IEQGOR to Increase the Quality of Service in Wireless Sensor Network



Similar documents
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

A Catechistic Method for Traffic Pattern Discovery in MANET

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Wireless Sensor Network: Improving the Network Energy Consumption

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

The Optimal Methods of IVC Routing Protocol for VANET

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Optimized Load Balancing Mechanism Using Carry Forward Distance

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

How To Balance Network Load In A Wireless Sensor Network

A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Efficient Load Balancing Routing in Wireless Mesh Networks

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Study of Network Characteristics Incorporating Different Routing Protocols

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks


ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Towards Efficient Routing in Vehicular Ad Hoc Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks

LIST OF FIGURES. Figure No. Caption Page No.

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

IJMIE Volume 2, Issue 7 ISSN:

Routing with Load Balancing in Wireless Ad hoc Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks

Security for Ad Hoc Networks. Hang Zhao

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs

International Journal of Advanced Research in Computer Science and Software Engineering

Wireless Sensor Networks Chapter 3: Network architecture

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Location Information Services in Mobile Ad Hoc Networks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

Security Threats in Mobile Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Securing MANET Using Diffie Hellman Digital Signature Scheme

Figure 1. The Example of ZigBee AODV Algorithm

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

Some Security Trends over Wireless Sensor Networks

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

A Security Architecture for. Wireless Sensor Networks Environmental

Disjoint Path Algorithm for Load Balancing in MPLS network

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Introduction to Wireless Sensor Network Security

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

A Link-state QoS Routing Protocol for Ad Hoc Networks

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

Transcription:

IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam University, Coimbatore, India 2 ABSTRACT: The Wireless sensor network is used to monitor the temperature, humidity, Sound, pressure, etc. Work within wireless sensor networks (WSNs) Quality of service (QoS) has been isolated and specific either on certain functional layers or application scenarios. However the area of sensor network quality of service (QoS) remains largely open. In this paper we define WSNs QoS requirements within a WSNs application, and then analyzing Issues for QoS Monitoring. In this we define IEQGOR, that integrates awake/asleep schedules, MAC, routing, traffic load balancing. A promising routing scheme in wireless sensor networks (WSNs), is shifting toward duty-cycled WSNs in which sensors are sleep scheduled to reduce energy consumption. KEYWORDS: WSN, QOS, IEQGOR, ExOR I. INTRODUCTION A wireless sensor network (WSN) consists of spatially distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring. The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding. The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational Copyright to IJIRCCE 10.15680/ijircce.2015.0302023 757

speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding II. RELATED WORK In [1] author say that the relative complexity of problems under the restriction to unit disk graphs and to grid graphs. From these complexity results, it would seem that unit disk graphs are more closely related to planar graphs in terms of complexity than to grid graphs. In [2] author have presented a new contention-based algorithm for geographic routing that works reactively (i.e. without prior neighborhood knowledge) and guarantees delivery in unit disk graphs. Its distinct property is that no other nodes than the ones on the message path are actively involved in the communication. The Sweep Circle traversal traverses the α-shape of a network, which is a boundary of the same length or even shorter than the boundary of the Gabriel subgraph. This makes Gabriel graph planarization obsolete, regardless of whether neighbors are known (by beaconing) or not. [3] Compass Routing Suppose that we want to ravel from an initial vertex s to a destination vertex, and that all the information available to us at any point in time is the coordinates of our destination, our current position, and the directions of the edges incident with the vertex we are located at. Starting at s, we will in a recursive way choose and traverse the edge of our geometric graph incident to our current position and with the closest slope to that of the line segment connecting the vertex we are standing at to t. Ties are broken randomly. In [5] author show that holes are important topological features that need to be studied. In routing, holes are communication voids that cause greedy forwarding to fail. Holes can also be defined to denote regions of interest, such as the hot spots created by tra c congestion or sensor power shortage. Author define holes to be the regions enclosed by a polygonal cycle which contains all the nodes where local minima can appear. Author also propose simple and distributed algorithms, the Tent rule and BoundHole, to identify and build routes around holes. In [6] author utilize position information to provide more reliable as well as efficient routing for certain applications. Thus extensions to existing position based routing algorithm have been described to work more efficiently even in cases where they are not working at present. An algorithm is proposed, which removes some of the drawbacks of the existing GPSR (Greedy perimeter stateless routing) position based routing algorithm. In proposed algorithm different algorithm has been used to planarize the graph so that it will not disconnect the route in case of location inaccuracy in perimeter mode whereas in GPSR in certain cases of location inaccuracy it will disconnect the graph and hence the packets will not be routed thereby decreasing packet delivery ratio. In [7] Several routing protocols based on the positions of the mobile hosts have been proposed. The author describe a robust routing protocol that tolerates up to roughly 40% of variation in the transmission ranges of the mobile hosts. More precisely, this protocol guarantees message delivery in a connected ad hoc network whenever the ratio of the maximum transmission range to the minimum transmission range is at most 2. In [9] author presented FAR, a new face aware mobicast routing protocol, which, in theory, reliably delivers messages spatially and has good mobicast temporal characteristics. This protocol relies on the notion of spatial neighbor- hoods and features a novel timed face aware forwarding method. Since mobicast belongs to a new spatiotemporal multicast paradigm and there exists no close protocol for interesting and fair quantitative comparison. III. PROPOSED ALGORITHM A. Description of the Proposed Algorithm: The formal description of the Improved Efficient QOS aware GOR S : Source Node C1 : Candidate with in its communication range Ci : Candidate set Nei : Neighbor node Two adjustable parameters introduced, which represents the minimum and maximum number of candidates to be prioritized, respectively. EQGOR will only prioritize the first k available next-hop nodes based on the observation of Copyright to IJIRCCE 10.15680/ijircce.2015.0302023 758

the similar pareto principle in GOR. For sending node i, candidates in Ci are descendingly sorted according to the SPP PRR metric. Initially, we include the first node of Ci into Fi and remove it from Ci. Then, we check nodes in Ci in sequence, where c1 always denotes the first node in Ci. When intending to add c1 into Fi, it should be within the transmission range of any node in Fi. Otherwise, it will be eliminated from Ci. If there is no packet duplication (i.e., c1 can overhear any node in Fi), we search the best place to insert c1 into Fi. The searching procedure is to try every possible inserting position in Fi, and calculate the expected single-hop packet speed values. For the remaining nodes in C, candidates will be selected to meet the hop QoS requirements at a minimum cost, i.e., simply appending to Fi. When the number of available next-hop nodes increases in dense networks, the time complexity of EQGOR. In Algorithm 1, although the first node in Ci is included into Fi directly, it is not necessary the first candidate of Fi finally. IV. PSEUDO CODE Step 1 : Send probe packet u to neighbors and receive the ack packet. Step 2 : Compute whether u s current neighbors CNei Step 3 : Maintain its transmission radius If Range (Fi, c1) == false then Ci<- ci- {c1} Temperorily insert c1 Increase its transmission radius until CNu min(k, du). Continue Else Select the candidate as an intermediator Step 4 : Data Transmission Step 5 : Performance Analysis Step 6 : End. V. SIMULATION RESULTS The simulation is conducted using the Network Simulator NS2. To implement the proposed mechanism IEQGOR is run in NS-2. It combines geographic routing, awake-sleep scheduling, and back-to-back data packet transmission for achieving an energy-efficient data gathering mechanism. It selects the relay node, based on low traffic and link quality. It achieves remarkable delivery ratio, latency and can greatly limit energy consumption. Awake/sleep schedules, routing, traffic load balancing, and back-to-back packet transmissions has been integrated. Nodes alternate between awake/sleep modes according to independent wake-up schedules with fixed duty cycle d. The simulation is done for Packet delivery ratio, Energy consumption and Delay using IEQGOR whose results are shown in Figure 1, 2 & 3 respectively. Figure 1 : Packet Delivery Ratio Copyright to IJIRCCE 10.15680/ijircce.2015.0302023 759

The above figure shows that the Packet delivery ratio of the proposed system is better than the existing system Figure 2 : Energy Consumption Figure 2 shows that the energy consumption of the proposed system is less when compared with the existing system Figure 3 : Delay The above figure shows that the delay calculated for the proposed system is less than the existing system. VI. CONCLUSION AND FUTURE WORK The geographic opportunistic routing (GOR) exploits for multi constrained QoS provisioning in WSNs, which is more suitable than the multipath routing approach. Author founds that existing GOR protocol cannot be directly applied to the QoS provisioning in WSNs. Because the computations delay of a GOR protocol should be also considered in WSNs. The problem of efficient GOR has been studied for multi constrained QoS provisioning (EGQP) in WSNs. The EGQP problem formulated as a multi objective multi constraint optimization problem and analyzed the properties of EGQP s multiple objectives. Based on the analysis and observations, an Efficient QoS-aware GOR (EQGOR) algorithm proposed for QoS provisioning in WSNs. EQGOR achieves a good balance between these Copyright to IJIRCCE 10.15680/ijircce.2015.0302023 760

multiple objectives, and has a very low time complexity, which is specifically tailored for WSNs considering the resource limitation of sensor devices. This can be enhanced so as to reduce the overhead. REFERENCES 1. Brent N. CLARK and Charles J. Colbourn, Unit Disk Graphs, IEEE Transactions on Parallel and Distributed Systems, vol. 23, issue no. 3, pp. 513-520, Mar. 2012. 2. Stefan Ruehrup and Ivan Stojmenovic, Optimizing Communication Overhead while Reducing Path Length in Beaconless Geo routing with Guaranteed Delivery for Wireless Sensor Networks, Mobile Networks and Applications, Vol 11, issue no 20, pp 187 200, 2006 3. R. Syrotiuk Barry A. Woodward Erik Jonsson, A Distance Routing Stefano Bagni Effect Algorithm, IEEE Transactions on Computers, vol 59, pp 1224-1238, 2010 4. K.Akkaya and M.Younis, An energy-aware Qos routing protocol for wireless sensor networks, Distributed computing systems workshops ; proceedings, 23 rd Intl. conference on may 2003, pp 710-715 5. Qing FangJieGaoyLeonidas J. Guibasz, Locating and Bypassing Holes in Sensor Networks, IEEE Comm. Magazine, vol. 49, no. 4, pp. 96-101, Apr.2011. 6. Geetam S. Tomar, Position Based Routing for Wireless Mobile Ad Hoc Networks, Machine Intelligence Research Labs, Gwalior 223, New Jiwaji Nagar, Gwalior 474011 India, IJSSST, Vol. 10, No. 1 ISSN: 1473-804x online, 1473-8031 7. Geetam S. Tomar, Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li, RobustPosition-based Routing for Wireless Ad Hoc Networks, Department of Computer Science, Illinois Institute of Technology, Canadian conference on Computational Geometry, pp 51-54, 1999 8. Prosenjit Bose, Pat Morin, Ivan Stojmenovi_c, and Jorge Urrutia, Routing with Guaranteed Delivery in ad hoc Wireless Networks, Mobile Computing, vol. 353, pp. 153-181, 1996. 9. C.E. Perkins and E.M. Royer, FAR: Face-Aware Routing for Mobicast in Large-Scale Sensor Networks, ACM Transactions on Sensor Networks, Vol 1, No. 2, November 2005. Copyright to IJIRCCE 10.15680/ijircce.2015.0302023 761