How To Balance Network Load In A Wireless Sensor Network

Similar documents
Load Balancing Hashing in Geographic Hash Tables

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Evaluating Load Balancing in Peer-to-Peer Resource Sharing Algorithms for Wireless Mesh Networks

On Game Theory for Load Balancing in Wireless Networks

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Efficient File Sharing Scheme in Mobile Adhoc Network

A Network Flow Approach in Cloud Computing

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Energy Consumption analysis under Random Mobility Model

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

Load Balancing Mechanisms in Data Center Networks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

IEQGOR to Increase the Quality of Service in Wireless Sensor Network

IN THIS PAPER, we study the delay and capacity trade-offs

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Load Balancing Routing Algorithm for Data Gathering Sensor Network

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

A Catechistic Method for Traffic Pattern Discovery in MANET

DAG based In-Network Aggregation for Sensor Network Monitoring

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

Node Mobility Tracking In Mobile Ad-Hoc Networks in their Geographical Position (Dynamic Networks)

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Influences of Communication Disruptions on Decentralized Routing in Transport Logistics

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS

Stability of QOS. Avinash Varadarajan, Subhransu Maji

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

An Extended AODV Protocol to Support Mobility in Hybrid Networks

Modelling Quality of Service in IEEE Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

Towards Efficient Routing in Vehicular Ad Hoc Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5),

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks.

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Optimal Service Pricing for a Cloud Cache

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Transcription:

Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com, manjupadma1991@gmail.com, mekasindhu91@gmail.com subharajan1979@yahoo.co.in Abstract Balancing the network traffic load is a serious problem in wireless sensor network. The data generated in a wireless sensor network is stored on the sensor node and accessed through geographic hash table(ght). GHT is used to retrieve the data from nodes. The previous approaches allow balancing network load by changing the georouting protocol[1]. In our paper we have designed two new approaches called analytical and heuristic. In analytical approach the destination density function yielding quasiperfect load balancing under uniformity assumption. Heuristic approach is used whenever uniformity assumptions are not fulfilled. This approach attempts to prevent multiple request being sent to a single node. We have used hash algorithm for security purpose. Keywords analytical, georouting protocol, heuristic, Load balancing, Wireless sensor network. I. INTRODUCTION Balancing storage resources is important in wireless sensor networks, because the memory size of sensor nodes is limited. Imbalance in network traffic load has a negative effect on network lifetime since transmit and receive operations are not evenly spread among network nodes. In order to extend the lifetime of a network we use load balancing in GHTs. This Geographic Hash Table (GHT) [10] is used to retrieve and store data from sensor nodes. Each node is assigned a value of certain range. For Example: 2D real interval [0,1] 2. Each data is appended with metadata. This metadata is hashed to a key value. Keys are stored at nodes. Fig. 1 : GHT Data Retrieval As shown in Figure [1], GHT maintains all the information about nodes. GHT is an approach for effectively retrieving data from a wireless sensor network. 2.1 Georouting II. RELATED WORK It is also called as geographic routing [7] or position-based routing.in georouting, instead of a specific destination node, a message is routed toward a specific geographic location and it is delivered to the node whose key is closest to destination. Load imbalance problem is reduced when modifying the underlying georouting protocol. Changing the georouting protocol comes at a price and it might impact on upper layers and existing applications. 2.2 Load Balancing in Networks Load balancing might split incoming transactions evenly to all servers, or it may redirect transactions to next available server as needed. The load balancing service [9] is usually provided by dedicated software or hardware, such as multilayer switch. Title TABLE 1: Literature Survey Tradeoffs between Stretch Factor and Load Balancing Ratio in Routing on Growth Restricted Graphs (2004) Description This paper discussed the tradeoff between two quality measures for routing in growth restricted graphs. The two measures considered stretch factor, which measures the lengths of the routing paths, and the load balancing ratio, which measures how 57

Balancing Traffic Load in Wireless Networks with Curveball Routing (2007) Routing in Outerspace: Fair Traffic Load in Multihop Wireless Networks (2008) evenly the traffic is distributed. The problem is addressed to balancing the traffic load in multi-hop wireless networks, which considers a point-to-point communicating network with a uniform distribution of sourcesink pairs. This paper consider security-related and energy-efficiency issues in multi-hop wireless networks - The traffic density t(x, y), denoting the probability density that a random query traverses location (x, y) on its route from node s to node d. Source density s depends on parameters such as node locations and data query patterns and the destination density d depends on factors such as the number of keys managed by a node located at (x, y), and/or their popularity. 4.1 Hash function IV. DESIGN OF HASH FUNCTION It is any algorithm or subroutine that maps large data sets of variable length to smaller data sets of a fixed length. Hash function example as shown in figure[2]. Covering Space for In Network Sensor Data Storage (2010) This paper proposed to map data to a covering space, which is a tiling of the plane with copies of the sensor network, such that the sensors receive uniform storage load and traffic. Distributed algorithms proposed to construct the covering space with Ricci flow and Mobius transforms III. MODEL OF A NETWORK Source Node(s): The node which initiates the query process for a key k. Destination Node (d): The node responsible for key k. In Geographic routing protocol such as GPSR[10] a packet may encounter a dead end (i.e. target separated by a wall or obstruction).the packet is then diverted until a path to the target is available.they do not take path length into account when routing around local obstructions such that the packet moves from source to destination. Probability density functions: - The source density s(x, y), denoting the probability density of having the source node s of a random query located at (x, y). - The destination density d(x, y), denoting the probability density of having the destination node d of a random query located at (x, y). Fig. 2 : Hash Function In particular, we want to specify that the hash function can be computed in a fully distributed and localized way, thus according to typical wireless sensor network design guidelines. 4.2 Hash tables Hash functions are primarily used in hash tables, to quickly locate a data record (e.g., a dictionary definition) given its search key (the headword). 5.1 Analytical Approach V. MODULES First, we have to decide how many number of server going to be used and nodes being connected to it. Here we are considering nodes n1,n2,n3,n4 etc. and servers s1,s2 etc. are constructed. In this Analytical approach, a new node would be added to the server in two conditions. 1. When the number of data exceed the permissible limit in each node. 2. When we want to create a new node. 58

We have used simulation coding so that the data moves from highly loaded node to newly created node. Hence load over a particular node could be reduced and it could be balanced easily. Implementation Fig. 6 : Assigning data to newly created node. Fig. 3 : Server and Nodes Network 5.2 Heuristic Approach Heuristic approach attempts to prevent multiple request being sent to a single node. It does this by moving data from highly loaded node to some other nodes having lesser load. The analytical approach is based on uniformity assumptions for what concerns node and source density. When these assumptions are not met, we propose to use a different load balancing approach, based on (an iterative) heuristic that repeatedly changes key ranges assigned to nodes as long as a load balancing metric is improved. When there is a request for data from the source, the data would be parsed through the geographic hash table(ght) which will map the requested data through its associated key value. These key values are actually stored in the geographic hash table(ght). Hence mapping would be made to the node, which requested data could be retrieved. Implementation Fig. 4 : Data assigning to nodes. Fig. 5 : File transfer from one node to another node for load balancing Fig. 7 : Multiple request sending to one node. 59

improve storage and load balancing in GHT. In this paper, we are concerned with the load balancing problem in GHT, and we do not consider storage balancing. We left this storage balancing for future work. VII. REFERENCES Fig. 8 : File transfer to newly created node. Fig. 9 : File received from highly loaded node. VI. CONCLUSION The proposed analytical and a heuristic approach, has been shown to provide very good load balancing in ideal conditions, and to provide load balancing improvements comparable or even superior to those provided by existing schemes in practical scenarios, even when uniformity assumptions are not valid. The major advantage of the presented load balancing methodology over existing ones lies in its practicality and versatility. Imbalance in network traffic load instead has a negative effect on network lifetime, since energyconsuming transmit/receive operations are not evenly spread among network nodes. This explains why researchers have recently proposed techniques to [1] M. Elena Renda, Giovanni Resta, and Paolo Santi Load Balancing Hashing in Geographic Hash Tables, VOL. 23, NO. 8, AUGUST 2012 [2] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, Routing with Guaranteed Delivery in Ad Hoc Wireless Networks, Wireless Networks, vol. 7, no. 6, pp. 609-616, 2001. [3] C. Canali, M.E. Renda, and P. Santi, Evaluating Load Balancing in Peer-to-Peer Resource Sharing Algorithms for Wireless Mesh Networks, Proc. IEEE MeshTech, pp. 603-609, 2008. [4] L. Galluccio, G. Morabito, S. Palazzo, M. Pellegrini, M.E. Renda, and P. Santi, Georoy: A Location-Aware Enhancement to Viceroy Peerto-Peer Algorithm, Computer Networks, vol. 51, no. 8, pp. 379-398, June 2007 [5] P. Gupta and P.R. Kumar, Critical Power for Asymptotic Connectivity in Wireless Networks, Stochastic Analysis, Control, Optimization and Applications, pp. 547-566, 1998. [6] D.B. Johnson and D.A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Kluwer Academic Publishers, pp. 153-181, 1996. [7] A. Mei and J. Stefa, Routing in Outer Space: Fair Traffic Load in Multi-hop Wireless Networks, Proc. ACM MobiHoc, pp. 23-31, 2008. [8] L. Popa, A. Rostamizadeh, R.M. Karp, C. Papadimitriou, and Stoica, Balancing Traffic Load in Wireless Networks witcurveball Routing, Proc. ACM MobiHoc, pp. 170-179, 2007. [9] R.Sarkar, W. Zeng, J. Gao, and X.D. Gu, Covering Space for InNetwork Sensor Data Storage, Proc. ACM/IEEE IPSN, pp. 232243, 2010. [10] S.Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin,and F. Yu, Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table, Mobile Networks and Appl., vol. 8, no. 4, pp. 427-442, 2003. 60

[11] L. Wang, F. Yao, and C.-W. Yi, Improved Asymptotic Bounds on Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks, Proc. ACM MobiHoc, pp. 131-138, 2008. [12] A.D. Polyanin and A.V. Manzhirov, Handbook of Integral Equations, CRC Press, Boca Raton, 1998. [13] P. Lassila, and J. Virtamo, Spatial Node Distribution of the Random Waypoint Mobility Model with Applications, IEEE Trans. Mobile Computing, vol. 5, no. 6, pp. 680-694, 2006. [14] J. Gao and L. Zhang, Tradeoffs between Stretch Factor and Load Balancing Ratio in Routing on Growth Restricted Graphs, Proc. ACM Symp. Principles of Distributed Computing (PODC), pp. 189-196, 2004. [15] M. Albano, S. Chessa, F. Nidito, and S. Pelagatti, Q-NiGHT: Adding QoS to Data Centric Storage in Non-Uniform Sensor Networks, Proc. IEEE Conf. Mobile Data Management, pp. 166-173, 2007. [16] C. Canali, M.E. Renda, P. Santi, and S. Burresi, Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks, IEEE Trans. Mobile Computing, vol. 9, no. 3, pp. 333-347, Mar. 2010. 61