Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
|
|
|
- Egbert McKinney
- 10 years ago
- Views:
Transcription
1 Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India 1 Assistant Professor, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India 2 ABSTRACT: Efficiency is the keynote factor going to be addressed in this paper. Considering the fact that there are relatively very few wireless sensor networks and hardly any efficient ones, EMBA (Efficient Multihop Broadcast Asynchronous), a duty-scheduled asynchronous wireless sensor networks is being proposed that carries the ability to wake up according to its own schedule. This is accomplished by the forwarders guidance and the overhearing of broadcast messages and ACK. A forwarders guidance is when a node transmits broadcast messages to its neighbour nodes by using unicast transmissions thereby reducing redundant transmissions and arising collisions. The active time of nodes is considerably decreased by the overhearing of broadcast messages and ACKs by keeping a thorough check on the number of transmissions and reducing them. In this paper, we put the EMBA and conventional protocols of ADB and RI-MAC broadcast to test in both sparse and dense networks. And, in the end, results exhibit that EMBA achieve a lower message cost due to higher efficiency and lower energy consumption than the conventional protocols. KEYWORDS: Wireless sensor networks, multihop broadcast, asynchronous duty-cycling. I. INTRODUCTION Wireless Sensor Networks (WSNs) are specifically designed to report authentic sensing data to the sink. Since the WSN applications carry a prerequisite of energy efficiency, the applications nodes are required to function for long durations but under a limited battery capacity. WSNs nodes can sense the environment, can communicate with neighbouring nodes, and can, in many cases performs basic computations on the data being collected. WSNs are often located in unattended environment, making it difficult to change their batteries. As a result, energy conservation becomes of paramount importance in WSNs to increase the lifetime of the sensor nodes[1]. II. LITERATURE SURVEY Strictly due to the independent sleep schedules of nodes, multihop broadcast in asynchronous is relatively complicated. Hence, X-MAC-UPMA[2] is the XMAC implementation for the UMPA (Unified Power Management Architecture for Wireless Sensor Networks) package of TinyOS[3]. This is due to the ability of its two way broadcasting abilities either by the use of X-MAX-UPMA apart from its uni-cast transmissions. Nevertheless, both these schemes are highly inefficient due to the receiving of multiple copies of the message. This repetition of messages causes redundancy which increases the risk of frequent collisions and inevitable energy consumption. If multihop broadcast were able to decrease the redundant transmissions and arising collisions, it can become more efficient in an asynchronous approach. Y.Sun[3] proposed DW-MAC is one of the synchronous sleep scheduling protocols. It supports multihop broadcast by using multihop forwarding. There are three parts in DW-MAC: Sync, Data and Sleep. In Sync period, each node synchronizes its clock with its neighbour nodes. In Data period, a sender transmits a scheduling frame indicating the start point for broadcast transmission and this is performed within a following Sleep period. Designed on RI-MAC[4], ADB[5] is the current multihop broadcast used for asynchronous duty-cycled sensor networks. Although it unicasts and updates the receiver information during the broadcast progress such that redundant transmissions are avoided, this process isn t accomplished in an efficient manner. Under sparse network conditions, Copyright to IJIRCCE DOI: /ijircce
2 ADB is destined to exhibit poor performance due to its limitations to triangle shapes as supposed to polygonal topologies. B-MAC[6], X-MAC[7] and WiseMac[8] which are the current asynchronous approaches, allow nodes to operate independently. Each node has its own duty cycle schedule. In B-MAC, each node wakes up systematically to check if there are any activities currently on the wireless channel. If it is active, the node remains active to receive a possible incoming packet. Before the transmission of the data frame, a long wakeup signal called a preamble is transmitted by a sender which is longer than the receiver s sleep period. This is done so that, during the preamble, the receiver wakes up at least once and based on the schedule allow node to alternate between wake up period and sleep period. Under light traffic, B-MAC is very energy effective as the time in which a node spends in observing the activity of a channel is short. The disadvantage of B-MAC is that, a node may remain awake to receive the data that is not meant for that node. This is shown in figure 1. B-MAC Preamble Data Figure 1: Preamble in B-MAC To overcome the problem of overhearing of B-MAC, X-MAC uses sequence of short preambles before the data is transmitted. This is shown in figure 2. X-MAC ack data Figure 2: Preamble in X-MAC In this, the target address is incorporated in each short preamble, which helps the unimportant nodes to go to sleep immediately and allows the intended receiver to send an early acknowledgement to the sender so that the sender stops the preamble transmission and starts transmitting the data frame immediately. Under light traffic load, B-MAC and X-MAC achieve high efficiency but the disadvantage is that the transmissions of the preamble uses the wireless channel for a long time till the data is delivered making them less efficient in case of contending traffic flows. WiseMac uses preamble sampling technique to minimize the utilization of power. In this, a node listens to the medium for a short duration. The sender in WiseMac efficiently minimizes the length of the wakeup preamble by exploiting the sampling of the schedules of its direct neighbours. By learning the wakeup schedules of the neighbours, a node in WiseMac synchronizes with its neighbours. Each node in WiseMac should maintain the same regular wakeup schedule over time. III.PROPOSED WORK To overcome the limitations of previously implemented protocols, we propose an energy effective MAC protocol named as EMBA. We incorporate two techniques: a) Forwarder s Guidance b) Overhearing of Broadcast Messages and Ack. If the FORWARDER S GUIDANCE were to be implemented, the proposed EMBA could be an efficient support system for multihop broadcast especially in sparse networks. Additionally, EMBA applies the OVERHEARING OF BROADCAST MESSAGES AND ACK thereby aiding in minimizing the unnecessary redundant transmission. Having claimed that, EMBA could be extremely efficient in dense networks too. Tests need to be conducted on a WSN with Copyright to IJIRCCE DOI: /ijircce
3 fixed nodes without the ability to move. In such a network model, a transmission is highly likely to be unsuccessful while over a poor network. Under such scenes, re-transmission becomes inevitable thereby increasing energy consumption. In other words, for a node to transmit seemingly, good quality network links become mandatory. EMBA uses SOFA[9], STLE[10] and four-bit link estimation[11] to judge the link quality to choose the best link thereby eliminating the possibility of re-transmission and ultimately becoming more energy efficient. RI-MAC have always achieved higher throughput by being highly energy efficient with lower end-to-end delays. However, EMBA, although based on RI-MAC triumphs over the same due to the implementation of other asynchronous protocols such as B-MAC, X-MAC and Wise MAC. Due to its compatibility with other protocols, EMBA turns out to be more efficient and widely usable. For example, each node maintains a 1-hop neighbor table which consists of 1- hop neighbor list with which links and quality information is shared. In this case, the neighbor list of node shall be called as N (s) and the link quality between s and its neighbor node as LQ(s/r). Node s generates an advertisement and exchanges it with its neighbors which then share the link quality information. The information helps a node decide whether to take responsibility to cover for an uncovered neighbor or not. If not, it is delegated to another node with a comparatively better link. This periodically conducted test keeps the nodes and the transmission link quality in check. A. Overview of Forwarder s Guidance There are two types of senders, a source node that is the source of the message and another node that forwards the broadcast message generated by the source node. These both are called forwarders. For example, in a multihop broadcast, a forwarder transmits the broadcast message to the neighbor node r, which then prepares to behave as a forwarder which upon forwarding sends messages to its neighbor nodes. In the mean time, there is a possibility for an uncovered neighbor v to receive the same message. This leads to collision due to simultaneous transmissions. EMBA reduces such a collision by using forwarder s guidance. B. The Overhearing of Broadcast Messages and ACKs EMBA adopts this technique such that the doubly forwarded message is prevented and collisions are avoided thereby increasing efficiency. This is done by quickly identifying the active node as supposed to the node assigned to do the role. This reduces the active time of the forwarders and the quantity of transmissions. This technique is particularly useful in dense networks where there is an increased possibility of overhearing messages. IV. SIMULATION AND RESULTS To evaluate the performance of EMBA in various network density scenarios, we have used ns-2 simulator. We have randomly deployed 50 nodes. We compare EMBA with ADB broadcast. In this we show an evaluation of the performance of ADB and EMBA. A. Simulation Model SIMULATOR Network Simulator 2 SIMULATION OF NODES INTERFACE TYPE CHANNEL MAC TYPE QUEUE TYPE QUEUE LENGTH ANTENNA TYPE Random 5 Mobile nodes Phy/WirelessPhy Wireless Channel Mac/802_11 Queue/DropTail/PriQueue 201 Packets Omni Antenna Copyright to IJIRCCE DOI: /ijircce
4 PROPAGATION TYPE SIZE OF PACKET PROTOCOL TRAFFIC TwoRay Ground Five hundred and twelve EMBA TCP Table1: A simulation Model Figure 3: Throughput Vs delay for 3 node topology In this figure we show the comparison graph for triangular topology. The delay of a packet in a network is the time it takes the packet to reach the destination after it leaves the source. The delay is less in EMBA than that of ADB. Copyright to IJIRCCE DOI: /ijircce
5 Figure 4: Energy comparison graph Figure 4 shows an energy comparison graph with number of nodes between the operations of EMBA and ADB protocol. Energy determines the lifetime of WSN and it is the scarcest resource of WSN nodes. The results obtained are such that the proposed protocol EMBA shows less energy utilization than that of ADB. V.CONCLUSION EMBA supports multihop broadcasts in sparse networks. This is accomplished by the application of forwarder s guidance and overhearing of broadcast messages and ACKs that reduce redundant transmissions. By default, EMBA displays excellent performance in dense network conditions thereby outperforming ADB in all conditions ACKNOWLEDGEMENT We express our sincere gratitude to Management to Staff of Sahyadri College of Engineering and Management, Mangalore, for providing platform to conduct research and experimentation. REFERENCES 1. Ingook Jang, Suho Yang, Hyunsoo Yoon, Member, IEEE, and Dongwook Kim: EMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks, VOL.12, NO.4, April K.Klues, G.Hackmann, O.Chipara, and C.Lu, A component based architecture for power-efficient media access control in wireless sensor networks, in Proc.2007 SenSys, pp TinyOs 2.0 Documentation available: Copyright to IJIRCCE DOI: /ijircce
6 4. Y.Sun, O.Gurewitz, and D.Johnson, RI-MAC: a receiver-initiated asynchronous duty-cycle MAC protocol for dynamic traffic loads in wireless sensor networks, in Proc.2008 ACM SenSys, pp Y.Sun, O.Gurewitz, and D.Johnson, ADB: an efficient multihop broadcast protocol based on asynchronous duty-cycling in wireless sensor networks, in proc 2009 ACM SenSys, pp J.Polastre, J.Hill and D.Culler, Versatile low power media access for wireless sensor networks, in Proc ACM SenSys, pp M. Buettner, G.Yee, E. Anderson, and R.Han, X-MAC: a short preamble MAC protocol for duty cycled wireless sensor networks, in Proc ACM SenSys, pp A.El-Hoiydi and J.D. Dectognie, WiseMac: an ultra low power MAC protocol for multi-hop wireless sensor networks, in Proc ALGOSENSORS, pp Lee, K.Kwak, and A.T.Campbell, Solicitation-based forwarding for sensor networks, in Proc.2006 SECON, pp A.Becher, O.Landsiedel, G.Kunz, and K.Wehrle, Towards short-term link quality estimation, in Proc.2008 Emnets. 11. R.Fonseca, O.Gnawali, K.Jamieson, and P.Levis, Four-bit wireless link estimation, in Proc.2007 Hotnets. Copyright to IJIRCCE DOI: /ijircce
Mac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany [email protected] January 2010 Contents
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
Master s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System
Master s Thesis Title Load Balancing Techniques for Lifetime Prolonging in Smart Metering System Supervisor Professor Masayuki Murata Author Chuluunsuren Damdinsuren February 14th, 2012 Department of Information
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Energy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks Amre El-Hoiydi and Jean-Dominique Decotignie CSEM, Swiss Center for Electronics and Microtechnology, Inc, Rue Jaquet-Droz
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Duty-Cycle MAC Protocols and Networking Overhaul
RMAC: A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks Shu Du Amit Kumar Saha David B. Johnson Department of Computer Science, Rice University, Houston, TX, USA Abstract Duty-cycle
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling Olaf Landsiedel, Euhanna Ghadimi, Simon Duquennoy 3, Mikael Johansson [email protected], [email protected], [email protected], [email protected]
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks
BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
IEQGOR to Increase the Quality of Service in Wireless Sensor Network
IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks
Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks Junaid Ansari, Janne Riihijärvi and Petri Mähönen Department of Wireless Networks
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
THE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Cross Layer TCP Congestion Control Load Balancing Technique in MANET
Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks
A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks Changlin Yang School of Electrical, Computer and Telecommunications Engineering University of Wollongong
MAC Protocols for Wireless Sensor Networks: a Survey
1 MAC Protocols for Wireless Sensor Networks: a Survey Ilker Demirkol, Cem Ersoy, and Fatih Alagöz Abstract Wireless sensor networks are appealing to researchers due to their wide range of application
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
FAMA/TDMA Hybrid MAC for Wireless Sensor Networks
FAMA/TDMA Hybrid MAC for Wireless Sensor Networks Nuwan Gajaweera Dialog-University of Moratuwa Mobile Communication Research Lab, University of Moratuwa, Katubedda, Moratuwa, Sri Lanka Email: [email protected]
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
Performance Metrics Evaluation of Routing Protocols in MANET
Performance Metrics Evaluation of Routing Protocols in MANET Shivashankar 1, Varaprasad.G 2, Suresh H.N 3, Devaraju G 4, Jayanthi.G 5 Associate Professor, Department of Medical Electronics, Dr. Ambedkar
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications
A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications Nithya Ramanathan, Mark Yarvis, Jasmeet Chhabra, Nandakishore Kushalnagar, Lakshman Krishnamurthy, Deborah Estrin
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
A dynamic MAC protocol for wireless sensor network based network traffic monitoring and feedback
Abstract A dynamic MAC protocol for wireless sensor network based network traffic monitoring and feedback Yang Xianhui, Ren Honge *, Jing Weipeng he College of Information and Computer Engineering, Northeast
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Performance Evaluation of Proposed SEHEE- MAC for wireless Sensor Network in Habitat Monitoring
International Journal of Scientific & Engineering Research, Volume 2, Issue 1, October-211 1 Performance Evaluation of Proposed - MAC for wireless Sensor Network in Habitat Monitoring Mrs. Swati V. Sankpal
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks
-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks Andre Barroso, Utz Roedig and Cormac Sreenan Mobile & Internet Systems Laboratory, University College Cork, Ireland Email: a.barroso
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
