Scholar
  2. 2.
    Kim, K.H., Shin, K.G.: On accurate measurement of link quality in multi-hop wireless mesh networks. In: The 12th Annual International Conference on Mobile Computing and Networking (2006)Google Scholar
  3. 3.
    Zhou, G., He, T., Krishnamurthy, S., Stankovic, J.A.: Impact of radio irregularity on wireless sensor networks. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (2004)Google Scholar
  4. 4.
    Kawadia, V., Kumar, P.: Power control and clustering in ad hoc networks. In: The 22nd Annual Joint Conference of the IEEE Computer and Communications (2003)Google Scholar
  5. 5.
    Narayanaswamy, S., Kawadia, V., Sreenivas, R.S., Kumar, P.R.: Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the compow protocol. In: European Wireless Conference (2002)Google Scholar
  6. 6.
    Nesargi, S., Prakash, R.: A tunneling approach to routing with unidirectional links in mobile ad-hoc networks. In: The 9th International Conference on Computer Communications and Networks (2000)Google Scholar
  7. 7.
    Shah, V., Krishnamurthy, S.: Handling asymmetry in power heterogeneous ad hoc networks: A cross layer approach. In: Proceedings 25th IEEE International Conference on Distributed Computing Systems (2005)Google Scholar
  8. 8.
    Zhou, G., He, T., Krishnamurthy, S., Stankovic, J.A.: Models and solutions for radio irregularity in wireless sensor networks. ACM Trans. Sen. Netw. 2, 221–262 (2006)CrossRefGoogle Scholar
  9. 9.
    Le, T., Sinha, P., Xuan, D.: Turning heterogeneity into an advantage in wireless ad-hoc network routing. Ad Hoc Netw. 8(1), 108–118 (2010)CrossRefGoogle Scholar
  10. 10.
    Sang, L., Arora, A., Zhang, H.: On exploiting asymmetric wireless links via one-way estimation. In: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (2007)Google Scholar
  11. 11.
    Chen, B.B., Hao, S., Zhang, M., Chan, M.C., Ananda, A.L.: Deal: discover and exploit asymmetric links in dense wireless sensor networks. In: The 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (2009)Google Scholar
  12. 12.
    Romdhani, B., Barthel, D., Valois, F.: Exploiting Asymmetric Links in a Convergecast Routing Protocol for WSNs. Rapport de recherche RR-7586, INRIA (2011)Google Scholar
  13. 13.
    Hamida, E.B., Chelius, G., Gorce, J.M.: Scalable versus accurate physical layer modeling in wireless network simulations. In: Proceedings of the 22nd Workshop on Principles of Advanced and Distributed Simulation, Washington, DC, USA (2008)Google Scholar
  14. 14.
    Levis, P., Patel, N., Culler, D., Shenker, S.: Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In: Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation, NSDI 2004 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Bilel Romdhani
    • 1
  • Dominique Barthel
    • 2
  • Fabrice Valois
    • 1
  1. 1.CITIUniversity of Lyon, INSA-LyonFrance
  2. 2.Orange Labs R&DMeylanFrance

Personalised recommendations