SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 517
DISCOVERING ADAPTIVE WIRELESS SENSOR NETWORK USING
β-SYNCHRONIZER
Pradhnya S. Kalaskar1
, Prachi Jaini2
1
Department of Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur-16, India
2
Department of Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur-16, India
Abstract
When we consider the standard Bellman-Ford algorithm, it uses static values of link cost function and distance function. These static
values are stored in sink node so that the sink node requires memory to keep data safe. Therefore the space, message and time
complexity of a network and node increases. To overcome this we discover Fast Time Dependent Shortest Path algorithm with
message and used in network with β synchronizer. The FTSP algorithm uses dynamic values of link cost function and distance
function and to store these values we are using vector compression method so that there is no need to store the data into the sink node.
Because of this the message, time and space complexity of node will be decreases.
Keywords- Duty cycle, Time dependent, β synchronizer
------------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
When we consider the traditional MAC protocols which are
used to maximize the packet throughput, provide fairness, and
minimize latency. But it consumes more power in wireless
sensor network where the energy is an important constraint. To
reduce the energy consumption of a node there is strong
requirement of reducing the latency of a node, reducing the
average time required o complete one duty cycle and total
message count which are used to update the node information.
There are various sources which are used in wireless sensor
network but it consumes huge amount of energy for example
overhearing, collision of packets, idle listening and control
packet overhead [10]. Because of this the valuable data will be
affected from the network while communication is going on.
The budget of wireless sensor network is very limited so that it
is not possible to maintain the communication with central
coordinator. This type of network topology is partitioned and
time-dependent. The time factor is most important in wireless
sensor network hence synchronization between nodes in the
network should be strong.
For designing the adaptive network the shortest path algorithm
should be strong so that it will help to reduce the power
consumption of a node, message, space and time complexity of
a sink node. In wireless sensor network the sink node is
responsible for whole communication from source to
destination. Sink node stores the all necessary information of a
node like IP-address of source and destination, link updates,
network update. To store such type of information the sink node
requires the enough memory.
In our proposed FTSP algorithm there are two stages for
constructing shortest path, first stage is building spanning tree
and in the second stage calculating the shortest path and sends
an acknowledgement to the sink node.
The FTSP algorithm works with the β synchronizer. β
synchronizer is a special type of synchronizer used to broadcast
the packets in the network and to decrease the message
complexity of asynchronous systems [1]. The β synchronizer
has an initialization phase in which nodes are initialized in the
network, from which one leader node is selected and the
spanning tree is rooted around this leader. After execution of
one phase the leader node learns that all the nodes in the
network are “safe” and then broadcasts the message along the
spanning tree. All the nodes in the network then generate new
clock pulse. After that β synchronizer learns that all the nodes
in the network are safe or not once it is cleared then it sends an
acknowledgement to the parent node [1].
2. RELATED WORK
The time dependent shortest path algorithm was first studied for
GPS navigation and for centralized approach. It defines the two
different policies for time dependent shortest path one is
waiting policy and second is non waiting policy. Waiting means
wait for data to be delivered to the destination. The non waiting
means the sender sends the packet over network when the
receiver awake [1].
Low power listening was used by CSMA based technology to
achieve the low power communication. The B-MAC uses the
independent sleep and awake mechanism for scheduling. But B-
MAC consumes the energy and it also surpasses the existing
latency and throughput.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 518
To overcome this disadvantage the XMAC and DSP-MAC was
proposed with short preamble for replacing the long preamble
in B-MAC. To overcome the overhearing problem, the
receiver’s information was also embedded in short preamble
[1].
Based on the node’s residual energy adaptive low power
listening was proposed in [15]. ALPL supports point-to-point
latency and time dependent link cost.
Delay is also an important factor for routing in wireless sensor
network. Routing becomes too difficult in wireless sensor
network because of two reasons one by changing in
transmission latency and other one is intermittent connection
between two neighbour nodes.
To overcome this disadvantage the on demand routing approach
was proposed which were used the probe messages for
determining the least latency route.
3. PROPOSED WORK
3.1 Maintaining the Dynamic Route
When we consider the static network the sink node require to
store the route information so that when the link changes or
node changes its duty cycle or if it also joins any dynamic
network, the link which is connecting to all nodes in the
network will be changed multiple times. Therefore the sink
node will be overloaded and multiple links will be affected.
To maintain the dynamic route of a multicast network our
proposed algorithm stores only the route information in the sink
node, when one node updated the other node does not update
the path for whole multicast network but it updates the
necessary nodes in the network.
First the network identifies the node which needs to be updated
and after that the FTSP updates the shortest path for this
identified node.
3.2 Router
Router is used to route the packet from source to destination in
the network. It is consist of source node, destination node and
13 nodes from N1 to N13. The router stores information of a
network in a database. In this database it stores attacker details
like hacker which specify whether any attack is occurred in the
network or not. The IP-address field shows the IP-address of
the node on which attack is occurred. Node name tells the node
number on which attack is occurred. The date field display the
date and time of attack is occurred.
The node status details shows the detail information of node
name, destination node, digital signature which are used for
security and keep the information of whether any active or
passive attack is occurred in the network or not. It also keep the
node compromising attacker details like if there is any attack
occurred then it shows yes otherwise it displays no.
Fig. 1 Router with nodes from N1 to N13
3.3 Sender
Sender module has the browse button which selects the file
from the system to forward to the destination. The initialize
node button is then used to initialize the nodes in the network
by accepting the IP-address of both the sender and receiver.
After that the nodes will be initialized in the network.
The submit button is used to submit the data in the network and
starts packet forwarding. When the packet is reach to the
destination the popup window shows the message that the file is
reach to the destination.
3.4 Destination
The destination window shows the file which is reached to the
destination. And save this file into the receiver folder.
Fig. 2 Simulation of packet transmission with shortest path
from source to destination
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 519
3.5 Passive Attacker
The passive attacker is the attacker who can make attack on the
node while communication is going on. When this attack is
detected on the router, the router blocks that node and the sink
hole is created.
3.6 Active Attacker
The active attacker is the known attacker who can make the
attack while communication is going on. When this attack is
detected on the router, the router blocks that node and the sink
hole is created.
3.7 Node Compromising Attack
When the node compromising attack is occurred in the network,
the network then chooses the other safe node for forwarding the
packet to the destination.
4. RESULTS
Fig. 3 FTSP takes minimum time comparing to TD-Bellman
Ford and DSSP1.
Fig. 4 When nodes change the input the FTSP-M takes less
memory as compared to DSDV and Full Dynamic system.
Fig. 5 when network size increases FTSP takes less average
time to complete the process.
5. CONCLUSIONS
In this paper we have studied the actual simulation results
which show that the FTSP algorithm with β synchronizer
decreases message, space and time complexity of the multicast
WSN as compared to the traditional Bellman Ford algorithm.
For decreasing the time, space and message complexity of a
node we also studied the distributed shortest path routing
problem in duty cycled wireless sensor network using β
synchronizer and adaptive duty cycle.
REFERENCES
[1] S. Lai and B. Ravindran, “Least-Latency Routing over
Time Dependent Wireless Sensor Networks,” in IEEE
transaction 2013
[2] S. Lai and B. Ravindran, “On Distributed Time-
Dependent Shortest Paths over Duty-Cycled Wireless
Sensor Networks,” in IEEE INFOCOM, 2010
[3] B. Ding, J.X. Yu, and L. Qin, “Finding Time-Dependent
Shortest Paths over Large Graphs,” Proc. 11th Int’l
Conf. Extending Database Technology (EDBT ’08), pp.
205-216, 2008
[4] L. Su, C. Liu, H. Song, and G. Cao, “Routing in
Intermittently Connected Sensor Networks,” in IEEE ,
2008.
[5] Y. Gu, T. He, M. Lin, and J. Xu, “Spatiotemporal Delay
Control for Low-Duty-Cycle Sensor Networks,” in
IEEE, 2009
[6] G.F. Italiano, “Distributed Algorithms for Updating
Shortest Paths (Extended Abstract),” Proc. Fifth Int’l
Workshop Distributed Algorithms 2000.
[7] S.Lai, B. Zhang, B. Ravindran, and H.Cho, “CQS-Pair:
Cyclic Quorum System Pair for Wakeup Scheduling in
Wireless Sensor Networks,” 2008.
[8] P. Sommer and R. Wattenhofer, “Gradient Clock
Synchronization in Wireless Sensor Networks,” In ACM
2009.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 520
[9] Y.Sun, O. Gurewitz, and D.B. Johnson, “RI-MAC: A
Receiver Initiated Asynchronous Duty Cycle MAC
Protocol for Dynamic Traffic Loads in Wireless Sensor
Networks,” In ACM, 2008.
[10] W. Ye, J. Heidemann, and D. Estrin, “Medium Access
Control With Coordinated Adaptive Sleeping for
Wireless Sensor Networks,” In IEEE/ACM Transaction
2004.
[11] T.V. Dam and K. Langendoen, “An Adaptive Energy-
Efficient Mac Protocol for Wireless Sensor Networks,”
in ACM 2003.
[12] M. Zuniga and B. Krishnamachari, “Analyzing the
Transitional Region in Low Power Wireless Links,” in
IEEE 2004
[13] C. Schurgers and M.B. Srivastava,“Energy Efficient
Routing in Wireless Sensor Networks,” 2001.
[14] A. Woo, T. Tong, and D. Culler, “Taming the
Underlying Challenges of Reliable Multihop Routing in
Sensor Networks,” 2003.
[15] C.M. Vigorito, D. Ganesan, and A.G. Barto, “Adaptive
Control of Duty Cycling in Energy-Harvesting Wireless
Sensor Networks,” 2007
[16] K.L. Cooke and E. Halsey, “The Shortest Route through
a Network with Time-Dependent Internodal Transit
Times,” J. Math Analysis Application 1966
[17] A. Orda and R. Rom, “Distributed Shortest-Path
Protocols for Time-Dependent Networks,” Distributed
Computing, 1996.
[18] C. Serafino, D. Gabriele, F. Daniele, and N. Umberto,
“A Fully Dynamic Algorithm for Distributed Shortest
Paths,” Theoretical Computer Science, 2003
[19] S. Haldar, “An “All Pairs Shortest Paths” Distributed
Algorithm Using 2n2 Messages,” J. Algorithms, 1997
[20] K.V.S. Ramarao and S. Venkatesan, “On Finding and
Updating Shortest Paths Distributively,” J. Algorithms,
1992
[21] B. Awerbuch, “Complexity of Network
Synchronization,” J. ACM, 1985

More Related Content

What's hot

An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetseSAT Journals
 
Mlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetsMlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetseSAT Publishing House
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networkseSAT Publishing House
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 

What's hot (20)

An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manets
 
Mlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetsMlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manets
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Black Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy LogicBlack Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy Logic
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networks
 
Grayhole
GrayholeGrayhole
Grayhole
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
L45026571
L45026571L45026571
L45026571
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 

Similar to Discovering adaptive wireless sensor network using

Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkeSAT Publishing House
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...eSAT Publishing House
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) ineSAT Publishing House
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 

Similar to Discovering adaptive wireless sensor network using (20)

Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) in
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Discovering adaptive wireless sensor network using

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 517 DISCOVERING ADAPTIVE WIRELESS SENSOR NETWORK USING β-SYNCHRONIZER Pradhnya S. Kalaskar1 , Prachi Jaini2 1 Department of Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur-16, India 2 Department of Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur-16, India Abstract When we consider the standard Bellman-Ford algorithm, it uses static values of link cost function and distance function. These static values are stored in sink node so that the sink node requires memory to keep data safe. Therefore the space, message and time complexity of a network and node increases. To overcome this we discover Fast Time Dependent Shortest Path algorithm with message and used in network with β synchronizer. The FTSP algorithm uses dynamic values of link cost function and distance function and to store these values we are using vector compression method so that there is no need to store the data into the sink node. Because of this the message, time and space complexity of node will be decreases. Keywords- Duty cycle, Time dependent, β synchronizer ------------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION When we consider the traditional MAC protocols which are used to maximize the packet throughput, provide fairness, and minimize latency. But it consumes more power in wireless sensor network where the energy is an important constraint. To reduce the energy consumption of a node there is strong requirement of reducing the latency of a node, reducing the average time required o complete one duty cycle and total message count which are used to update the node information. There are various sources which are used in wireless sensor network but it consumes huge amount of energy for example overhearing, collision of packets, idle listening and control packet overhead [10]. Because of this the valuable data will be affected from the network while communication is going on. The budget of wireless sensor network is very limited so that it is not possible to maintain the communication with central coordinator. This type of network topology is partitioned and time-dependent. The time factor is most important in wireless sensor network hence synchronization between nodes in the network should be strong. For designing the adaptive network the shortest path algorithm should be strong so that it will help to reduce the power consumption of a node, message, space and time complexity of a sink node. In wireless sensor network the sink node is responsible for whole communication from source to destination. Sink node stores the all necessary information of a node like IP-address of source and destination, link updates, network update. To store such type of information the sink node requires the enough memory. In our proposed FTSP algorithm there are two stages for constructing shortest path, first stage is building spanning tree and in the second stage calculating the shortest path and sends an acknowledgement to the sink node. The FTSP algorithm works with the β synchronizer. β synchronizer is a special type of synchronizer used to broadcast the packets in the network and to decrease the message complexity of asynchronous systems [1]. The β synchronizer has an initialization phase in which nodes are initialized in the network, from which one leader node is selected and the spanning tree is rooted around this leader. After execution of one phase the leader node learns that all the nodes in the network are “safe” and then broadcasts the message along the spanning tree. All the nodes in the network then generate new clock pulse. After that β synchronizer learns that all the nodes in the network are safe or not once it is cleared then it sends an acknowledgement to the parent node [1]. 2. RELATED WORK The time dependent shortest path algorithm was first studied for GPS navigation and for centralized approach. It defines the two different policies for time dependent shortest path one is waiting policy and second is non waiting policy. Waiting means wait for data to be delivered to the destination. The non waiting means the sender sends the packet over network when the receiver awake [1]. Low power listening was used by CSMA based technology to achieve the low power communication. The B-MAC uses the independent sleep and awake mechanism for scheduling. But B- MAC consumes the energy and it also surpasses the existing latency and throughput.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 518 To overcome this disadvantage the XMAC and DSP-MAC was proposed with short preamble for replacing the long preamble in B-MAC. To overcome the overhearing problem, the receiver’s information was also embedded in short preamble [1]. Based on the node’s residual energy adaptive low power listening was proposed in [15]. ALPL supports point-to-point latency and time dependent link cost. Delay is also an important factor for routing in wireless sensor network. Routing becomes too difficult in wireless sensor network because of two reasons one by changing in transmission latency and other one is intermittent connection between two neighbour nodes. To overcome this disadvantage the on demand routing approach was proposed which were used the probe messages for determining the least latency route. 3. PROPOSED WORK 3.1 Maintaining the Dynamic Route When we consider the static network the sink node require to store the route information so that when the link changes or node changes its duty cycle or if it also joins any dynamic network, the link which is connecting to all nodes in the network will be changed multiple times. Therefore the sink node will be overloaded and multiple links will be affected. To maintain the dynamic route of a multicast network our proposed algorithm stores only the route information in the sink node, when one node updated the other node does not update the path for whole multicast network but it updates the necessary nodes in the network. First the network identifies the node which needs to be updated and after that the FTSP updates the shortest path for this identified node. 3.2 Router Router is used to route the packet from source to destination in the network. It is consist of source node, destination node and 13 nodes from N1 to N13. The router stores information of a network in a database. In this database it stores attacker details like hacker which specify whether any attack is occurred in the network or not. The IP-address field shows the IP-address of the node on which attack is occurred. Node name tells the node number on which attack is occurred. The date field display the date and time of attack is occurred. The node status details shows the detail information of node name, destination node, digital signature which are used for security and keep the information of whether any active or passive attack is occurred in the network or not. It also keep the node compromising attacker details like if there is any attack occurred then it shows yes otherwise it displays no. Fig. 1 Router with nodes from N1 to N13 3.3 Sender Sender module has the browse button which selects the file from the system to forward to the destination. The initialize node button is then used to initialize the nodes in the network by accepting the IP-address of both the sender and receiver. After that the nodes will be initialized in the network. The submit button is used to submit the data in the network and starts packet forwarding. When the packet is reach to the destination the popup window shows the message that the file is reach to the destination. 3.4 Destination The destination window shows the file which is reached to the destination. And save this file into the receiver folder. Fig. 2 Simulation of packet transmission with shortest path from source to destination
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 519 3.5 Passive Attacker The passive attacker is the attacker who can make attack on the node while communication is going on. When this attack is detected on the router, the router blocks that node and the sink hole is created. 3.6 Active Attacker The active attacker is the known attacker who can make the attack while communication is going on. When this attack is detected on the router, the router blocks that node and the sink hole is created. 3.7 Node Compromising Attack When the node compromising attack is occurred in the network, the network then chooses the other safe node for forwarding the packet to the destination. 4. RESULTS Fig. 3 FTSP takes minimum time comparing to TD-Bellman Ford and DSSP1. Fig. 4 When nodes change the input the FTSP-M takes less memory as compared to DSDV and Full Dynamic system. Fig. 5 when network size increases FTSP takes less average time to complete the process. 5. CONCLUSIONS In this paper we have studied the actual simulation results which show that the FTSP algorithm with β synchronizer decreases message, space and time complexity of the multicast WSN as compared to the traditional Bellman Ford algorithm. For decreasing the time, space and message complexity of a node we also studied the distributed shortest path routing problem in duty cycled wireless sensor network using β synchronizer and adaptive duty cycle. REFERENCES [1] S. Lai and B. Ravindran, “Least-Latency Routing over Time Dependent Wireless Sensor Networks,” in IEEE transaction 2013 [2] S. Lai and B. Ravindran, “On Distributed Time- Dependent Shortest Paths over Duty-Cycled Wireless Sensor Networks,” in IEEE INFOCOM, 2010 [3] B. Ding, J.X. Yu, and L. Qin, “Finding Time-Dependent Shortest Paths over Large Graphs,” Proc. 11th Int’l Conf. Extending Database Technology (EDBT ’08), pp. 205-216, 2008 [4] L. Su, C. Liu, H. Song, and G. Cao, “Routing in Intermittently Connected Sensor Networks,” in IEEE , 2008. [5] Y. Gu, T. He, M. Lin, and J. Xu, “Spatiotemporal Delay Control for Low-Duty-Cycle Sensor Networks,” in IEEE, 2009 [6] G.F. Italiano, “Distributed Algorithms for Updating Shortest Paths (Extended Abstract),” Proc. Fifth Int’l Workshop Distributed Algorithms 2000. [7] S.Lai, B. Zhang, B. Ravindran, and H.Cho, “CQS-Pair: Cyclic Quorum System Pair for Wakeup Scheduling in Wireless Sensor Networks,” 2008. [8] P. Sommer and R. Wattenhofer, “Gradient Clock Synchronization in Wireless Sensor Networks,” In ACM 2009.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 520 [9] Y.Sun, O. Gurewitz, and D.B. Johnson, “RI-MAC: A Receiver Initiated Asynchronous Duty Cycle MAC Protocol for Dynamic Traffic Loads in Wireless Sensor Networks,” In ACM, 2008. [10] W. Ye, J. Heidemann, and D. Estrin, “Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks,” In IEEE/ACM Transaction 2004. [11] T.V. Dam and K. Langendoen, “An Adaptive Energy- Efficient Mac Protocol for Wireless Sensor Networks,” in ACM 2003. [12] M. Zuniga and B. Krishnamachari, “Analyzing the Transitional Region in Low Power Wireless Links,” in IEEE 2004 [13] C. Schurgers and M.B. Srivastava,“Energy Efficient Routing in Wireless Sensor Networks,” 2001. [14] A. Woo, T. Tong, and D. Culler, “Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks,” 2003. [15] C.M. Vigorito, D. Ganesan, and A.G. Barto, “Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks,” 2007 [16] K.L. Cooke and E. Halsey, “The Shortest Route through a Network with Time-Dependent Internodal Transit Times,” J. Math Analysis Application 1966 [17] A. Orda and R. Rom, “Distributed Shortest-Path Protocols for Time-Dependent Networks,” Distributed Computing, 1996. [18] C. Serafino, D. Gabriele, F. Daniele, and N. Umberto, “A Fully Dynamic Algorithm for Distributed Shortest Paths,” Theoretical Computer Science, 2003 [19] S. Haldar, “An “All Pairs Shortest Paths” Distributed Algorithm Using 2n2 Messages,” J. Algorithms, 1997 [20] K.V.S. Ramarao and S. Venkatesan, “On Finding and Updating Shortest Paths Distributively,” J. Algorithms, 1992 [21] B. Awerbuch, “Complexity of Network Synchronization,” J. ACM, 1985