Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
|
|
|
- Bertram Griffin
- 10 years ago
- Views:
Transcription
1 Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department of Computer Science & Engineering, Swami Devi Dayal Institute of Engineering & Technology- Barwala Panchkula, Kurukshetra University Kurukshetra Haryana India Abstract: In a WSN power consumption and congestion are major bottlenecks. These two are inter-related too Power consumption causes several nodes to become dormant and thus increase congestion in the network. Also, congestion leads to abuse of network resources leading increased power consumption. By using adaptive load balancing technique, we reduce the problem of congestion in a network. We improved the traffic splitting protocol (TSP).The proposed method distributes the load in the network to all the nodes in the parallel direction such that no node has a congestion value above threshold. Simulation results have shown the algorithm to be efficient. Keywords: WSNs (Wireless Sensor Networks), CH (Cluster Head), LEACH (Low Energy Adaptive Clustering Protocol), ADC (Analog to Digital Converter), DAC (Digital to Analog Converter). 1. Introduction A WSN contains different types of sensor nodes that are used to sense and transfer the information to the base station or the next neighbour node. By using such a configuration, sensor nodes in such WSNs have resource constraints like limited energy, low storage capacity, and weak computing ability [1].Recent technologies made it possible to minimise the cost and the bulkiness of the electronic devices. The network is capable of monitoring activities and phenomenon which cannot be monitored easily by human beings, such as site of nuclear accident, some chemical field monitoring or environment monitoring for longer period of time.[2] Micro sensor networks can contain hundreds or thousands of sensing nodes. It is desirable to make these nodes as cheap and energy efficient as possible and relay on their large numbers to obtain high quality results. The wide range of sensors is available such as humidity, movement, temperature, pressure, and lightening conditions are monitored [3]. Lower Power consumption restricts sensor to use the limited resources such as less low transmit power, memory requirement and less processing calculation. The aims is to provide better end-to-end delay, less number of dead nodes, a higher output, and overall lower power consumption compared to other protocols. A state-of-the-art technology Wireless Sensor Networks (WSNs) is used to sense the data from all locations. Different parts of sensor nodes can be classified in six major units: 1. Communication Unit 2. Processing Unit 3. Sensing Unit 4. ADC/DAC Converters 5. Power Supply 6. Temporary Storage Unit Figure 1: General Architecture Figure 1.Shows general architecture of sensor nodes. The sensors in the sensing unit interact physically with the environment. The sensed data is send to the ADC/DAC converters. The micro-controller receives digital data and does the required processing by using the temporary memory. The processed data are then transmitting to the transmitter of the communication unit for transmission towards the cluster head. On the other hand, the data from the Cluster Head is received by the receiver and then transferred to the processor for further processing. The power source used in sensor node can be a lithium battery. The two main parts where most of the power consumption occurs are: 1) The processing units and 2) The communication Unit. Paper ID:
2 The cluster head is either a mobile or fixed node, which has the capability to connect the sensor network to the internet where the user can access and process the data. Routing in WSNs is very essential due to the inherent traits that distinguish this network from other wireless networks or cellular networks. Limited memory and power are the parameters which affect the amount of data to process or store in an individual node. The architecture of typical WSN is shown in Figure 2. Figure 2: Wireless Sensor Network The various areas including industry, commercial sector, or military fields are increasing its use rapidly all over the world. Healthcare becomes other area in industry and commercial sector where WSNs are being deployed. The deployed sensors help the hospitals and operators to monitor the patient s vital signs. 2. Related Work Now we had three major schemes to discuss and implement. In WSN load can be balanced by using hierarchical clustering algorithm. Cluster formation and cluster election is very important for data gathering [4] Firstly Cluster head formation in cluster is formed, head is being chosen on basis of node with maximum battery life and shortest distance. Secondly TSP introduced four factor network size factors, network routing factor, network connectivity factor and network hopes factor [5]. Traffic splitting protocol in which the nodes are route on the basis of route assignment or load sharing method and thirdly ALB in which load of each node is being balanced so that each node carries same amount of load. In the whole process the prime focus was on reducing the load on node which will in turn provide a good platform to improve upon number things as discuss in the objectives of thesis. ALB routing algorithm avoids the occurrence of link overload, was put forward &increased the network resource utilization rate and ensured data transmission reliable. Cluster and Traffic Distribution Protocol for Energy Consumption in Wireless Sensor Network [6].For load balancing in the network we improved the traffic splitting protocol (TSP). E-LEACH (Low energy adaptive clustering hierarchy) improves the performance of basic LEACH protocol whose aim is to elect the cluster-head on the basis of remnant energy of sensor node in WSN. Cluster head collects the data from all common node of their range E- LEACH has the same concept as of LEACH protocol. Difference between LEACH and E-LEACH is that in E- LEACH protocol includes additional parameter one is residue energy and second is consumed energy. There are two phases in E-LEACH as same in LEACH first phase is cluster set up phase and second is steady-phase. In cluster set up phase, cluster head select on the basis of round time as same LEACH protocol. The main improvement in cluster head selection algorithm is to avoid the lower energy residual energy node and elect the higher residual energy node. In second phase i.e. steady state phase each intermediated node sends the data during its own TDMA time slot. E-LEACH uses minimum spanning tree between cluster heads and sends the data to sink node. Traffic splitting protocol (TSP) consists of two methods. The first method is route assignment method and second is load sharing method. Route assignment method uses the information collected about each route to calculate weight for route. Second method i.e. load sharing method select particular route for individual data dynamically at real time. Also, it keeps the actual traffic allocated to each route relevant to the weight assigned to the route. Adaptive Load-Balanced Routing Algorithm [7], ALB routing algorithm is based on minimum interference and cross-layer design principle is proposed. The least interference path algorithm principle is introduced briefly, and the implementation of adaptive load-balanced routing algorithm is to elaborate in detail. The good interaction of the information between the layers based on cross-layer optimization, this improved the least interference path algorithm and presented a new routing algorithm named adaptive load-balanced routing algorithm which could effectively avoid the occurrence of link overload, was put forward. The algorithm could realize the prediction of network congestion and TCP can adjust the congestion window size self-adaptive according to the real-time status of link. The simulation results show that packet loss rate had been greatly improved and throughput rate had got a large scale enhancement. It not only avoided the occurrence of link overload phenomenon, but also increased the network resource utilization rate and ensured data transmission reliable. Improved clustering protocol for energy efficiency algorithms in wireless sensor networks, [8].This algorithm is used for energy efficient routing based on a cluster head selection. To extend the lifetime of networks and it improves node energy efficiency, balances energy consumption of all sensor nodes, increases dependability of data transmission and remits network lifetime in comparison of existing clustering protocol. The proposed algorithm having a two layer of cluster formation between the nodes and Base station like LEACH, it consists of two layers of clusters establishment. On the first layer Cluster Heads are formed where the member nodes transmit the data to their respective Cluster Head and CH aggregate the received data. Once again the second layer super Cluster Heads are formed. After the formation of Super Cluster Head (SCH), the CHs look for the nearest SCHs by computing the distance between the CH data to respective Super Cluster Head (SCH) in the similar like a LEACH. The Super Cluster Head (SCH) received data from their Closest Cluster Head, aggregate all received data, Paper ID:
3 transformed them into a compressed data and send to the base station (BS). The number of Cluster Heads and S-CHs are initially decided by using a predetermined fractional value. In SCH LEACH, Minimize the overall communication distance between the nodes and Base Stations. The routing protocols LEACH, M-LEACH and Proposed algorithm have simulated in MATLAB. The average distance and average energy dissipation are calculated and compare the average energy and distance. 3. Proposed Algorithm A. Design Consideration Table1: Initial parameter S. No. Name Value 1 Network Area 400*400 sq. Units 2 No. Of Nodes 50 3 Delay between subsequent Packet 0.2 unit 4 Packet Size 5 bit 5 Initial energy 500mJ B. Description of Proposed Algorithm Here in designing algorithm adaptive load balancing technique and traffic splitting protocol works with E- LEACH protocol. Step I Cluster head formation: In clustering, each node takes part in cluster head formation. The process of cluster head formation on basis of battery consumption left. The battery having more power left is chosen to be cluster head. This whole processes takes place in following sequence: 1) First layer Cluster Heads are formed where the member nodes transmit the data to their respective Cluster Head and CH aggregate the received data. 2) Second layer super Cluster Heads are formed. 3) After the formation of Super Cluster Head (SCH), the CHs look for the nearest SCHs by computing the distance between the CH data to respective Super Cluster Head (SCH) in the similar like a LEACH. 4) The Super Cluster Head (SCH) received data from their Closest Cluster Head, aggregate all received data, transformed them into a compressed data and send to the base station (BS). 5) The number of Cluster Heads and S-CHs are initially decided by using a predetermined fractional value. Step II Traffic Splitting Protocol: By enhancing the traffic splitting protocol (TSP) load balancing in the network easily. This improved traffic splitting protocol (TSP) in steady state phase uses each intermediated node sends the data during its own TDMA time slot. TSP consists of two methods. 1) Route assignment method uses the information collected about each route to calculate weight for route. In this method we select the path to be followed for sending packets from sender to receiver node. This selection is on basis of routing table we have in our record. We find shortest distance path from routing table. 2) Load sharing method select particular route for individual data dynamically at real time. This load sharing is done to reduce the load of each node sending data to other node. This load sharing ensures best use of available power in nodes. Step III ALB: This routing algorithm avoids the occurrence of link overload, was put forward & increased the network resource utilization rate and ensured data transmission reliable. E-LEACH (Low energy adaptive clustering hierarchy) protocol includes additional parameter one is residue energy and second is consumed energy & two phases first phase is cluster set up phase and second is steady-phase. In cluster set up phase, cluster head avoid the lower residual energy node and select higher residual energy node. 4. Pseudo Code Step 1: let load at 4 paths be L1, L2, L3 & L4. Step 2: Start for loop path 1 >=4. Step 3: if (L1 > T) \\ T is the load threshold. Step 4: find difference in load D= L1 - T; Step 5: if (L2 ' < T). Step 6: put extra load to this path L2 = L2 ' + D; \\ L2 & L2 ' are the current and previous loads. Step 7: end if condition; Step 8: if (L3 ' < T). Step 9: put extra load to this path L3 = L3 ' + D; \\ L3 & L3 ' are the current and previous loads. Step 10: end if condition; Step 11: if (L4 ' < T). Step 12: put extra load to this path L4 = L4 ' + D; \\ L4 & L4 ' are the current and previous loads. Step 13: end if condition; Step 14: end if condition; REPEAT THE STEPS 2 TO 14 FOR L2, L3 & L4 also. 5. Simulation Result To get the simulation results MATLAB tool is used. As mentioned earlier, E-LEACH using ALB works in rounds. For our experiments the total number of rounds used is 20. E-Leach with TSP helps in proper routing of different nodes according to two different methods. First is route assignment method in which nodes are send according to routing weight of different paths, Second is Load sharing method in which routing of nodes is done in such a way that each nodes share same load. While in the case of ALB routing algorithm avoid the occurrence of link overload, was put forward & increased the network resource utilization rate and ensured data transmission reliable.e-leach (Low energy adaptive clustering hierarchy) protocol includes additional parameter one is residue energy and second is consumed energy & two phases first phase is cluster set up phase and second is steady phase In set up phase, all the nodes are being balanced according to the load. While in steady phase all the nodes transmit equal amount of information from source to sink. Simulations of E-LEACH using ALB in comparison with E-LEACH in which only one path is considered and E- LEACH using TSP in which paths are four but unbalanced performed to observe the average load, power left, power consumption, end-to-end delay, average jitter and overall PDR or throughput. Paper ID:
4 A. Average Load: Figure 3 shown that the total no. of average load in E-LEACH using TSP is higher than the total no. of average load in E-LEACH using ALB also shows average load of E-LEACH using TSP (Traffic splitting protocol) & ALB (Adaptive load balancing). C. Power Consumption Comparison: Figure 5 shows the energy consumption comparison of E- LEACH having one path, E -LEACH using TSP having four paths but unbalanced unlike ALB and E-LEACH using ALB. Figure 3: Total number of average load in E-LEACH routing protocol using TSP & ALB. As ALB algorithm adaptively balanced the load in the network & gives better results in terms of network lifetime, end-to-end delay and throughput. B. Power Left Comparison: Figure 4 shows the total number of power left after each round of E-LEACH, E- LEACH using TSP (Traffic splitting protocol) & ALB (Adaptive load balancing). The E-LEACH using ALB protocol has the overall network life of 10 rounds, while E- LEACH and E-LEACH using TSP has network life of 7 and 9 rounds respectively. Figure 5: Total number of power consumed in each round in E-LEACH, TSP & ALB. The E-LEACH using ALB protocol reaches the threshold level of 100 joules in 10 rounds, while E-LEACH and E- LEACH using TSP consumes 100 joules of energy in 7 and 9 rounds respectively. This shows that our proposed protocol is about 30% and 10% better in energy consumption than E- LEACH and E-LEACH using TSP respectively. D. Throughput (Bits/s): The ratio of total data received by a receiver from a sender for a time the last packet received by receiver measures in bit/sec and byte/sec. It can be expressed mathematically as; Throughput (bit/sec) = Number of delivered packet * Packet size * 8 *Total duration of simulation. The throughput of the protocols can be defined as percentage of the packets received by the destination among the packets sent by the source. The throughput is measured in bps (bits per second). The number of bps must be high for a better system performance. Figure 6 shows that throughput of E-LEACH using ALB is significantly greater as compared to E-LEACH and E- LEACH using TSP. Graph shows that the throughput of E- LEACH using ALB is more than the other two protocols because of adaptively load balancing in clustering and provide congestion free network. Figure 4: Total number of power left in each round in E- LEACH, TSP & ALB This shows that our proposed protocol is about 30% and 10% better network lifetime than E-LEACH and E-LEACH using TSP respectively. Paper ID:
5 Figure 6: Comparison of E-LEACH, TSP & ALB Protocols with respect to Throughput. Thus, it proves that E-LEACH using ALB has higher throughput as compared to E-LEACH and E-LEACH using TSP. E. Average End-To-End Delay: Average End-to End delay is difference between the time at which the first packet was send by transmitter node and time at which that packet was being received by destination node. The Average of End-to- End delay in case of E-LEACH is maxim in case of ALB it is minimum and average in the case of TSP, as shown in figure ALB gives better result than the E-LEACH & TSP. Figure 8: Comparison of E-LEACH, TSP & ALB Protocols with respect to Average jitter. Average Jitter is maximum for E-LEACH, minimum for ALB and average in the case of TSP, as a network size of 100 nodes it is found that the jitter in the case of ALB gives better result than the E-LEACH & TSP. 6. Conclusion Sensors are required to route packets as well as transmit the data to the base station. If more of these operations are performed the sensor battery life decays drastically. By using the proper communication protocol, the control of congestion and unnecessary data transmission or reception can help in better management of battery life. By considering the influencing factors such as congestion, energy awareness, scalability and latency, the purpose of this research is to find a congestion free energy efficient routing protocol for Wireless Sensor Networks. 7. Future Scope In future the use of wireless technology will more prominent so reducing the consumptions of power of the devices involved in transmission/reception is the main requirement of the future. The investment of time and technology is being made to solve this problem and methodologies like LEACH, E-LEACH, ALB, etc. That helps in the cause of making wireless technologies more efficient. Figure 7: Comparison of E-LEACH, TSP & ALB Protocols with respect to Average End-to-end delay. F. AVERAGE JITTER(s): Average Jitter is the time gap between the different packets arriving at the destination node. This may caused by network congestion, drift in time, different routing paths, and many more. References [1] I.Akilildiz, Sankarasubramanian, E. Cayirci, Survey on sensor networks, pp , IEEE [2] NaumanIsar and Irfan Awanet et al Multihop Clustering Algorithm Load Balancing In Wireless Sensor Network. [3] Wendi Rabiner Heinzelman, Anantha Chanderakasan, and Balakrishnan et al Energy-Efficient Communication Protocols For Wireless Micro sensor Networks. [4] Tejal D. Irkhede and B. N. Mahajan et al. Load Balancing Technique for Distributed and Specialized Nodes using Multipath Approach in Wireless Sensor Network. Paper ID:
6 [5] Mohomed Ebada, Traffic Routing Protocol for multipath routing in WSN, 2011 IEEE [6] Irkhede Tejal, ME (WCC) Project Student and Jaini Prachi et al. Cluster and Traffic Distribution Protocol for Energy Consumption in Wireless Sensor Network. [7] Xiao Guo Ye, Kang MengLv, RuChuan Wang and Li Juan Sun, et al Adaptive Load-Balanced Routing Algorithm. [8] Kalaiselvi K. and Suresh G.R., et al Improved Clustering Protocol for Energy Efficiency Algorithms In Wireless Sensor Network. Paper ID:
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
Survey on different attacks in Wireless Sensor Networks and their prevention system
Survey on different attacks in Wireless Sensor Networks and their prevention system Ruchita Dhulkar, Ajit Pokharkar, Mrs. Rohini Pise 1 BE IT, Department of Information Technology, PCCOE, Maharashtra,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran [email protected]
Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS).
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Relative Analysis
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
Efficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS.
MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS. NAUMAN ISRAR and IRFAN AWAN Mobile Computing Networks and Security Research group School of Informatics University of Bradford,
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
Research Article CAPNet: An Enhanced Load Balancing Clustering Algorithm for Prolonging Network Lifetime in WSNs
International Distributed Sensor Networks, Article ID 234394, 8 pages http://dx.doi.org/1.1155/214/234394 Research Article CAPNet: An Enhanced Load Balancing Clustering Algorithm for Prolonging Network
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks
Department of Electrical Engineering, Mathematics and Computer Science Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Master Thesis Thijs Mutter 439 Supervisors
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
A Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey
Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey PHANI PRIYA KAKANI THESIS WORK2011-2013 SUBJECT Master of Electrical Engineering: Specialization inembedded Systems Postadress:
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Node Degree based Clustering for WSN
Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Hybrid Data Gathering Scheme in Wireless Sensor Networks
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 73-88 Hybrid Data Gathering Scheme in Wireless Sensor Networks Swarup Kumar Mitra 1, Ayon Chakraborty 2, Mrinal Kanti Naskar 2 1 MCKV Institute
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Cooperative OCEAN Based Technique for Isolating Attack in Wireless Sensor Network
Cooperative OCEAN Based Technique for Isolating Attack in Wireless Sensor Network M. Samundeeswari 1, R. Gowri 2 [email protected], [email protected] Abstract The Intrusion Detection in the
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS TACTICAL NETWORK LOAD BALANCING IN MULTI- GATEWAY WIRELESS SENSOR NETWORKS by Kevin A. White December 2013 Thesis Advisor: Second Reader: Preetha Thulasiraman
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of
Routing and Transport in Wireless Sensor Networks
Routing and Transport in Wireless Sensor Networks Ibrahim Matta ([email protected]) Niky Riga ([email protected]) Georgios Smaragdakis ([email protected]) Wei Li ([email protected]) Vijay Erramilli ([email protected]) References
