SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661, ISBN: 2278-8727 Volume 5, Issue 5 (Sep-Oct. 2012), PP 28-31
www.iosrjournals.org
www.iosrjournals.org 28 | Page
Energy saving in P2P oriented Wireless Sensor Network (WSN)
using the approach of various compression techniques
1
Archita Dad, 2
Charika Jain, 3
Anil Saroliya
1,2,3
Amity School of Engg & Tech., Amity University Rajasthan
Abstract: Recent advancements & popularity of peer-to- peer networks draws a lot of attention of networking
researchers. Wireless sensor network (WSN) consists of various scattered autonomous sensors to maintain
regular supervision on physical or environmental conditions, such as temperature, vibration, audible signals,
pressure, movements and to collaboratively pass their data through the network to a main location. So in
this paper we have considered energy saving concept of wireless sensor network with respect to P2P network
technology. For reducing energy consumption by sensors the use of various compression techniques on data
before transmission have discussed in this paper.
Different types of compression techniques are there and the best one is dependent on the network
technology and data characteristics. For choosing the best one of them we have discussed Adaptive
Compression Environment technology (ACE) in this paper.
Keywords: Peer-To-Peer (P2P) Networks, Wireless Sensor Networks (WSN), Data Compression Techniques,
Distributed Networks, Adaptive Compression Environment (ACE)
I. Introduction
A large no of sensing devices which have limited computing power and radio communication,
capabilities build up a sensor network. Sensor senses any changes in environment and as it occurs it does some
operation. Although sensor may be mobile they can be recognized stationary after deployment.
A network configuration comprises of sensor working unattended and transmitting their observation
values to some processing. Due to limited transmission range, sensors convey their data through multi-hope
communication i.e. using intermediate nodes as relays. In this case the sensor may be both a data source and a
data router.
In many of the applications sensor networks have battery-power nodes with inadequate energy recourses. It is
inconvenient to replace or recharge sensors battery in its working environment. Thus when the energy of node
exhausts, it stops sensing or routing data so the network performance degrades. This implies that
making good uses of energy resources is a necessity in sensor networks.
II. Energy Saving in WSN
Resent advance in internet technology volume of data transmitted by peer to peer system increases,
due to this the energy consumption of sensors increases so to reduce the energy consumption various
techniques are used such as energy-efficient MAC layer schemes, Traffic routing and connectivity, energy
aware strategies for data dissemination and data collection [1].
From the energy saving view point, a low power operational mode is introduced, the so called sleep
mode, during idle periods. Sensor works in two major operational states: active and sleep. The active state
includes three operational modes: transmit, receive, and idle. In the transmitting mode, energy is spent in the
front-end amplifier that supplies the power for the actual RF transmission. In the receiving mode, energy
is consumed entirely by the transceiver electronics and by processing functions, such as demodulation and
decoding. In the idle state, a node typically listens to the wireless channel without actively receiving. In idle
mode, energy expenditure is mainly due to processing activity, since the voltage controlled oscillator is
functioning and all circuits are maintained ready to operate.
Figure 1: States of Sensor [2]
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various
www.iosrjournals.org 29 | Page
Based on the above observations, we describe the temporal evolution Et of the sensor state in terms of
cycles, as depicted in Figure 1. Each cycle comprises a sleep phase (S) and an active phase (A). During
phase S, the sensor is in sleep mode. When the sensor switches to the active mode, phase A begins and the
sensor schedules a time instant in the future at which it will go back to sleep. However, at the time slot at which
the sensor should go to sleep, its data buffer may not be empty. So the active phase can thus be divided into
an initial phase (R) and (possibly) a phase (N). In phase R the sensor can receive and transmit; also it
generates data. In phase N the sensor does not receive nor generate data; it can only transmit the data units
that are still in its buffer or be idle waiting for a transmission opportunity [2].
III. Transmission in Various Models
The main motive of using this sensor technology is for receiving / transmitting of packets. For
transmitting and receiving of data we have following models- (i) Centralized network (ii) Distributed
network (iii) Peer-to-peer network[3].
By centralized control we mean a node does not generate its own schedule; rather, it executes schedule
generated by and downloaded from a central scheduler such as the base station. The node simply collects
communication statics and forwards them to the central scheduler. On the other hand by distributed control we
mean a node is autonomous. It schedules its own task and data processing. It also process request from its
neighbor and the host. In a centralized network, the central controller generates the routing path and distributes
them to each node; in distributed networks, each node builds its own routing information by talking with each
other. Public network technology advances and increases the no of nodes with powerful PCs have helped shift
the conventional client server model towards peer-to-peer (P2P) topologies.P2P leverages vast expanse of
worldwide PC computing power, storage and connectivity. In P2P each node (peer) acts symmetrically as client
and server. Large numbers of peers get together dynamically in an ad hoc manner and share information in
large scale distributed environments without centralized coordination.
The P2P information retrieval (IR) environment we discuss here assumes that each peer has a
database (or collection) of documents (text, audio, video or other semi structure documents) that is shares
in the network [4]. A node searches full information by sending query messages that contain sets of keywords to
its peers.
Figure 2: Data Compression in WSN P2P Network
A peer receiving a query message compares the similarity of the query against its document
collection. Typically, this involves identifying documents that contain the set of query keywords. If the
evaluation is successful, the peer sends a reply message that contains pointers to the matching document.
Figure 2 explains the use of various compression techniques for reducing the energy consumption in
p2p based wireless sensor network (WSN).
IV. Energy saving using Compression
The general assumptions for sending the data over network are that nodes are given time slots in
which they are known to not interface with one another. The nodes also know their own locations, and the
locations of other nodes in the network previously.
For decreasing the power consumption there are various compression techniques. The sensor network
without data compression will serve to be the baseline in performance and power consumption. The data
is compressed before sending it out to reduce network transmission time and reduce the total application
elapsed time. But it also increases the local processing time by introducing the compression overhead.
Whether or not an application can benefit from data compression depends on the tradeoff
between the reduction of network transmission time and the increases of local processing.
According to data types various compression techniques are available as shown in figure 3. We are
explaining some of them considering only text files.
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various
www.iosrjournals.org 30 | Page
Figure 3: Types of Compression Techniques
LZO [6] supports overlapping compression and in-place decompression. It is a block compression
algorithm—it compresses and decompresses a block of data.
Zlib's [7] compression method emits compressed data as a sequence of blocks. Various block types
are allowed, one of which is stored blocks—these are simply composed of the raw input data plus a few
header byte The parallel Bzip2[8] algorithm works by taking the blocks of input data and running them
through the Burrows-Wheeler Transform(BWT) simultaneously on multiple processors using p threads.
Unfortunately, there are several limitations in the use of compression for efficient data communication.
First, compression techniques vary in their performance characteristics: compressed size, compression time,
and decompression time.
Second, compression performance is reliant upon the performance and availability of the underlying
resources, e.g., CPU loads, network bandwidth and latency.
V. Choosing Best Compression Technique
The best compression technique for the user will depend on the network it is connected to.
Furthermore, as the load changes at communication end-points or on the network itself, the best- performing
compression technique for the same network also changes. These limitations make it increasingly difficult for
end users to identify the best compression technique in all circumstances. Adaptive Compression Environment
(ACE) will identify the best compression technique automatically and transparently and applies compression on-
the fly. ACE selects between a number of well-known, competitive, compression techniques including Bzip, Zlib,
and LZO [5].
Now after compression the actual transmission of data takes place. By using compression we have
reduced the data size which we have to transmit and receive so the energy consumption is also reduce as to
transmit/receive sensor have to be in active mode for less time as compared to transmitting data without
compression.
Figure 4: Proposed energy saving solution in P2P oriented WSN
Algorithm:
Step1: Start
Step2: Sender Compress the data by using best technique and divide it into chunks.
Step3: Check whether sensor is in R mode. if yes go to step 5
Step 4: Wait (Et + Ts(n)) and go to Step 3
Step 5: Sensor transmits the chunks.
Step 6: Receiver receive and decompress the data and use it for further work.
Step7: Stop
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various
www.iosrjournals.org 31 | Page
VI. Conclusion
In the recent scenario of Wireless Sensor Networks, many new technologies are there for
saving the energy of sensors. In this Paper, a solution of compression technology is proposed in peer to peer
network. In the near future, much advancement will be made in this work and an appropriate solution will
be attained.
References
[1] I.F.Akyildiz,W.Su,Y.Sankarasubramaniam and E. Cayirici, “A Survey on sensor Networks,” IEEE Comm. Mag., Aug 2002, pp
102-114.
[2] C.-F. Chiasserini and M. Garetto, “Wireless Sensor Networks,” IEEE INFOCOM 2004.
[3] A.Saroliya,“InvestigationAnalysistofindtheSecurityVulnerabilitiesinDHTOrientedPeertoPeerNetwork”,
Proceedingsofthe1stInternational Conference on Parallel, istributed and Grid Computing (PDGC-2010), 978-1-4244-7673-
2/10/$26.00 ©2010 IEEE.
[4] Demetrios Zeinalipour-Yazti,Vana Kalogeraki, And Dimitrios Gunopulos,” Information Retrieval Techniques For Peer to
Peer,” 1521-9615/04/$20.00 © 2004IEEE.
[5] Chandra Krintz and Sezgin Sucu, “AdaptiveOn-the-FlyCompression,” 1045-9219/06/$20.00 © 2006 IEEE
[6] Lempel-Ziv-Oberhumer(LZO) Compression,2005, www.oberhumer.com/opensource/lzop/.
[7] ZLib compression library, www.gzip.org/zlib/+, 2005.
[8] BZIP Compression, http://sources.redhat com/bzip2/, 2005.

Mais conteúdo relacionado

Mais procurados

Protocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor NetworkProtocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor NetworkSaatviga Sudhahar
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNZubin Bhuyan
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gatheringFinalyear Projects
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkeSAT Publishing House
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Energy in Wireless Sensor Network
Energy in Wireless Sensor NetworkEnergy in Wireless Sensor Network
Energy in Wireless Sensor NetworkBADALKUMAR56
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
 
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYDATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYijasuc
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 

Mais procurados (20)

Protocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor NetworkProtocols For Self Organisation Of A Wireless Sensor Network
Protocols For Self Organisation Of A Wireless Sensor Network
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
C018141418
C018141418C018141418
C018141418
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Energy in Wireless Sensor Network
Energy in Wireless Sensor NetworkEnergy in Wireless Sensor Network
Energy in Wireless Sensor Network
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYDATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 

Destaque

CFD Simulation and Analysis of Fluid Flow Parameters within a Y-Shaped Branch...
CFD Simulation and Analysis of Fluid Flow Parameters within a Y-Shaped Branch...CFD Simulation and Analysis of Fluid Flow Parameters within a Y-Shaped Branch...
CFD Simulation and Analysis of Fluid Flow Parameters within a Y-Shaped Branch...IOSR Journals
 
Levels of Physical Activity Participation of the Staff of Universiti Selangor
Levels of Physical Activity Participation of the Staff of Universiti SelangorLevels of Physical Activity Participation of the Staff of Universiti Selangor
Levels of Physical Activity Participation of the Staff of Universiti SelangorIOSR Journals
 
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...IOSR Journals
 
On Stability Equilibrium Analysis of Endemic Malaria
On Stability Equilibrium Analysis of Endemic MalariaOn Stability Equilibrium Analysis of Endemic Malaria
On Stability Equilibrium Analysis of Endemic MalariaIOSR Journals
 
Literature Survey On Clustering Techniques
Literature Survey On Clustering TechniquesLiterature Survey On Clustering Techniques
Literature Survey On Clustering TechniquesIOSR Journals
 
Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementIOSR Journals
 
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...IOSR Journals
 
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...IOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
An Exploration of HCI Design Features and Usability Techniques in Gaming
An Exploration of HCI Design Features and Usability Techniques in GamingAn Exploration of HCI Design Features and Usability Techniques in Gaming
An Exploration of HCI Design Features and Usability Techniques in GamingIOSR Journals
 
Square Microstrip Antenna with Dual Probe for Dual Polarization in ISM Band
Square Microstrip Antenna with Dual Probe for Dual Polarization in ISM BandSquare Microstrip Antenna with Dual Probe for Dual Polarization in ISM Band
Square Microstrip Antenna with Dual Probe for Dual Polarization in ISM BandIOSR Journals
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionIOSR Journals
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized SearchIOSR Journals
 
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.IOSR Journals
 
Profile of Trace Elements in Selected Medicinal Plants of North East India
Profile of Trace Elements in Selected Medicinal Plants of North East IndiaProfile of Trace Elements in Selected Medicinal Plants of North East India
Profile of Trace Elements in Selected Medicinal Plants of North East IndiaIOSR Journals
 
Some forms of N-closed Maps in supra Topological spaces
Some forms of N-closed Maps in supra Topological spacesSome forms of N-closed Maps in supra Topological spaces
Some forms of N-closed Maps in supra Topological spacesIOSR Journals
 

Destaque (20)

G0544650
G0544650G0544650
G0544650
 
CFD Simulation and Analysis of Fluid Flow Parameters within a Y-Shaped Branch...
CFD Simulation and Analysis of Fluid Flow Parameters within a Y-Shaped Branch...CFD Simulation and Analysis of Fluid Flow Parameters within a Y-Shaped Branch...
CFD Simulation and Analysis of Fluid Flow Parameters within a Y-Shaped Branch...
 
Levels of Physical Activity Participation of the Staff of Universiti Selangor
Levels of Physical Activity Participation of the Staff of Universiti SelangorLevels of Physical Activity Participation of the Staff of Universiti Selangor
Levels of Physical Activity Participation of the Staff of Universiti Selangor
 
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
L Inequalities Concerning Polynomials Having Zeros in Closed Interior of A Ci...
 
On Stability Equilibrium Analysis of Endemic Malaria
On Stability Equilibrium Analysis of Endemic MalariaOn Stability Equilibrium Analysis of Endemic Malaria
On Stability Equilibrium Analysis of Endemic Malaria
 
Literature Survey On Clustering Techniques
Literature Survey On Clustering TechniquesLiterature Survey On Clustering Techniques
Literature Survey On Clustering Techniques
 
Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future Entanglement
 
B0960512
B0960512B0960512
B0960512
 
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
Applying Regression Model to Predict the Effects of Shaft and Bearing Deviati...
 
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
 
D0441318
D0441318D0441318
D0441318
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
An Exploration of HCI Design Features and Usability Techniques in Gaming
An Exploration of HCI Design Features and Usability Techniques in GamingAn Exploration of HCI Design Features and Usability Techniques in Gaming
An Exploration of HCI Design Features and Usability Techniques in Gaming
 
Square Microstrip Antenna with Dual Probe for Dual Polarization in ISM Band
Square Microstrip Antenna with Dual Probe for Dual Polarization in ISM BandSquare Microstrip Antenna with Dual Probe for Dual Polarization in ISM Band
Square Microstrip Antenna with Dual Probe for Dual Polarization in ISM Band
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized Search
 
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
 
E0532933
E0532933E0532933
E0532933
 
Profile of Trace Elements in Selected Medicinal Plants of North East India
Profile of Trace Elements in Selected Medicinal Plants of North East IndiaProfile of Trace Elements in Selected Medicinal Plants of North East India
Profile of Trace Elements in Selected Medicinal Plants of North East India
 
Some forms of N-closed Maps in supra Topological spaces
Some forms of N-closed Maps in supra Topological spacesSome forms of N-closed Maps in supra Topological spaces
Some forms of N-closed Maps in supra Topological spaces
 

Semelhante a Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various compression techniques

Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewIOSR Journals
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSEditor IJCTER
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...ijdpsjournal
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...IOSR Journals
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)IISRT
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANijsrd.com
 
Communication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A SurveyCommunication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A SurveyIJMTST Journal
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 

Semelhante a Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various compression techniques (20)

[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A Review
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
D035418024
D035418024D035418024
D035418024
 
Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBAN
 
Communication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A SurveyCommunication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A Survey
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various compression techniques

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 5, Issue 5 (Sep-Oct. 2012), PP 28-31 www.iosrjournals.org www.iosrjournals.org 28 | Page Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various compression techniques 1 Archita Dad, 2 Charika Jain, 3 Anil Saroliya 1,2,3 Amity School of Engg & Tech., Amity University Rajasthan Abstract: Recent advancements & popularity of peer-to- peer networks draws a lot of attention of networking researchers. Wireless sensor network (WSN) consists of various scattered autonomous sensors to maintain regular supervision on physical or environmental conditions, such as temperature, vibration, audible signals, pressure, movements and to collaboratively pass their data through the network to a main location. So in this paper we have considered energy saving concept of wireless sensor network with respect to P2P network technology. For reducing energy consumption by sensors the use of various compression techniques on data before transmission have discussed in this paper. Different types of compression techniques are there and the best one is dependent on the network technology and data characteristics. For choosing the best one of them we have discussed Adaptive Compression Environment technology (ACE) in this paper. Keywords: Peer-To-Peer (P2P) Networks, Wireless Sensor Networks (WSN), Data Compression Techniques, Distributed Networks, Adaptive Compression Environment (ACE) I. Introduction A large no of sensing devices which have limited computing power and radio communication, capabilities build up a sensor network. Sensor senses any changes in environment and as it occurs it does some operation. Although sensor may be mobile they can be recognized stationary after deployment. A network configuration comprises of sensor working unattended and transmitting their observation values to some processing. Due to limited transmission range, sensors convey their data through multi-hope communication i.e. using intermediate nodes as relays. In this case the sensor may be both a data source and a data router. In many of the applications sensor networks have battery-power nodes with inadequate energy recourses. It is inconvenient to replace or recharge sensors battery in its working environment. Thus when the energy of node exhausts, it stops sensing or routing data so the network performance degrades. This implies that making good uses of energy resources is a necessity in sensor networks. II. Energy Saving in WSN Resent advance in internet technology volume of data transmitted by peer to peer system increases, due to this the energy consumption of sensors increases so to reduce the energy consumption various techniques are used such as energy-efficient MAC layer schemes, Traffic routing and connectivity, energy aware strategies for data dissemination and data collection [1]. From the energy saving view point, a low power operational mode is introduced, the so called sleep mode, during idle periods. Sensor works in two major operational states: active and sleep. The active state includes three operational modes: transmit, receive, and idle. In the transmitting mode, energy is spent in the front-end amplifier that supplies the power for the actual RF transmission. In the receiving mode, energy is consumed entirely by the transceiver electronics and by processing functions, such as demodulation and decoding. In the idle state, a node typically listens to the wireless channel without actively receiving. In idle mode, energy expenditure is mainly due to processing activity, since the voltage controlled oscillator is functioning and all circuits are maintained ready to operate. Figure 1: States of Sensor [2]
  • 2. Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various www.iosrjournals.org 29 | Page Based on the above observations, we describe the temporal evolution Et of the sensor state in terms of cycles, as depicted in Figure 1. Each cycle comprises a sleep phase (S) and an active phase (A). During phase S, the sensor is in sleep mode. When the sensor switches to the active mode, phase A begins and the sensor schedules a time instant in the future at which it will go back to sleep. However, at the time slot at which the sensor should go to sleep, its data buffer may not be empty. So the active phase can thus be divided into an initial phase (R) and (possibly) a phase (N). In phase R the sensor can receive and transmit; also it generates data. In phase N the sensor does not receive nor generate data; it can only transmit the data units that are still in its buffer or be idle waiting for a transmission opportunity [2]. III. Transmission in Various Models The main motive of using this sensor technology is for receiving / transmitting of packets. For transmitting and receiving of data we have following models- (i) Centralized network (ii) Distributed network (iii) Peer-to-peer network[3]. By centralized control we mean a node does not generate its own schedule; rather, it executes schedule generated by and downloaded from a central scheduler such as the base station. The node simply collects communication statics and forwards them to the central scheduler. On the other hand by distributed control we mean a node is autonomous. It schedules its own task and data processing. It also process request from its neighbor and the host. In a centralized network, the central controller generates the routing path and distributes them to each node; in distributed networks, each node builds its own routing information by talking with each other. Public network technology advances and increases the no of nodes with powerful PCs have helped shift the conventional client server model towards peer-to-peer (P2P) topologies.P2P leverages vast expanse of worldwide PC computing power, storage and connectivity. In P2P each node (peer) acts symmetrically as client and server. Large numbers of peers get together dynamically in an ad hoc manner and share information in large scale distributed environments without centralized coordination. The P2P information retrieval (IR) environment we discuss here assumes that each peer has a database (or collection) of documents (text, audio, video or other semi structure documents) that is shares in the network [4]. A node searches full information by sending query messages that contain sets of keywords to its peers. Figure 2: Data Compression in WSN P2P Network A peer receiving a query message compares the similarity of the query against its document collection. Typically, this involves identifying documents that contain the set of query keywords. If the evaluation is successful, the peer sends a reply message that contains pointers to the matching document. Figure 2 explains the use of various compression techniques for reducing the energy consumption in p2p based wireless sensor network (WSN). IV. Energy saving using Compression The general assumptions for sending the data over network are that nodes are given time slots in which they are known to not interface with one another. The nodes also know their own locations, and the locations of other nodes in the network previously. For decreasing the power consumption there are various compression techniques. The sensor network without data compression will serve to be the baseline in performance and power consumption. The data is compressed before sending it out to reduce network transmission time and reduce the total application elapsed time. But it also increases the local processing time by introducing the compression overhead. Whether or not an application can benefit from data compression depends on the tradeoff between the reduction of network transmission time and the increases of local processing. According to data types various compression techniques are available as shown in figure 3. We are explaining some of them considering only text files.
  • 3. Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various www.iosrjournals.org 30 | Page Figure 3: Types of Compression Techniques LZO [6] supports overlapping compression and in-place decompression. It is a block compression algorithm—it compresses and decompresses a block of data. Zlib's [7] compression method emits compressed data as a sequence of blocks. Various block types are allowed, one of which is stored blocks—these are simply composed of the raw input data plus a few header byte The parallel Bzip2[8] algorithm works by taking the blocks of input data and running them through the Burrows-Wheeler Transform(BWT) simultaneously on multiple processors using p threads. Unfortunately, there are several limitations in the use of compression for efficient data communication. First, compression techniques vary in their performance characteristics: compressed size, compression time, and decompression time. Second, compression performance is reliant upon the performance and availability of the underlying resources, e.g., CPU loads, network bandwidth and latency. V. Choosing Best Compression Technique The best compression technique for the user will depend on the network it is connected to. Furthermore, as the load changes at communication end-points or on the network itself, the best- performing compression technique for the same network also changes. These limitations make it increasingly difficult for end users to identify the best compression technique in all circumstances. Adaptive Compression Environment (ACE) will identify the best compression technique automatically and transparently and applies compression on- the fly. ACE selects between a number of well-known, competitive, compression techniques including Bzip, Zlib, and LZO [5]. Now after compression the actual transmission of data takes place. By using compression we have reduced the data size which we have to transmit and receive so the energy consumption is also reduce as to transmit/receive sensor have to be in active mode for less time as compared to transmitting data without compression. Figure 4: Proposed energy saving solution in P2P oriented WSN Algorithm: Step1: Start Step2: Sender Compress the data by using best technique and divide it into chunks. Step3: Check whether sensor is in R mode. if yes go to step 5 Step 4: Wait (Et + Ts(n)) and go to Step 3 Step 5: Sensor transmits the chunks. Step 6: Receiver receive and decompress the data and use it for further work. Step7: Stop
  • 4. Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approach of various www.iosrjournals.org 31 | Page VI. Conclusion In the recent scenario of Wireless Sensor Networks, many new technologies are there for saving the energy of sensors. In this Paper, a solution of compression technology is proposed in peer to peer network. In the near future, much advancement will be made in this work and an appropriate solution will be attained. References [1] I.F.Akyildiz,W.Su,Y.Sankarasubramaniam and E. Cayirici, “A Survey on sensor Networks,” IEEE Comm. Mag., Aug 2002, pp 102-114. [2] C.-F. Chiasserini and M. Garetto, “Wireless Sensor Networks,” IEEE INFOCOM 2004. [3] A.Saroliya,“InvestigationAnalysistofindtheSecurityVulnerabilitiesinDHTOrientedPeertoPeerNetwork”, Proceedingsofthe1stInternational Conference on Parallel, istributed and Grid Computing (PDGC-2010), 978-1-4244-7673- 2/10/$26.00 ©2010 IEEE. [4] Demetrios Zeinalipour-Yazti,Vana Kalogeraki, And Dimitrios Gunopulos,” Information Retrieval Techniques For Peer to Peer,” 1521-9615/04/$20.00 © 2004IEEE. [5] Chandra Krintz and Sezgin Sucu, “AdaptiveOn-the-FlyCompression,” 1045-9219/06/$20.00 © 2006 IEEE [6] Lempel-Ziv-Oberhumer(LZO) Compression,2005, www.oberhumer.com/opensource/lzop/. [7] ZLib compression library, www.gzip.org/zlib/+, 2005. [8] BZIP Compression, http://sources.redhat com/bzip2/, 2005.